lighttpd 1.4.x
https://www.lighttpd.net/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
973 lines
32 KiB
973 lines
32 KiB
/* |
|
* mod_ajp13 - Apache JServ Protocol version 1.3 (AJP13) gateway |
|
* |
|
* Copyright(c) 2021 Glenn Strauss gstrauss()gluelogic.com All rights reserved |
|
* License: BSD 3-clause (same as lighttpd) |
|
* |
|
* AJPv13 protocol reference: |
|
* https://tomcat.apache.org/connectors-doc/ajp/ajpv13a.html |
|
* |
|
* Note: connection pool (and connection reuse) is not implemented |
|
*/ |
|
#include "first.h" |
|
|
|
#include <sys/types.h> |
|
#include <limits.h> |
|
#include <stdlib.h> |
|
#include <string.h> |
|
|
|
#include "gw_backend.h" |
|
typedef gw_plugin_config plugin_config; |
|
typedef gw_plugin_data plugin_data; |
|
typedef gw_handler_ctx handler_ctx; |
|
|
|
#include "base.h" |
|
#include "buffer.h" |
|
#include "chunk.h" |
|
#include "fdevent.h" |
|
#include "http_chunk.h" |
|
#include "http_header.h" |
|
#include "http_kv.h" |
|
#include "log.h" |
|
#include "status_counter.h" |
|
|
|
#define AJP13_MAX_PACKET_SIZE 8192 |
|
|
|
|
|
static void |
|
mod_ajp13_merge_config_cpv (plugin_config * const pconf, const config_plugin_value_t * const cpv) |
|
{ |
|
switch (cpv->k_id) { /* index into static config_plugin_keys_t cpk[] */ |
|
case 0: /* ajp13.server */ |
|
if (cpv->vtype == T_CONFIG_LOCAL) { |
|
gw_plugin_config * const gw = cpv->v.v; |
|
pconf->exts = gw->exts; |
|
pconf->exts_auth = gw->exts_auth; |
|
pconf->exts_resp = gw->exts_resp; |
|
} |
|
break; |
|
case 1: /* ajp13.balance */ |
|
/*if (cpv->vtype == T_CONFIG_LOCAL)*//*always true here for this param*/ |
|
pconf->balance = (int)cpv->v.u; |
|
break; |
|
case 2: /* ajp13.debug */ |
|
pconf->debug = (int)cpv->v.u; |
|
break; |
|
case 3: /* ajp13.map-extensions */ |
|
pconf->ext_mapping = cpv->v.a; |
|
break; |
|
default:/* should not happen */ |
|
return; |
|
} |
|
} |
|
|
|
|
|
static void |
|
mod_ajp13_merge_config (plugin_config * const pconf, const config_plugin_value_t *cpv) |
|
{ |
|
do { |
|
mod_ajp13_merge_config_cpv(pconf, cpv); |
|
} while ((++cpv)->k_id != -1); |
|
} |
|
|
|
|
|
static void |
|
mod_ajp13_patch_config (request_st * const r, plugin_data * const p) |
|
{ |
|
memcpy(&p->conf, &p->defaults, sizeof(plugin_config)); |
|
for (int i = 1, used = p->nconfig; i < used; ++i) { |
|
if (config_check_cond(r, (uint32_t)p->cvlist[i].k_id)) |
|
mod_ajp13_merge_config(&p->conf,p->cvlist + p->cvlist[i].v.u2[0]); |
|
} |
|
} |
|
|
|
|
|
SETDEFAULTS_FUNC(mod_ajp13_set_defaults) |
|
{ |
|
static const config_plugin_keys_t cpk[] = { |
|
{ CONST_STR_LEN("ajp13.server"), |
|
T_CONFIG_ARRAY_KVARRAY, |
|
T_CONFIG_SCOPE_CONNECTION } |
|
,{ CONST_STR_LEN("ajp13.balance"), |
|
T_CONFIG_STRING, |
|
T_CONFIG_SCOPE_CONNECTION } |
|
,{ CONST_STR_LEN("ajp13.debug"), |
|
T_CONFIG_INT, |
|
T_CONFIG_SCOPE_CONNECTION } |
|
,{ CONST_STR_LEN("ajp13.map-extensions"), |
|
T_CONFIG_ARRAY_KVSTRING, |
|
T_CONFIG_SCOPE_CONNECTION } |
|
,{ NULL, 0, |
|
T_CONFIG_UNSET, |
|
T_CONFIG_SCOPE_UNSET } |
|
}; |
|
|
|
plugin_data * const p = p_d; |
|
if (!config_plugin_values_init(srv, p, cpk, "mod_ajp13")) |
|
return HANDLER_ERROR; |
|
|
|
/* process and validate config directives |
|
* (init i to 0 if global context; to 1 to skip empty global context) */ |
|
for (int i = !p->cvlist[0].v.u2[1]; i < p->nconfig; ++i) { |
|
config_plugin_value_t *cpv = p->cvlist + p->cvlist[i].v.u2[0]; |
|
gw_plugin_config *gw = NULL; |
|
for (; -1 != cpv->k_id; ++cpv) { |
|
switch (cpv->k_id) { |
|
case 0:{/* ajp13.server */ |
|
gw = calloc(1, sizeof(gw_plugin_config)); |
|
force_assert(gw); |
|
if (!gw_set_defaults_backend(srv, p, cpv->v.a, gw, 0, |
|
cpk[cpv->k_id].k)) { |
|
gw_plugin_config_free(gw); |
|
return HANDLER_ERROR; |
|
} |
|
cpv->v.v = gw; |
|
cpv->vtype = T_CONFIG_LOCAL; |
|
break; |
|
} |
|
case 1: /* ajp13.balance */ |
|
cpv->v.u = (unsigned int)gw_get_defaults_balance(srv, cpv->v.b); |
|
break; |
|
case 2: /* ajp13.debug */ |
|
case 3: /* ajp13.map-extensions */ |
|
break; |
|
default:/* should not happen */ |
|
break; |
|
} |
|
} |
|
|
|
/* disable check-local for all exts (default enabled) */ |
|
if (gw && gw->exts) { /*(check after gw_set_defaults_backend())*/ |
|
gw_exts_clear_check_local(gw->exts); |
|
} |
|
} |
|
|
|
/* default is 0 */ |
|
/*p->defaults.balance = (unsigned int)gw_get_defaults_balance(srv, NULL);*/ |
|
|
|
/* initialize p->defaults from global config context */ |
|
if (p->nconfig > 0 && p->cvlist->v.u2[1]) { |
|
const config_plugin_value_t *cpv = p->cvlist + p->cvlist->v.u2[0]; |
|
if (-1 != cpv->k_id) |
|
mod_ajp13_merge_config(&p->defaults, cpv); |
|
} |
|
|
|
return HANDLER_GO_ON; |
|
} |
|
|
|
|
|
__attribute_pure__ |
|
static inline uint32_t |
|
ajp13_dec_uint16 (const uint8_t * const x) |
|
{ |
|
return (x[0] << 8) | x[1]; |
|
} |
|
|
|
|
|
static inline void |
|
ajp13_enc_uint16_nc (uint8_t * const x, const uint32_t v) |
|
{ |
|
/*(_nc = no check; caller must check for sufficient space in x)*/ |
|
x[0] = 0xFF & (v >> 8); |
|
x[1] = 0xFF & (v); |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_uint16 (uint8_t * const x, const uint32_t n, const uint32_t v) |
|
{ |
|
if (n + 2 > AJP13_MAX_PACKET_SIZE) return 0; |
|
ajp13_enc_uint16_nc(x+n, v); |
|
return n+2; |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_byte (uint8_t * const x, const uint32_t n, const uint32_t v) |
|
{ |
|
if (n + 1 > AJP13_MAX_PACKET_SIZE) return 0; |
|
x[n] = v; |
|
return n+1; |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_string (uint8_t * const x, uint32_t n, const char * const s, const uint32_t len) |
|
{ |
|
/*assert(AJP13_MAX_PACKET_SIZE <= UINT16_MAX);*//*(max is 8k in practice)*/ |
|
if (0 == len || len == UINT16_MAX) |
|
return ajp13_enc_uint16(x, n, 0xFFFF); |
|
|
|
if (n + 2 + len + 1 > AJP13_MAX_PACKET_SIZE) return 0; |
|
ajp13_enc_uint16_nc(x+n, len); |
|
n += 2; |
|
memcpy(x+n, s, len); |
|
n += len; |
|
x[n] = '\0'; |
|
return n+1; |
|
} |
|
|
|
|
|
static handler_t |
|
ajp13_stdin_append (handler_ctx * const hctx) |
|
{ |
|
chunkqueue * const req_cq = &hctx->r->reqbody_queue; |
|
const off_t req_cqlen = chunkqueue_length(req_cq); |
|
const off_t max_bytes = hctx->request_id < req_cqlen |
|
? hctx->request_id < MAX_WRITE_LIMIT ? hctx->request_id : MAX_WRITE_LIMIT |
|
: req_cqlen; |
|
off_t sent = 0; |
|
uint8_t hdr[4] = { 0x12, 0x34, 0, 0 }; |
|
|
|
for (off_t dlen; sent < max_bytes; sent += dlen) { |
|
dlen = max_bytes - sent > AJP13_MAX_PACKET_SIZE - 4 |
|
? AJP13_MAX_PACKET_SIZE - 4 |
|
: max_bytes - sent; |
|
|
|
if (-1 != hctx->wb_reqlen) { |
|
if (hctx->wb_reqlen >= 0) |
|
hctx->wb_reqlen += sizeof(hdr); |
|
else |
|
hctx->wb_reqlen -= sizeof(hdr); |
|
} |
|
|
|
ajp13_enc_uint16_nc(hdr+2, (uint32_t)dlen); |
|
(chunkqueue_is_empty(&hctx->wb) || hctx->wb.first->type == MEM_CHUNK) |
|
/* else FILE_CHUNK for temp file */ |
|
? chunkqueue_append_mem(&hctx->wb, (char *)&hdr, sizeof(hdr)) |
|
: chunkqueue_append_mem_min(&hctx->wb, (char *)&hdr, sizeof(hdr)); |
|
chunkqueue_steal(&hctx->wb, req_cq, dlen); |
|
/*(hctx->wb_reqlen already includes reqbody_length)*/ |
|
} |
|
|
|
hctx->request_id -= (int)sent; |
|
return HANDLER_GO_ON; |
|
} |
|
|
|
|
|
static void |
|
ajp13_stdin_append_n (handler_ctx * const hctx, const uint32_t n) |
|
{ |
|
if (hctx->wb.bytes_in == hctx->wb_reqlen) { |
|
/*(no additional request body to be sent; send empty packet)*/ |
|
uint8_t hdr[4] = { 0x12, 0x34, 0, 0 }; |
|
hctx->wb_reqlen += sizeof(hdr); |
|
chunkqueue_append_mem(&hctx->wb, (char *)hdr, sizeof(hdr)); |
|
} |
|
|
|
/* AJP13 connections can be reused, so server and backend must agree on how |
|
* much data is sent for each serialized request, especially if backend |
|
* chooses not to read (and use or discard) entire request body from server. |
|
* If server sent excess data, data might be interpreted as a subsequent |
|
* request, which might be abused for request smuggling (security). */ |
|
|
|
/* overload hctx->request_id to track bytes requested by backend. |
|
* Value must stay >= 0, since -1 is used to flag end of request */ |
|
if (n <= (uint32_t)(INT_MAX - hctx->request_id)) |
|
hctx->request_id += (int)n; |
|
else /* unexpected; misbehaving backend sent MANY Get Body Chunk requests */ |
|
hctx->request_id = INT_MAX; /*(limitation of overloaded struct member)*/ |
|
|
|
ajp13_stdin_append(hctx); |
|
} |
|
|
|
|
|
__attribute_pure__ |
|
static uint8_t |
|
ajp13_method_byte (const http_method_t m) |
|
{ |
|
/* map lighttpd http_method_t to ajp13 method byte */ |
|
|
|
#if (defined(__STDC_VERSION__) && __STDC_VERSION__-0 >= 199901L) /* C99 */ |
|
|
|
static const uint8_t ajp13_methods[] = { |
|
[HTTP_METHOD_GET] = 2, |
|
[HTTP_METHOD_HEAD] = 3, |
|
[HTTP_METHOD_POST] = 4, |
|
[HTTP_METHOD_PUT] = 5, |
|
[HTTP_METHOD_DELETE] = 6, |
|
[HTTP_METHOD_OPTIONS] = 1, |
|
[HTTP_METHOD_TRACE] = 7, |
|
[HTTP_METHOD_ACL] = 15, |
|
[HTTP_METHOD_BASELINE_CONTROL] = 26, |
|
[HTTP_METHOD_CHECKIN] = 18, |
|
[HTTP_METHOD_CHECKOUT] = 19, |
|
[HTTP_METHOD_COPY] = 11, |
|
[HTTP_METHOD_LABEL] = 24, |
|
[HTTP_METHOD_LOCK] = 13, |
|
[HTTP_METHOD_MERGE] = 25, |
|
[HTTP_METHOD_MKACTIVITY] = 27, |
|
[HTTP_METHOD_MKCOL] = 10, |
|
[HTTP_METHOD_MKWORKSPACE] = 22, |
|
[HTTP_METHOD_MOVE] = 12, |
|
[HTTP_METHOD_PROPFIND] = 8, |
|
[HTTP_METHOD_PROPPATCH] = 9, |
|
[HTTP_METHOD_REPORT] = 16, |
|
[HTTP_METHOD_SEARCH] = 21, |
|
[HTTP_METHOD_UNCHECKOUT] = 20, |
|
[HTTP_METHOD_UNLOCK] = 14, |
|
[HTTP_METHOD_UPDATE] = 23, |
|
[HTTP_METHOD_VERSION_CONTROL] = 17 |
|
}; |
|
|
|
return m >= 0 && m < (http_method_t)sizeof(ajp13_methods) |
|
? ajp13_methods[m] |
|
: 0; |
|
|
|
#else /*(array position is ajp13 method identifier byte)*/ |
|
|
|
static const uint8_t ajp13_methods[] = { |
|
0, |
|
HTTP_METHOD_OPTIONS, |
|
HTTP_METHOD_GET, |
|
HTTP_METHOD_HEAD, |
|
HTTP_METHOD_POST, |
|
HTTP_METHOD_PUT, |
|
HTTP_METHOD_DELETE, |
|
HTTP_METHOD_TRACE, |
|
HTTP_METHOD_PROPFIND, |
|
HTTP_METHOD_PROPPATCH, |
|
HTTP_METHOD_MKCOL, |
|
HTTP_METHOD_COPY, |
|
HTTP_METHOD_MOVE, |
|
HTTP_METHOD_LOCK, |
|
HTTP_METHOD_UNLOCK, |
|
HTTP_METHOD_ACL, |
|
HTTP_METHOD_REPORT, |
|
HTTP_METHOD_VERSION_CONTROL, |
|
HTTP_METHOD_CHECKIN, |
|
HTTP_METHOD_CHECKOUT, |
|
HTTP_METHOD_UNCHECKOUT, |
|
HTTP_METHOD_SEARCH, |
|
HTTP_METHOD_MKWORKSPACE, |
|
HTTP_METHOD_UPDATE, |
|
HTTP_METHOD_LABEL, |
|
HTTP_METHOD_MERGE, |
|
HTTP_METHOD_BASELINE_CONTROL, |
|
HTTP_METHOD_MKACTIVITY |
|
}; |
|
|
|
uint8_t method; |
|
for (method = 1; method < sizeof(ajp13_methods); ++method) { |
|
if (ajp13_methods[method] == m) break; |
|
} |
|
return (method < sizeof(ajp13_methods)) ? method : 0; |
|
|
|
#endif |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_request_headers (uint8_t * const x, uint32_t n, const request_st * const r) |
|
{ |
|
const array * const rqst_headers = &r->rqst_headers; |
|
const int add_content_length = |
|
(!light_btst(r->rqst_htags, HTTP_HEADER_CONTENT_LENGTH)); |
|
/* num_headers */ |
|
n = ajp13_enc_uint16(x, n, rqst_headers->used + add_content_length); |
|
if (0 == n) return n; |
|
/* request_headers */ |
|
if (add_content_length) { |
|
/* (gw_backend.c sends 411 Length Required if Content-Length not |
|
* provided and request body is being streamed to backend. Add |
|
* Content-Length if not provided and request body was collected.) */ |
|
n = ajp13_enc_uint16(x, n, 0xA008); |
|
if (0 == n) return n; |
|
char buf[LI_ITOSTRING_LENGTH]; |
|
n = ajp13_enc_string(x, n, buf, |
|
li_itostrn(buf, sizeof(buf), r->reqbody_length)); |
|
if (0 == n) return n; |
|
} |
|
for (uint32_t i = 0, num = rqst_headers->used; i < num; ++i) { |
|
const data_string * const ds = (data_string *)rqst_headers->data[i]; |
|
uint8_t code = 0x00; |
|
switch (ds->ext) { /* map request header to ajp13 SC_REQ_* code */ |
|
case HTTP_HEADER_ACCEPT: code = 0x01; break; |
|
case HTTP_HEADER_ACCEPT_ENCODING: code = 0x03; break; |
|
case HTTP_HEADER_ACCEPT_LANGUAGE: code = 0x04; break; |
|
case HTTP_HEADER_AUTHORIZATION: code = 0x05; break; |
|
case HTTP_HEADER_CONNECTION: code = 0x06; break; |
|
case HTTP_HEADER_CONTENT_TYPE: code = 0x07; break; |
|
case HTTP_HEADER_CONTENT_LENGTH: code = 0x08; break; |
|
case HTTP_HEADER_COOKIE: code = 0x09; break; |
|
case HTTP_HEADER_HOST: code = 0x0B; break; |
|
case HTTP_HEADER_PRAGMA: code = 0x0C; break; |
|
case HTTP_HEADER_REFERER: code = 0x0D; break; |
|
case HTTP_HEADER_USER_AGENT: code = 0x0E; break; |
|
case HTTP_HEADER_OTHER: |
|
if (buffer_eq_icase_slen(&ds->key, CONST_STR_LEN("Accept-Charset"))) |
|
code = 0x02; |
|
else if (buffer_eq_icase_slen(&ds->key, CONST_STR_LEN("Cookie2"))) |
|
code = 0x0A; |
|
break; |
|
default: |
|
break; |
|
} |
|
|
|
n = (code) |
|
? ajp13_enc_uint16(x, n, 0xA000 | code) |
|
: ajp13_enc_string(x, n, BUF_PTR_LEN(&ds->key)); |
|
if (0 == n) return n; |
|
n = ajp13_enc_string(x, n, BUF_PTR_LEN(&ds->value)); |
|
if (0 == n) return n; |
|
} |
|
return n; |
|
} |
|
|
|
|
|
#if 0 |
|
static uint32_t |
|
ajp13_enc_req_attribute (uint8_t * const x, uint32_t n, const char * const k, const uint32_t klen, const char * const v, const uint32_t vlen) |
|
{ |
|
n = ajp13_enc_byte(x, n, 0x0A); |
|
if (0 == n) return n; |
|
n = ajp13_enc_string(x, n, k, klen); |
|
if (0 == n) return n; |
|
return ajp13_enc_string(x, n, v, vlen); |
|
} |
|
#endif |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_attribute (uint8_t * const x, uint32_t n, const buffer * const b, uint8_t code) |
|
{ |
|
if (NULL == b) return n; |
|
n = ajp13_enc_byte(x, n, code); |
|
if (0 == n) return n; |
|
return ajp13_enc_string(x, n, BUF_PTR_LEN(b)); |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_attributes (uint8_t * const x, uint32_t n, request_st * const r) |
|
{ |
|
const buffer *vb; |
|
|
|
vb = http_header_env_get(r, CONST_STR_LEN("REMOTE_USER")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x03); |
|
if (0 == n) return n; |
|
vb = http_header_env_get(r, CONST_STR_LEN("AUTH_TYPE")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x04); |
|
if (0 == n) return n; |
|
|
|
if (!buffer_is_blank(&r->uri.query)) { |
|
n = ajp13_enc_attribute(x, n, &r->uri.query, 0x05); |
|
if (0 == n) return n; |
|
} |
|
|
|
if (buffer_is_equal_string(&r->uri.scheme, CONST_STR_LEN("https"))) { |
|
/* XXX: might have config to avoid this overhead if not needed */ |
|
|
|
r->con->srv->request_env(r); |
|
|
|
vb = http_header_env_get(r, CONST_STR_LEN("SSL_CLIENT_CERT")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x07); |
|
if (0 == n) return n; |
|
vb = http_header_env_get(r, CONST_STR_LEN("SSL_CIPHER")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x08); |
|
if (0 == n) return n; |
|
vb = http_header_env_get(r, CONST_STR_LEN("SSL_CIPHER_USE_KEYSIZE")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x0B); |
|
if (0 == n) return n; |
|
} |
|
|
|
#if 0 |
|
/* req_attribute */ /*(what is often included by convention?)*/ |
|
n = ajp13_enc_req_attribute(x, n, CONST_STR_LEN("REDIRECT_URI"), |
|
BUF_PTR_LEN(&r->target_orig)); |
|
if (0 == n) return n; |
|
if (!buffer_is_equal(&r->target, &r->target_orig)) { |
|
n = ajp13_enc_req_attribute(x, n, CONST_STR_LEN("REDIRECT_URI"), |
|
BUF_PTR_LEN(&r->target)); |
|
if (0 == n) return n; |
|
} |
|
/* Note: if this is extended to pass all env; must not pass HTTP_PROXY */ |
|
#endif |
|
|
|
#if 1 /*(experimental) (???) (XXX: create separate config option?)*/ |
|
/*(use mod_setenv to set value)*/ |
|
vb = http_header_env_get(r, CONST_STR_LEN("AJP13_SECRET")); |
|
n = ajp13_enc_attribute(x, n, vb, 0x0C); |
|
if (0 == n) return n; |
|
#endif |
|
|
|
return n; |
|
} |
|
|
|
|
|
static uint32_t |
|
ajp13_enc_server_name (uint8_t * const x, const uint32_t n, const request_st * const r) |
|
{ |
|
#if 0 |
|
const data_string * const ds = |
|
array_get_element_klen(cgienv, CONST_STR_LEN("SERVER_NAME")); |
|
return (ds) |
|
? ajp13_enc_string(x, n, BUF_PTR_LEN(&ds->value)) |
|
: ajp13_enc_string(x, n, NULL, 0); |
|
#else |
|
/* copied and modified from http_cgi.c:http_cgi_headers() */ |
|
uint32_t len = buffer_clen(r->server_name); |
|
if (len) { |
|
const char * const ptr = r->server_name->ptr; |
|
if (ptr[0] == '[') { |
|
const char *colon = strstr(ptr, "]:"); |
|
if (colon) len = (colon + 1) - ptr; |
|
} |
|
else { |
|
const char *colon = strchr(ptr, ':'); |
|
if (colon) len = colon - ptr; |
|
} |
|
return ajp13_enc_string(x, n, ptr, len); |
|
} |
|
else { |
|
/* SERVER_ADDR is generated in http_cgi_headers() |
|
* if the listen addr is, for example, a wildcard addr. |
|
* XXX: For now, just send an empty string in this case |
|
* instead of duplicating that code */ |
|
return ajp13_enc_string(x, n, NULL, 0); |
|
} |
|
#endif |
|
} |
|
|
|
|
|
#if 0 |
|
static int |
|
ajp13_env_add (void *venv, const char *k, size_t klen, const char *v, size_t vlen) |
|
{ |
|
/*(might be more efficient to store list rather than lighttpd array)*/ |
|
array_set_key_value((array *)venv, k, klen, v, vlen); |
|
return 0; |
|
} |
|
#endif |
|
|
|
|
|
static handler_t |
|
ajp13_create_env (handler_ctx * const hctx) |
|
{ |
|
request_st * const r = hctx->r; |
|
/* AJP13_MAX_PACKET_SIZE currently matches default 8k chunk_buf_sz */ |
|
buffer * const b = |
|
chunkqueue_prepend_buffer_open_sz(&hctx->wb, AJP13_MAX_PACKET_SIZE); |
|
|
|
#if 0 /*(elide if used only for SERVER_NAME, as is current case)*/ |
|
/* Note: while it might be slightly more efficient to special-case ajp13 |
|
* request creation here (reduce string copy), it is not worth duplicating |
|
* the logic centralized in http-header-glue.c:http_cgi_headers() */ |
|
array * const cgienv = array_init(64); |
|
#endif |
|
|
|
do { |
|
#if 0 |
|
#if 0 /* XXX: potential future extension */ |
|
gw_host * const host = hctx->host; |
|
http_cgi_opts opts = { |
|
(hctx->gw_mode == FCGI_AUTHORIZER), |
|
host->break_scriptfilename_for_php, |
|
host->docroot, |
|
host->strip_request_uri |
|
}; |
|
#else |
|
http_cgi_opts opts = { 0, 0, NULL, NULL }; |
|
#endif |
|
if (0 != http_cgi_headers(r, &opts, ajp13_env_add, cgienv)) break; |
|
#endif |
|
|
|
uint32_t n = 6; |
|
uint8_t * const x = (uint8_t *)b->ptr; |
|
|
|
x[0] = 0x12; |
|
x[1] = 0x34; |
|
x[2] = 0; |
|
x[3] = 0; |
|
x[4] = 0x02; /* JK_AJP13_FORWARD_REQUEST */ |
|
/* method */ |
|
const uint8_t method_byte = ajp13_method_byte(r->http_method); |
|
if (0 == method_byte) break; |
|
x[5] = method_byte; |
|
/* protocol */ |
|
const char * const proto = get_http_version_name(r->http_version); |
|
n = ajp13_enc_string(x, n, proto, strlen(proto)); |
|
if (0 == n) break; |
|
/* req_uri */ |
|
n = ajp13_enc_string(x, n, BUF_PTR_LEN(&r->uri.path)); |
|
if (0 == n) break; |
|
/* remote_addr */ |
|
n = ajp13_enc_string(x, n, BUF_PTR_LEN(r->con->dst_addr_buf)); |
|
if (0 == n) break; |
|
/* remote_host *//*(skip DNS lookup)*/ |
|
n = ajp13_enc_string(x, n, NULL, 0); |
|
if (0 == n) break; |
|
/* server_name */ |
|
n = ajp13_enc_server_name(x, n, r); |
|
if (0 == n) break; |
|
/* server_port */ |
|
unsigned short port = sock_addr_get_port(&r->con->srv_socket->addr); |
|
n = ajp13_enc_uint16(x, n, port); |
|
if (0 == n) break; |
|
/* is_ssl */ |
|
n = ajp13_enc_byte(x,n,buffer_is_equal_string(&r->uri.scheme, |
|
CONST_STR_LEN("https"))); |
|
if (0 == n) break; |
|
/* num_headers */ |
|
/* request_headers */ |
|
n = ajp13_enc_request_headers(x, n, r); |
|
if (0 == n) break; |
|
/* attributes */ |
|
n = ajp13_enc_attributes(x, n, r); |
|
if (0 == n) break; |
|
/* request_terminator */ |
|
n = ajp13_enc_byte(x, n, 0xFF); |
|
if (0 == n) break; |
|
/* payload length (overwrite in header) */ |
|
ajp13_enc_uint16_nc(x+2, n-4); |
|
|
|
#if 0 |
|
array_free(cgienv); |
|
#endif |
|
|
|
/* (buffer is reallocated only if n is exactly AJP13_MAX_PACKET_SIZE) */ |
|
/* (could check for one-off; limit to 8k-1 to avoid resizing buffer) */ |
|
buffer_extend(b, n);/*(buffer_commit but extend +1 for '\0' as needed)*/ |
|
chunkqueue_prepend_buffer_commit(&hctx->wb); |
|
hctx->wb_reqlen = (off_t)n; |
|
|
|
if (r->reqbody_length) { |
|
/*chunkqueue_append_chunkqueue(&hctx->wb, &r->reqbody_queue);*/ |
|
if (r->reqbody_length > 0) |
|
hctx->wb_reqlen += r->reqbody_length; |
|
/* (eventual) (minimal) total request size, not necessarily |
|
* including all ajp13 framing around content length yet */ |
|
else /* as-yet-unknown total rqst sz (Transfer-Encoding: chunked)*/ |
|
hctx->wb_reqlen = -hctx->wb_reqlen; |
|
} |
|
/* send single data packet, then wait for Get Body Chunk from backend */ |
|
ajp13_stdin_append_n(hctx, AJP13_MAX_PACKET_SIZE-4); |
|
hctx->request_id = 0; /* overloaded value; see ajp13_stdin_append_n() */ |
|
|
|
status_counter_inc(CONST_STR_LEN("ajp13.requests")); |
|
return HANDLER_GO_ON; |
|
} while (0); |
|
|
|
#if 0 |
|
array_free(cgienv); |
|
#endif |
|
|
|
r->http_status = 400; |
|
r->handler_module = NULL; |
|
buffer_clear(b); |
|
chunkqueue_remove_finished_chunks(&hctx->wb); |
|
return HANDLER_FINISHED; |
|
} |
|
|
|
|
|
static void |
|
ajp13_expand_headers (buffer * const b, handler_ctx * const hctx, uint32_t plen) |
|
{ |
|
/* hctx->rb must contain at least plen content |
|
* and all chunks expected to be MEM_CHUNK */ |
|
chunkqueue_compact_mem(hctx->rb, plen); |
|
|
|
/* expect all headers in single AJP13 packet; |
|
* not handling multiple AJP13_SEND_HEADERS packets |
|
* (expecting single MEM_CHUNK <= 8k with AJP13 headers) */ |
|
|
|
chunk * const c = hctx->rb->first; |
|
uint8_t *ptr = |
|
(uint8_t *)c->mem->ptr + c->offset + 5; /* +5 for (4 hdr + 1 type) */ |
|
plen -= 5; |
|
|
|
/* expand headers into buffer to be parsed by common code for responses |
|
* (parsing might be slightly faster if AJP13-specific, but then would have |
|
* to duplicate all http_response_parse_headers() policy)*/ |
|
|
|
do { |
|
uint32_t len; |
|
if (plen < 2) break; |
|
plen -= 2; |
|
buffer_append_string_len(b, CONST_STR_LEN("HTTP/1.1 ")); |
|
buffer_append_int(b, ajp13_dec_uint16(ptr)); |
|
ptr += 2; |
|
|
|
if (plen < 2) break; |
|
plen -= 2; |
|
len = ajp13_dec_uint16(ptr); |
|
ptr += 2; |
|
if (plen < len+1) break; |
|
plen -= len+1; /* include -1 for ending '\0' */ |
|
buffer_append_string_len(b, " ", 1); |
|
if (len) buffer_append_string_len(b, (char *)ptr, len); |
|
ptr += len+1; |
|
|
|
if (plen < 2) break; |
|
plen -= 2; |
|
ptr += 2; |
|
for (uint32_t nhdrs = ajp13_dec_uint16(ptr); nhdrs; --nhdrs) { |
|
if (plen < 2) break; |
|
plen -= 2; |
|
len = ajp13_dec_uint16(ptr); |
|
ptr += 2; |
|
if (len >= 0xA000) { |
|
if (len == 0xA000 || len > 0xA00B) break; |
|
static const struct { |
|
const char *h; |
|
uint32_t len; |
|
} hcode[] = { |
|
{ CONST_STR_LEN("\nContent-Type: ") } |
|
,{ CONST_STR_LEN("\nContent-Language: ") } |
|
,{ CONST_STR_LEN("\nContent-Length: ") } |
|
,{ CONST_STR_LEN("\nDate: ") } |
|
,{ CONST_STR_LEN("\nLast-Modified: ") } |
|
,{ CONST_STR_LEN("\nLocation: ") } |
|
,{ CONST_STR_LEN("\nSet-Cookie: ") } |
|
,{ CONST_STR_LEN("\nSet-Cookie2: ") } |
|
,{ CONST_STR_LEN("\nServlet-Engine: ") } |
|
,{ CONST_STR_LEN("\nStatus: ") } |
|
,{ CONST_STR_LEN("\nWWW-Authenticate: ") } |
|
}; |
|
const uint32_t idx = (len & 0xF) - 1; |
|
buffer_append_string_len(b, hcode[idx].h, hcode[idx].len); |
|
} |
|
else { |
|
if (plen < len+1) break; |
|
plen -= len+1; |
|
buffer_append_str3(b, CONST_STR_LEN("\n"), |
|
(char *)ptr, len, |
|
CONST_STR_LEN(": ")); |
|
ptr += len+1; |
|
} |
|
|
|
if (plen < 2) break; |
|
plen -= 2; |
|
len = ajp13_dec_uint16(ptr); |
|
ptr += 2; |
|
if (plen < len+1) break; |
|
plen -= len+1; |
|
buffer_append_string_len(b, (char *)ptr, len); |
|
ptr += len+1; |
|
} |
|
} while (0); |
|
|
|
buffer_append_string_len(b, CONST_STR_LEN("\n\n")); |
|
} |
|
|
|
|
|
enum { |
|
AJP13_FORWARD_REQUEST = 2 |
|
,AJP13_SEND_BODY_CHUNK = 3 |
|
,AJP13_SEND_HEADERS = 4 |
|
,AJP13_END_RESPONSE = 5 |
|
,AJP13_GET_BODY_CHUNK = 6 |
|
,AJP13_SHUTDOWN = 7 |
|
,AJP13_PING = 8 |
|
,AJP13_CPONG_REPLY = 9 |
|
,AJP13_CPING = 10 |
|
}; |
|
|
|
|
|
static handler_t |
|
ajp13_recv_parse (request_st * const r, struct http_response_opts_t * const opts, buffer * const b, size_t n) |
|
{ |
|
handler_ctx * const hctx = (handler_ctx *)opts->pdata; |
|
log_error_st * const errh = r->conf.errh; |
|
int fin = 0; |
|
|
|
if (0 == n) { |
|
if (-1 == hctx->request_id) /*(flag request ended)*/ |
|
return HANDLER_FINISHED; |
|
if (!(fdevent_fdnode_interest(hctx->fdn) & FDEVENT_IN) |
|
&& !(r->conf.stream_response_body |
|
& FDEVENT_STREAM_RESPONSE_POLLRDHUP)) |
|
return HANDLER_GO_ON; |
|
log_error(errh, __FILE__, __LINE__, |
|
"unexpected end-of-file (perhaps the ajp13 process died):" |
|
"pid: %d socket: %s", |
|
hctx->proc->pid, hctx->proc->connection_name->ptr); |
|
|
|
return HANDLER_ERROR; |
|
} |
|
|
|
/* future: might try to elide copying if buffer contains full packet(s) |
|
* and prior read did not end in a partial packet */ |
|
chunkqueue_append_buffer(hctx->rb, b); |
|
|
|
do { |
|
uint8_t header[7]; |
|
const off_t rblen = chunkqueue_length(hctx->rb); |
|
if (rblen < 5) |
|
break; /* incomplete packet header + min response payload */ |
|
char *ptr = (char *)&header; |
|
uint32_t pklen = 5; |
|
if (chunkqueue_peek_data(hctx->rb, &ptr, &pklen, errh) < 0) |
|
break; |
|
if (pklen != 5) |
|
break; |
|
if (ptr[0] != 'A' || ptr[1] != 'B') { |
|
log_error(errh, __FILE__, __LINE__, |
|
"invalid packet prefix sent from container:" |
|
"pid: %d socket: %s", |
|
hctx->proc->pid, hctx->proc->connection_name->ptr); |
|
return HANDLER_ERROR; |
|
} |
|
uint32_t plen = ajp13_dec_uint16((uint8_t *)ptr+2); |
|
if (plen > (unsigned int)rblen - 4) |
|
break; /* incomplete packet */ |
|
|
|
switch(ptr[4]) { |
|
case AJP13_SEND_HEADERS: |
|
if (0 == r->resp_body_started) { |
|
buffer *hdrs = hctx->response; |
|
if (NULL == hdrs) { |
|
hdrs = r->tmp_buf; |
|
buffer_clear(hdrs); |
|
} |
|
|
|
ajp13_expand_headers(hdrs, hctx, 4 + plen); |
|
|
|
if (HANDLER_GO_ON != |
|
http_response_parse_headers(r, &hctx->opts, hdrs)) { |
|
hctx->send_content_body = 0; |
|
return HANDLER_FINISHED; |
|
} |
|
if (0 == r->resp_body_started) { |
|
if (!hctx->response) { |
|
hctx->response = chunk_buffer_acquire(); |
|
buffer_copy_buffer(hctx->response, hdrs); |
|
} |
|
} |
|
else if (hctx->gw_mode == GW_AUTHORIZER && |
|
(r->http_status == 0 || r->http_status == 200)) { |
|
/* authorizer approved request; ignore the content here */ |
|
hctx->send_content_body = 0; |
|
} |
|
} |
|
else { |
|
log_error(errh, __FILE__, __LINE__, |
|
"AJP13: headers received after body started"); |
|
/* ignore; discard packet */ |
|
} |
|
break; |
|
case AJP13_SEND_BODY_CHUNK: |
|
if (0 == r->resp_body_started) { /* header not finished */ |
|
log_error(errh, __FILE__, __LINE__, |
|
"AJP13: body received before headers"); |
|
return HANDLER_FINISHED; |
|
} |
|
else if (hctx->send_content_body) { |
|
ptr = (char *)&header; |
|
pklen = 7; |
|
if (chunkqueue_peek_data(hctx->rb, &ptr, &pklen, errh) < 0) |
|
return HANDLER_GO_ON; |
|
if (pklen != 7) |
|
return HANDLER_GO_ON; |
|
uint32_t len = ajp13_dec_uint16((uint8_t *)ptr+5); |
|
if (0 == len) break; /*(skip "flush" packet of 0-length data)*/ |
|
if (len > plen - 3) { |
|
log_error(errh, __FILE__, __LINE__, |
|
"AJP13: body packet received with invalid length"); |
|
return HANDLER_FINISHED; |
|
} |
|
chunkqueue_mark_written(hctx->rb, 7); |
|
if (0 == http_chunk_transfer_cqlen(r, hctx->rb, len)) { |
|
if (len != plen - 3) |
|
chunkqueue_mark_written(hctx->rb, plen - 3 - len); |
|
continue; |
|
} |
|
else { |
|
/* error writing to tempfile; |
|
* truncate response or send 500 if nothing sent yet */ |
|
return HANDLER_FINISHED; |
|
} |
|
} |
|
else { |
|
/* ignore; discard packet */ |
|
} |
|
break; |
|
case AJP13_GET_BODY_CHUNK: |
|
/*assert(3 == plen);*/ |
|
ptr = (char *)&header; |
|
pklen = 7; |
|
if (chunkqueue_peek_data(hctx->rb, &ptr, &pklen, errh) < 0) |
|
return HANDLER_GO_ON; |
|
if (pklen != 7) |
|
return HANDLER_GO_ON; |
|
ajp13_stdin_append_n(hctx, ajp13_dec_uint16((uint8_t *)ptr+5)); |
|
break; |
|
case AJP13_END_RESPONSE: |
|
/*assert(2 == plen);*/ |
|
#if 0 |
|
ptr = (char *)&header; |
|
pklen = 6; |
|
if (chunkqueue_peek_data(hctx->rb, &ptr, &pklen, errh) < 0) |
|
return HANDLER_GO_ON; |
|
if (pklen != 6) |
|
return HANDLER_GO_ON; |
|
if (ptr[5]) { |
|
/* future: add connection to pool if 'reuse' flag is set */ |
|
} |
|
#endif |
|
hctx->request_id = -1; /*(flag request ended)*/ |
|
fin = 1; |
|
break; |
|
case AJP13_CPONG_REPLY: |
|
/*assert(1 == plen);*/ |
|
break; |
|
default: |
|
log_error(errh, __FILE__, __LINE__, |
|
"AJP13: packet type not handled: %d", ptr[4]); |
|
/* discard packet */ |
|
break; |
|
} |
|
|
|
chunkqueue_mark_written(hctx->rb, 4 + plen); |
|
} while (0 == fin); |
|
|
|
return 0 == fin ? HANDLER_GO_ON : HANDLER_FINISHED; |
|
} |
|
|
|
|
|
static handler_t |
|
ajp13_check_extension (request_st * const r, void *p_d) |
|
{ |
|
if (NULL != r->handler_module) return HANDLER_GO_ON; |
|
|
|
plugin_data * const p = p_d; |
|
mod_ajp13_patch_config(r, p); |
|
if (NULL == p->conf.exts) return HANDLER_GO_ON; |
|
|
|
handler_t rc = gw_check_extension(r, p, 1, 0); |
|
if (HANDLER_GO_ON != rc) return rc; |
|
|
|
if (r->handler_module == p->self) { |
|
handler_ctx *hctx = r->plugin_ctx[p->id]; |
|
hctx->opts.backend = BACKEND_AJP13; |
|
hctx->opts.parse = ajp13_recv_parse; |
|
hctx->opts.pdata = hctx; |
|
hctx->stdin_append = ajp13_stdin_append; |
|
hctx->create_env = ajp13_create_env; |
|
if (!hctx->rb) |
|
hctx->rb = chunkqueue_init(NULL); |
|
else |
|
chunkqueue_reset(hctx->rb); |
|
} |
|
|
|
return HANDLER_GO_ON; |
|
} |
|
|
|
|
|
int mod_ajp13_plugin_init (plugin *p); |
|
int mod_ajp13_plugin_init (plugin *p) |
|
{ |
|
p->version = LIGHTTPD_VERSION_ID; |
|
p->name = "ajp13"; |
|
|
|
p->init = gw_init; |
|
p->cleanup = gw_free; |
|
p->set_defaults = mod_ajp13_set_defaults; |
|
p->handle_request_reset = gw_handle_request_reset; |
|
p->handle_uri_clean = ajp13_check_extension; |
|
p->handle_subrequest = gw_handle_subrequest; |
|
p->handle_trigger = gw_handle_trigger; |
|
p->handle_waitpid = gw_handle_waitpid_cb; |
|
|
|
return 0; |
|
}
|
|
|