lighttpd 1.4.x
https://www.lighttpd.net/
You can not select more than 25 topics
Topics must start with a letter or number, can include dashes ('-') and can be up to 35 characters long.
1663 lines
55 KiB
1663 lines
55 KiB
#include "first.h" |
|
|
|
#include "base.h" |
|
#include "burl.h" |
|
#include "fdevent.h" |
|
#include "keyvalue.h" |
|
#include "log.h" |
|
#include "stream.h" |
|
|
|
#include "configparser.h" |
|
#include "configfile.h" |
|
#include "stat_cache.h" |
|
#include "sys-crypto.h" |
|
|
|
#include <sys/stat.h> |
|
#include <sys/wait.h> |
|
|
|
#include <stdlib.h> |
|
#include <fcntl.h> |
|
#include <unistd.h> |
|
#include <errno.h> |
|
#include <string.h> |
|
#include <ctype.h> |
|
#include <limits.h> |
|
#include <glob.h> |
|
|
|
#ifndef PATH_MAX |
|
#define PATH_MAX 4096 |
|
#endif |
|
|
|
#if defined(HAVE_MYSQL) || (defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER)) |
|
static void config_warn_authn_module (server *srv, const char *module, size_t len) { |
|
for (size_t i = 0; i < srv->config_context->used; ++i) { |
|
const data_config *config = (data_config const*)srv->config_context->data[i]; |
|
const data_unset *du = array_get_element(config->value, "auth.backend"); |
|
if (NULL != du && du->type == TYPE_STRING) { |
|
data_string *ds = (data_string *)du; |
|
if (buffer_is_equal_string(ds->value, module, len)) { |
|
buffer_copy_string_len(srv->tmp_buf, CONST_STR_LEN("mod_authn_")); |
|
buffer_append_string_len(srv->tmp_buf, module, len); |
|
array_insert_value(srv->srvconf.modules, CONST_BUF_LEN(srv->tmp_buf)); |
|
log_error_write(srv, __FILE__, __LINE__, "SSSsSSS", "Warning: please add \"mod_authn_", module, "\" to server.modules list in lighttpd.conf. A future release of lighttpd 1.4.x will not automatically load mod_authn_", module, "and lighttpd will fail to start up since your lighttpd.conf uses auth.backend = \"", module, "\"."); |
|
return; |
|
} |
|
} |
|
} |
|
} |
|
#endif |
|
|
|
#ifdef USE_OPENSSL_CRYPTO |
|
static void config_warn_openssl_module (server *srv) { |
|
for (size_t i = 0; i < srv->config_context->used; ++i) { |
|
const data_config *config = (data_config const*)srv->config_context->data[i]; |
|
for (size_t j = 0; j < config->value->used; ++j) { |
|
data_unset *du = config->value->data[j]; |
|
if (0 == strncmp(du->key->ptr, "ssl.", sizeof("ssl.")-1)) { |
|
/* mod_openssl should be loaded after mod_extforward */ |
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_openssl")); |
|
log_error_write(srv, __FILE__, __LINE__, "S", "Warning: please add \"mod_openssl\" to server.modules list in lighttpd.conf. A future release of lighttpd 1.4.x *will not* automatically load mod_openssl and lighttpd *will not* use SSL/TLS where your lighttpd.conf contains ssl.* directives"); |
|
return; |
|
} |
|
} |
|
} |
|
} |
|
#endif |
|
|
|
static int config_http_parseopts (server *srv, array *a) { |
|
unsigned short int opts = srv->srvconf.http_url_normalize; |
|
unsigned short int decode_2f = 1; |
|
int rc = 1; |
|
if (!array_is_kvstring(a)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"unexpected value for server.http-parseopts; " |
|
"expected list of \"key\" => \"[enable|disable]\""); |
|
return 0; |
|
} |
|
for (size_t i = 0; i < a->used; ++i) { |
|
const data_string * const ds = (data_string *)a->data[i]; |
|
unsigned short int opt; |
|
int val = 0; |
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("enable"))) |
|
val = 1; |
|
else if (buffer_is_equal_string(ds->value, CONST_STR_LEN("disable"))) |
|
val = 0; |
|
else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsbs", |
|
"unrecognized value for server.http-parseopts:", |
|
ds->key, "=>", ds->value, |
|
"(expect \"[enable|disable]\")"); |
|
rc = 0; |
|
} |
|
if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-normalize"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-normalize-unreserved"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-normalize-required"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_REQUIRED; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-ctrls-reject"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_CTRLS_REJECT; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-path-backslash-trans"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_BACKSLASH_TRANS; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-path-2f-decode"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-path-2f-reject"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-path-dotseg-remove"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-path-dotseg-reject"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("url-query-20-plus"))) |
|
opt = HTTP_PARSEOPT_URL_NORMALIZE_QUERY_20_PLUS; |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("header-strict"))) { |
|
srv->srvconf.http_header_strict = val; |
|
continue; |
|
} |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("host-strict"))) { |
|
srv->srvconf.http_host_strict = val; |
|
continue; |
|
} |
|
else if (buffer_is_equal_string(ds->key, CONST_STR_LEN("host-normalize"))) { |
|
srv->srvconf.http_host_normalize = val; |
|
continue; |
|
} |
|
else { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"unrecognized key for server.http-parseopts:", |
|
ds->key); |
|
rc = 0; |
|
continue; |
|
} |
|
if (val) |
|
opts |= opt; |
|
else { |
|
opts &= ~opt; |
|
if (opt == HTTP_PARSEOPT_URL_NORMALIZE) { |
|
opts = 0; |
|
break; |
|
} |
|
if (opt == HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE) { |
|
decode_2f = 0; |
|
} |
|
} |
|
} |
|
if (opts != 0) { |
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE; |
|
if ((opts & (HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE |
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT)) |
|
== (HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE |
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"conflicting options in server.http-parseopts:" |
|
"url-path-2f-decode, url-path-2f-reject"); |
|
rc = 0; |
|
} |
|
if ((opts & (HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE |
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT)) |
|
== (HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REMOVE |
|
|HTTP_PARSEOPT_URL_NORMALIZE_PATH_DOTSEG_REJECT)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"conflicting options in server.http-parseopts:" |
|
"url-path-dotseg-remove, url-path-dotseg-reject"); |
|
rc = 0; |
|
} |
|
if (!(opts & (HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED |
|
|HTTP_PARSEOPT_URL_NORMALIZE_REQUIRED))) { |
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE_UNRESERVED; |
|
if (decode_2f |
|
&& !(opts & HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_REJECT)) |
|
opts |= HTTP_PARSEOPT_URL_NORMALIZE_PATH_2F_DECODE; |
|
} |
|
} |
|
srv->srvconf.http_url_normalize = opts; |
|
return rc; |
|
} |
|
|
|
static int config_insert(server *srv) { |
|
size_t i; |
|
int ret = 0; |
|
buffer *stat_cache_string; |
|
array *http_parseopts; |
|
unsigned int chunk_sz = 0; |
|
|
|
config_values_t cv[] = { |
|
{ "server.bind", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 0 */ |
|
{ "server.errorlog", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 1 */ |
|
{ "server.errorfile-prefix", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 2 */ |
|
{ "server.chroot", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 3 */ |
|
{ "server.username", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 4 */ |
|
{ "server.groupname", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 5 */ |
|
{ "server.port", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_SERVER }, /* 6 */ |
|
{ "server.tag", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 7 */ |
|
{ "server.use-ipv6", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 8 */ |
|
{ "server.modules", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_SERVER }, /* 9 */ |
|
|
|
{ "server.event-handler", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 10 */ |
|
{ "server.pid-file", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 11 */ |
|
{ "server.max-request-size", NULL, T_CONFIG_INT, T_CONFIG_SCOPE_CONNECTION }, /* 12 */ |
|
{ "server.max-worker", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_SERVER }, /* 13 */ |
|
{ "server.document-root", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 14 */ |
|
{ "server.force-lowercase-filenames", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 15 */ |
|
{ "debug.log-condition-handling", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 16 */ |
|
{ "server.max-keep-alive-requests", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 17 */ |
|
{ "server.name", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 18 */ |
|
{ "server.max-keep-alive-idle", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 19 */ |
|
|
|
{ "server.max-read-idle", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 20 */ |
|
{ "server.max-write-idle", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 21 */ |
|
{ "server.error-handler", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 22 */ |
|
{ "server.max-fds", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_SERVER }, /* 23 */ |
|
#ifdef HAVE_LSTAT |
|
{ "server.follow-symlink", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 24 */ |
|
#else |
|
{ "server.follow-symlink", |
|
"Your system lacks lstat(). We can not differ symlinks from files." |
|
"Please remove server.follow-symlinks from your config.", |
|
T_CONFIG_UNSUPPORTED, T_CONFIG_SCOPE_UNSET }, |
|
#endif |
|
{ "server.kbytes-per-second", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 25 */ |
|
{ "connection.kbytes-per-second", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 26 */ |
|
{ "mimetype.use-xattr", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 27 */ |
|
{ "mimetype.assign", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_CONNECTION }, /* 28 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 29 */ |
|
|
|
{ "ssl.engine", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 30 */ |
|
{ "debug.log-file-not-found", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 31 */ |
|
{ "debug.log-request-handling", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 32 */ |
|
{ "debug.log-response-header", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 33 */ |
|
{ "debug.log-request-header", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 34 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 35 */ |
|
{ "server.protocol-http11", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 36 */ |
|
{ "debug.log-request-header-on-error", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 37 */ |
|
{ "debug.log-state-handling", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 38 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 39 */ |
|
|
|
{ "server.errorlog-use-syslog", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 40 */ |
|
{ "server.range-requests", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 41 */ |
|
{ "server.stat-cache-engine", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 42 */ |
|
{ "server.max-connections", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_SERVER }, /* 43 */ |
|
{ "server.network-backend", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 44 */ |
|
{ "server.upload-dirs", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_SERVER }, /* 45 */ |
|
{ "server.core-files", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 46 */ |
|
{ "server.compat-module-load", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 47 */ |
|
{ "server.chunkqueue-chunk-sz", NULL, T_CONFIG_INT, T_CONFIG_SCOPE_SERVER }, /* 48 */ |
|
{ "etag.use-inode", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 49 */ |
|
|
|
{ "etag.use-mtime", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 50 */ |
|
{ "etag.use-size", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 51 */ |
|
{ "server.reject-expect-100-with-417", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 52 */ |
|
{ "debug.log-timeouts", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 53 */ |
|
{ "server.defer-accept", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 54 */ |
|
{ "server.breakagelog", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 55 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 56 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 57 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 58 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 59 */ |
|
|
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 60 */ |
|
{ "server.set-v6only", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 61 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 62 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 63 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 64 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 65 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 66 */ |
|
{ "unused-slot-moved-to-mod-openssl", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 67 */ |
|
{ "server.upload-temp-file-size", NULL, T_CONFIG_INT, T_CONFIG_SCOPE_SERVER }, /* 68 */ |
|
{ "mimetype.xattr-name", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 69 */ |
|
{ "server.listen-backlog", NULL, T_CONFIG_INT, T_CONFIG_SCOPE_CONNECTION }, /* 70 */ |
|
{ "server.error-handler-404", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 71 */ |
|
{ "server.http-parseopt-header-strict",NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 72 */ |
|
{ "server.http-parseopt-host-strict", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 73 */ |
|
{ "server.http-parseopt-host-normalize",NULL,T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_SERVER }, /* 74 */ |
|
{ "server.bsd-accept-filter", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 75 */ |
|
{ "server.stream-request-body", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 76 */ |
|
{ "server.stream-response-body", NULL, T_CONFIG_SHORT, T_CONFIG_SCOPE_CONNECTION }, /* 77 */ |
|
{ "server.max-request-field-size", NULL, T_CONFIG_INT, T_CONFIG_SCOPE_SERVER }, /* 78 */ |
|
{ "server.error-intercept", NULL, T_CONFIG_BOOLEAN, T_CONFIG_SCOPE_CONNECTION }, /* 79 */ |
|
{ "server.syslog-facility", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_SERVER }, /* 80 */ |
|
{ "server.socket-perms", NULL, T_CONFIG_STRING, T_CONFIG_SCOPE_CONNECTION }, /* 81 */ |
|
{ "server.http-parseopts", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_SERVER }, /* 82 */ |
|
|
|
{ NULL, NULL, T_CONFIG_UNSET, T_CONFIG_SCOPE_UNSET } |
|
}; |
|
|
|
/* all T_CONFIG_SCOPE_SERVER options */ |
|
cv[0].destination = srv->srvconf.bindhost; |
|
cv[1].destination = srv->srvconf.errorlog_file; |
|
cv[3].destination = srv->srvconf.changeroot; |
|
cv[4].destination = srv->srvconf.username; |
|
cv[5].destination = srv->srvconf.groupname; |
|
cv[6].destination = &(srv->srvconf.port); |
|
cv[9].destination = srv->srvconf.modules; |
|
|
|
cv[10].destination = srv->srvconf.event_handler; |
|
cv[11].destination = srv->srvconf.pid_file; |
|
cv[13].destination = &(srv->srvconf.max_worker); |
|
|
|
cv[23].destination = &(srv->srvconf.max_fds); |
|
|
|
cv[37].destination = &(srv->srvconf.log_request_header_on_error); |
|
cv[38].destination = &(srv->srvconf.log_state_handling); |
|
|
|
cv[40].destination = &(srv->srvconf.errorlog_use_syslog); |
|
stat_cache_string = buffer_init(); |
|
cv[42].destination = stat_cache_string; |
|
cv[43].destination = &(srv->srvconf.max_conns); |
|
cv[44].destination = srv->srvconf.network_backend; |
|
cv[45].destination = srv->srvconf.upload_tempdirs; |
|
cv[46].destination = &(srv->srvconf.enable_cores); |
|
cv[47].destination = &(srv->srvconf.compat_module_load); |
|
cv[48].destination = &chunk_sz; |
|
|
|
cv[52].destination = &(srv->srvconf.reject_expect_100_with_417); |
|
cv[55].destination = srv->srvconf.breakagelog_file; |
|
|
|
cv[68].destination = &(srv->srvconf.upload_temp_file_size); |
|
cv[69].destination = srv->srvconf.xattr_name; |
|
cv[72].destination = &(srv->srvconf.http_header_strict); |
|
cv[73].destination = &(srv->srvconf.http_host_strict); |
|
cv[74].destination = &(srv->srvconf.http_host_normalize); |
|
cv[78].destination = &(srv->srvconf.max_request_field_size); |
|
cv[80].destination = srv->srvconf.syslog_facility; |
|
http_parseopts = array_init(); |
|
cv[82].destination = http_parseopts; |
|
|
|
srv->config_storage = calloc(1, srv->config_context->used * sizeof(specific_config *)); |
|
|
|
force_assert(srv->config_storage); |
|
force_assert(srv->config_context->used); /* static analysis hint for ccc |
|
-analyzer */ |
|
|
|
for (i = 0; i < srv->config_context->used; i++) { |
|
data_config * const config = (data_config *)srv->config_context->data[i]; |
|
specific_config *s; |
|
|
|
s = calloc(1, sizeof(specific_config)); |
|
force_assert(s); |
|
s->document_root = buffer_init(); |
|
s->mimetypes = array_init(); |
|
s->server_name = buffer_init(); |
|
s->error_handler = buffer_init(); |
|
s->error_handler_404 = buffer_init(); |
|
s->server_tag = buffer_init(); |
|
s->errorfile_prefix = buffer_init(); |
|
#if defined(__FreeBSD__) || defined(__NetBSD__) \ |
|
|| defined(__OpenBSD__) || defined(__DragonFly__) |
|
s->bsd_accept_filter = (i == 0) |
|
? buffer_init() |
|
: buffer_init_buffer(srv->config_storage[0]->bsd_accept_filter); |
|
#endif |
|
s->socket_perms = (i == 0 || buffer_string_is_empty(srv->config_storage[0]->socket_perms)) |
|
? buffer_init() |
|
: buffer_init_buffer(srv->config_storage[0]->socket_perms); |
|
s->max_keep_alive_requests = 100; |
|
s->max_keep_alive_idle = 5; |
|
s->max_read_idle = 60; |
|
s->max_write_idle = 360; |
|
s->max_request_size = 0; |
|
s->use_xattr = 0; |
|
s->ssl_enabled = 0; |
|
s->use_ipv6 = (i == 0) ? 0 : srv->config_storage[0]->use_ipv6; |
|
s->set_v6only = (i == 0) ? 1 : srv->config_storage[0]->set_v6only; |
|
s->defer_accept = (i == 0) ? 0 : srv->config_storage[0]->defer_accept; |
|
#ifdef HAVE_LSTAT |
|
s->follow_symlink = 1; |
|
#endif |
|
s->kbytes_per_second = 0; |
|
s->allow_http11 = 1; |
|
s->etag_use_inode = 1; |
|
s->etag_use_mtime = 1; |
|
s->etag_use_size = 1; |
|
s->range_requests = 1; |
|
s->force_lowercase_filenames = (i == 0) ? 2 : 0; /* we wan't to detect later if user changed this for global section */ |
|
s->global_kbytes_per_second = 0; |
|
s->global_bytes_per_second_cnt = 0; |
|
s->global_bytes_per_second_cnt_ptr = &s->global_bytes_per_second_cnt; |
|
s->listen_backlog = (0 == i ? 1024 : srv->config_storage[0]->listen_backlog); |
|
s->stream_request_body = 0; |
|
s->stream_response_body = 0; |
|
s->error_intercept = 0; |
|
|
|
/* all T_CONFIG_SCOPE_CONNECTION options */ |
|
cv[2].destination = s->errorfile_prefix; |
|
cv[7].destination = s->server_tag; |
|
cv[8].destination = &(s->use_ipv6); |
|
|
|
cv[12].destination = &(s->max_request_size); |
|
cv[14].destination = s->document_root; |
|
cv[15].destination = &(s->force_lowercase_filenames); |
|
cv[16].destination = &(s->log_condition_handling); |
|
cv[17].destination = &(s->max_keep_alive_requests); |
|
cv[18].destination = s->server_name; |
|
cv[19].destination = &(s->max_keep_alive_idle); |
|
|
|
cv[20].destination = &(s->max_read_idle); |
|
cv[21].destination = &(s->max_write_idle); |
|
cv[22].destination = s->error_handler; |
|
#ifdef HAVE_LSTAT |
|
cv[24].destination = &(s->follow_symlink); |
|
#endif |
|
cv[25].destination = &(s->global_kbytes_per_second); |
|
cv[26].destination = &(s->kbytes_per_second); |
|
cv[27].destination = &(s->use_xattr); |
|
cv[28].destination = s->mimetypes; |
|
/*cv[29].destination = s->unused;*/ |
|
|
|
cv[30].destination = &(s->ssl_enabled); |
|
cv[31].destination = &(s->log_file_not_found); |
|
cv[32].destination = &(s->log_request_handling); |
|
cv[33].destination = &(s->log_response_header); |
|
cv[34].destination = &(s->log_request_header); |
|
/*cv[35].destination = &(s->unused);*/ |
|
cv[36].destination = &(s->allow_http11); |
|
/*cv[39].destination = s->unused;*/ |
|
|
|
cv[41].destination = &(s->range_requests); |
|
/*cv[47].destination = s->unused;*/ |
|
/*cv[48].destination = &(s->unused);*/ |
|
cv[49].destination = &(s->etag_use_inode); |
|
|
|
cv[50].destination = &(s->etag_use_mtime); |
|
cv[51].destination = &(s->etag_use_size); |
|
cv[53].destination = &(s->log_timeouts); |
|
cv[54].destination = &(s->defer_accept); |
|
/*cv[56].destination = &(s->unused);*/ |
|
/*cv[57].destination = &(s->unused);*/ |
|
/*cv[58].destination = &(s->unused);*/ |
|
/*cv[59].destination = s->unused;*/ |
|
|
|
/*cv[60].destination = &(s->unused);*/ |
|
cv[61].destination = &(s->set_v6only); |
|
/*cv[62].destination = &(s->unused);*/ |
|
/*cv[63].destination = s->unused;*/ |
|
/*cv[64].destination = s->unused;*/ |
|
/*cv[65].destination = &(s->unused);*/ |
|
/*cv[66].destination = &(s->unused);*/ |
|
/*cv[67].destination = &(s->unused);*/ |
|
cv[70].destination = &(s->listen_backlog); |
|
cv[71].destination = s->error_handler_404; |
|
#if defined(__FreeBSD__) || defined(__NetBSD__) \ |
|
|| defined(__OpenBSD__) || defined(__DragonFly__) |
|
cv[75].destination = s->bsd_accept_filter; |
|
#endif |
|
cv[76].destination = &(s->stream_request_body); |
|
cv[77].destination = &(s->stream_response_body); |
|
cv[79].destination = &(s->error_intercept); |
|
cv[81].destination = s->socket_perms; |
|
|
|
srv->config_storage[i] = s; |
|
|
|
if (0 != (ret = config_insert_values_global(srv, config->value, cv, i == 0 ? T_CONFIG_SCOPE_SERVER : T_CONFIG_SCOPE_CONNECTION))) { |
|
break; |
|
} |
|
|
|
if (s->stream_request_body & FDEVENT_STREAM_REQUEST_BUFMIN) { |
|
s->stream_request_body |= FDEVENT_STREAM_REQUEST; |
|
} |
|
if (s->stream_response_body & FDEVENT_STREAM_RESPONSE_BUFMIN) { |
|
s->stream_response_body |= FDEVENT_STREAM_RESPONSE; |
|
} |
|
|
|
if (!array_is_kvstring(s->mimetypes)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"unexpected value for mimetype.assign; expected list of \"ext\" => \"mimetype\""); |
|
} |
|
|
|
if (!buffer_string_is_empty(s->server_tag)) { |
|
for (char *t = strchr(s->server_tag->ptr,'\n'); NULL != t; t = strchr(t+2,'\n')) { |
|
/* not expecting admin to define multi-line server.tag, |
|
* but ensure server_tag has proper header continuation, |
|
* if needed */ |
|
off_t off = t - s->server_tag->ptr; |
|
size_t len; |
|
if (t[1] == ' ' || t[1] == '\t') continue; |
|
len = buffer_string_length(s->server_tag); |
|
buffer_string_prepare_append(s->server_tag, 1); |
|
t = s->server_tag->ptr+off; |
|
memmove(t+2, t+1, len - off - 1); |
|
t[1] = ' '; |
|
buffer_commit(s->server_tag, 1); |
|
} |
|
} |
|
|
|
if (0 == i) { |
|
if (!config_http_parseopts(srv, http_parseopts)) { |
|
ret = HANDLER_ERROR; |
|
break; |
|
} |
|
} |
|
|
|
if (srv->srvconf.http_url_normalize |
|
&& COMP_HTTP_QUERY_STRING == config->comp) { |
|
switch(config->cond) { |
|
case CONFIG_COND_NE: |
|
case CONFIG_COND_EQ: |
|
/* (can use this routine as long as it does not perform |
|
* any regex-specific normalization of first arg) */ |
|
pcre_keyvalue_burl_normalize_key(config->string, srv->tmp_buf); |
|
break; |
|
case CONFIG_COND_NOMATCH: |
|
case CONFIG_COND_MATCH: |
|
pcre_keyvalue_burl_normalize_key(config->string, srv->tmp_buf); |
|
if (!data_config_pcre_compile(config)) { |
|
ret = HANDLER_ERROR; |
|
} |
|
break; |
|
default: |
|
break; |
|
} |
|
if (HANDLER_ERROR == ret) break; |
|
} |
|
|
|
#ifndef USE_OPENSSL_CRYPTO |
|
if (s->ssl_enabled) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"ssl support is missing, recompile with e.g. --with-openssl"); |
|
ret = HANDLER_ERROR; |
|
break; |
|
} |
|
#endif |
|
} |
|
array_free(http_parseopts); |
|
|
|
{ |
|
specific_config *s = srv->config_storage[0]; |
|
s->http_parseopts= /*(global, but stored in con->conf.http_parseopts)*/ |
|
(srv->srvconf.http_header_strict ?(HTTP_PARSEOPT_HEADER_STRICT) :0) |
|
|(srv->srvconf.http_host_strict ?(HTTP_PARSEOPT_HOST_STRICT |
|
|HTTP_PARSEOPT_HOST_NORMALIZE):0) |
|
|(srv->srvconf.http_host_normalize ?(HTTP_PARSEOPT_HOST_NORMALIZE):0); |
|
s->http_parseopts |= srv->srvconf.http_url_normalize; |
|
|
|
if (s->log_request_handling || s->log_request_header) |
|
srv->srvconf.log_request_header_on_error = 1; |
|
} |
|
|
|
if (0 != chunk_sz) { |
|
chunkqueue_set_chunk_size(chunk_sz); |
|
} |
|
|
|
if (0 != stat_cache_choose_engine(srv, stat_cache_string)) { |
|
ret = HANDLER_ERROR; |
|
} |
|
buffer_free(stat_cache_string); |
|
|
|
if (!array_is_vlist(srv->srvconf.upload_tempdirs)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"unexpected value for server.upload-dirs; expected list of \"path\" strings"); |
|
ret = HANDLER_ERROR; |
|
} |
|
|
|
if (!array_is_vlist(srv->srvconf.modules)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"unexpected value for server.modules; expected list of \"mod_xxxxxx\" strings"); |
|
ret = HANDLER_ERROR; |
|
} else if (srv->srvconf.compat_module_load) { |
|
data_string *ds; |
|
int prepend_mod_indexfile = 1; |
|
int append_mod_dirlisting = 1; |
|
int append_mod_staticfile = 1; |
|
int append_mod_authn_file = 1; |
|
int append_mod_authn_ldap = 1; |
|
int append_mod_authn_mysql = 1; |
|
int append_mod_openssl = 1; |
|
int contains_mod_auth = 0; |
|
|
|
/* prepend default modules */ |
|
for (i = 0; i < srv->srvconf.modules->used; i++) { |
|
ds = (data_string *)srv->srvconf.modules->data[i]; |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_indexfile"))) { |
|
prepend_mod_indexfile = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_staticfile"))) { |
|
append_mod_staticfile = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_dirlisting"))) { |
|
append_mod_dirlisting = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_openssl"))) { |
|
append_mod_openssl = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_authn_file"))) { |
|
append_mod_authn_file = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_authn_ldap"))) { |
|
append_mod_authn_ldap = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_authn_mysql"))) { |
|
append_mod_authn_mysql = 0; |
|
} |
|
|
|
if (buffer_is_equal_string(ds->value, CONST_STR_LEN("mod_auth"))) { |
|
contains_mod_auth = 1; |
|
} |
|
|
|
if (0 == prepend_mod_indexfile && |
|
0 == append_mod_dirlisting && |
|
0 == append_mod_staticfile && |
|
0 == append_mod_openssl && |
|
0 == append_mod_authn_file && |
|
0 == append_mod_authn_ldap && |
|
0 == append_mod_authn_mysql && |
|
1 == contains_mod_auth) { |
|
break; |
|
} |
|
} |
|
|
|
if (prepend_mod_indexfile) { |
|
/* mod_indexfile has to be loaded before mod_fastcgi and friends */ |
|
array *modules = array_init(); |
|
array_insert_value(modules, CONST_STR_LEN("mod_indexfile")); |
|
|
|
for (i = 0; i < srv->srvconf.modules->used; i++) { |
|
ds = (data_string *)srv->srvconf.modules->data[i]; |
|
array_insert_value(modules, CONST_BUF_LEN(ds->value)); |
|
} |
|
|
|
array_free(srv->srvconf.modules); |
|
srv->srvconf.modules = modules; |
|
} |
|
|
|
/* append default modules */ |
|
if (append_mod_dirlisting) { |
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_dirlisting")); |
|
} |
|
|
|
if (append_mod_staticfile) { |
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_staticfile")); |
|
} |
|
|
|
if (append_mod_openssl) { |
|
#ifdef USE_OPENSSL_CRYPTO |
|
config_warn_openssl_module(srv); |
|
#endif |
|
} |
|
|
|
/* mod_auth.c,http_auth.c auth backends were split into separate modules |
|
* Automatically load auth backend modules for compatibility with |
|
* existing lighttpd 1.4.x configs */ |
|
if (contains_mod_auth) { |
|
if (append_mod_authn_file) { |
|
array_insert_value(srv->srvconf.modules, CONST_STR_LEN("mod_authn_file")); |
|
} |
|
if (append_mod_authn_ldap) { |
|
#if defined(HAVE_LDAP_H) && defined(HAVE_LBER_H) && defined(HAVE_LIBLDAP) && defined(HAVE_LIBLBER) |
|
config_warn_authn_module(srv, CONST_STR_LEN("ldap")); |
|
#endif |
|
} |
|
if (append_mod_authn_mysql) { |
|
#if defined(HAVE_MYSQL) |
|
config_warn_authn_module(srv, CONST_STR_LEN("mysql")); |
|
#endif |
|
} |
|
} |
|
} |
|
|
|
return ret; |
|
|
|
} |
|
|
|
|
|
#define PATCH(x) con->conf.x = s->x |
|
int config_setup_connection(server *srv, connection *con) { |
|
specific_config *s = srv->config_storage[0]; |
|
|
|
PATCH(http_parseopts); |
|
|
|
PATCH(allow_http11); |
|
PATCH(mimetypes); |
|
PATCH(document_root); |
|
PATCH(high_precision_timestamps); |
|
PATCH(max_keep_alive_requests); |
|
PATCH(max_keep_alive_idle); |
|
PATCH(max_read_idle); |
|
PATCH(max_write_idle); |
|
PATCH(max_request_size); |
|
PATCH(use_xattr); |
|
PATCH(error_handler); |
|
PATCH(error_handler_404); |
|
PATCH(error_intercept); |
|
PATCH(errorfile_prefix); |
|
#ifdef HAVE_LSTAT |
|
PATCH(follow_symlink); |
|
#endif |
|
PATCH(server_tag); |
|
PATCH(kbytes_per_second); |
|
PATCH(global_kbytes_per_second); |
|
PATCH(global_bytes_per_second_cnt); |
|
|
|
con->conf.global_bytes_per_second_cnt_ptr = &s->global_bytes_per_second_cnt; |
|
buffer_copy_buffer(con->server_name, s->server_name); |
|
|
|
PATCH(log_request_header); |
|
PATCH(log_response_header); |
|
PATCH(log_request_handling); |
|
PATCH(log_condition_handling); |
|
PATCH(log_file_not_found); |
|
PATCH(log_timeouts); |
|
|
|
PATCH(range_requests); |
|
PATCH(force_lowercase_filenames); |
|
/*PATCH(listen_backlog);*//*(not necessary; used only at startup)*/ |
|
PATCH(stream_request_body); |
|
PATCH(stream_response_body); |
|
PATCH(socket_perms); |
|
|
|
PATCH(etag_use_inode); |
|
PATCH(etag_use_mtime); |
|
PATCH(etag_use_size); |
|
|
|
return 0; |
|
} |
|
|
|
int config_patch_connection(server *srv, connection *con) { |
|
size_t i, j; |
|
|
|
/* skip the first, the global context */ |
|
for (i = 1; i < srv->config_context->used; i++) { |
|
data_config *dc = (data_config *)srv->config_context->data[i]; |
|
specific_config *s = srv->config_storage[i]; |
|
|
|
/* condition didn't match */ |
|
if (!config_check_cond(srv, con, dc)) continue; |
|
|
|
/* merge config */ |
|
for (j = 0; j < dc->value->used; j++) { |
|
data_unset *du = dc->value->data[j]; |
|
|
|
if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.document-root"))) { |
|
PATCH(document_root); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.range-requests"))) { |
|
PATCH(range_requests); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.error-handler"))) { |
|
PATCH(error_handler); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.error-handler-404"))) { |
|
PATCH(error_handler_404); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.error-intercept"))) { |
|
PATCH(error_intercept); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.errorfile-prefix"))) { |
|
PATCH(errorfile_prefix); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("mimetype.assign"))) { |
|
PATCH(mimetypes); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.max-keep-alive-requests"))) { |
|
PATCH(max_keep_alive_requests); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.max-keep-alive-idle"))) { |
|
PATCH(max_keep_alive_idle); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.max-write-idle"))) { |
|
PATCH(max_write_idle); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.max-read-idle"))) { |
|
PATCH(max_read_idle); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.max-request-size"))) { |
|
PATCH(max_request_size); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("mimetype.use-xattr"))) { |
|
PATCH(use_xattr); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("etag.use-inode"))) { |
|
PATCH(etag_use_inode); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("etag.use-mtime"))) { |
|
PATCH(etag_use_mtime); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("etag.use-size"))) { |
|
PATCH(etag_use_size); |
|
#ifdef HAVE_LSTAT |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.follow-symlink"))) { |
|
PATCH(follow_symlink); |
|
#endif |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.name"))) { |
|
buffer_copy_buffer(con->server_name, s->server_name); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.tag"))) { |
|
PATCH(server_tag); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.stream-request-body"))) { |
|
PATCH(stream_request_body); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.stream-response-body"))) { |
|
PATCH(stream_response_body); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("connection.kbytes-per-second"))) { |
|
PATCH(kbytes_per_second); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-request-handling"))) { |
|
PATCH(log_request_handling); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-request-header"))) { |
|
PATCH(log_request_header); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-response-header"))) { |
|
PATCH(log_response_header); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-condition-handling"))) { |
|
PATCH(log_condition_handling); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-file-not-found"))) { |
|
PATCH(log_file_not_found); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("debug.log-timeouts"))) { |
|
PATCH(log_timeouts); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.protocol-http11"))) { |
|
PATCH(allow_http11); |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.force-lowercase-filenames"))) { |
|
PATCH(force_lowercase_filenames); |
|
#if 0 /*(not necessary; used only at startup)*/ |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.listen-backlog"))) { |
|
PATCH(listen_backlog); |
|
#endif |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.kbytes-per-second"))) { |
|
PATCH(global_kbytes_per_second); |
|
PATCH(global_bytes_per_second_cnt); |
|
con->conf.global_bytes_per_second_cnt_ptr = &s->global_bytes_per_second_cnt; |
|
} else if (buffer_is_equal_string(du->key, CONST_STR_LEN("server.socket-perms"))) { |
|
PATCH(socket_perms); |
|
} |
|
} |
|
} |
|
|
|
con->etag_flags = (con->conf.etag_use_mtime ? ETAG_USE_MTIME : 0) | |
|
(con->conf.etag_use_inode ? ETAG_USE_INODE : 0) | |
|
(con->conf.etag_use_size ? ETAG_USE_SIZE : 0); |
|
|
|
return 0; |
|
} |
|
#undef PATCH |
|
|
|
typedef struct { |
|
int foo; |
|
int bar; |
|
|
|
const buffer *source; |
|
const char *input; |
|
size_t offset; |
|
size_t size; |
|
|
|
int line_pos; |
|
int line; |
|
|
|
int in_key; |
|
int in_brace; |
|
int in_cond; |
|
} tokenizer_t; |
|
|
|
#if 0 |
|
static int tokenizer_open(server *srv, tokenizer_t *t, buffer *basedir, const char *fn) { |
|
if (buffer_string_is_empty(basedir) || |
|
(fn[0] == '/' || fn[0] == '\\') || |
|
(fn[0] == '.' && (fn[1] == '/' || fn[1] == '\\'))) { |
|
t->file = buffer_init_string(fn); |
|
} else { |
|
t->file = buffer_init_buffer(basedir); |
|
buffer_append_string(t->file, fn); |
|
} |
|
|
|
if (0 != stream_open(&(t->s), t->file)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sbss", |
|
"opening configfile ", t->file, "failed:", strerror(errno)); |
|
buffer_free(t->file); |
|
return -1; |
|
} |
|
|
|
t->input = t->s.start; |
|
t->offset = 0; |
|
t->size = t->s.size; |
|
t->line = 1; |
|
t->line_pos = 1; |
|
|
|
t->in_key = 1; |
|
t->in_brace = 0; |
|
t->in_cond = 0; |
|
return 0; |
|
} |
|
|
|
static int tokenizer_close(server *srv, tokenizer_t *t) { |
|
UNUSED(srv); |
|
|
|
buffer_free(t->file); |
|
return stream_close(&(t->s)); |
|
} |
|
#endif |
|
static int config_skip_newline(tokenizer_t *t) { |
|
int skipped = 1; |
|
force_assert(t->input[t->offset] == '\r' || t->input[t->offset] == '\n'); |
|
if (t->input[t->offset] == '\r' && t->input[t->offset + 1] == '\n') { |
|
skipped ++; |
|
t->offset ++; |
|
} |
|
t->offset ++; |
|
return skipped; |
|
} |
|
|
|
static int config_skip_comment(tokenizer_t *t) { |
|
int i; |
|
force_assert(t->input[t->offset] == '#'); |
|
for (i = 1; t->input[t->offset + i] && |
|
(t->input[t->offset + i] != '\n' && t->input[t->offset + i] != '\r'); |
|
i++); |
|
t->offset += i; |
|
return i; |
|
} |
|
|
|
static int config_tokenizer(server *srv, tokenizer_t *t, int *token_id, buffer *token) { |
|
int tid = 0; |
|
size_t i; |
|
|
|
for (tid = 0; tid == 0 && t->offset < t->size && t->input[t->offset] ; ) { |
|
char c = t->input[t->offset]; |
|
const char *start = NULL; |
|
|
|
switch (c) { |
|
case '=': |
|
if (t->in_brace) { |
|
if (t->input[t->offset + 1] == '>') { |
|
t->offset += 2; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("=>")); |
|
|
|
tid = TK_ARRAY_ASSIGN; |
|
} else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"use => for assignments in arrays"); |
|
return -1; |
|
} |
|
} else if (t->in_cond) { |
|
if (t->input[t->offset + 1] == '=') { |
|
t->offset += 2; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("==")); |
|
|
|
tid = TK_EQ; |
|
} else if (t->input[t->offset + 1] == '~') { |
|
t->offset += 2; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("=~")); |
|
|
|
tid = TK_MATCH; |
|
} else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"only =~ and == are allowed in the condition"); |
|
return -1; |
|
} |
|
t->in_key = 1; |
|
t->in_cond = 0; |
|
} else if (t->in_key) { |
|
tid = TK_ASSIGN; |
|
|
|
buffer_copy_string_len(token, t->input + t->offset, 1); |
|
|
|
t->offset++; |
|
t->line_pos++; |
|
} else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"unexpected equal-sign: ="); |
|
return -1; |
|
} |
|
|
|
break; |
|
case '!': |
|
if (t->in_cond) { |
|
if (t->input[t->offset + 1] == '=') { |
|
t->offset += 2; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("!=")); |
|
|
|
tid = TK_NE; |
|
} else if (t->input[t->offset + 1] == '~') { |
|
t->offset += 2; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("!~")); |
|
|
|
tid = TK_NOMATCH; |
|
} else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"only !~ and != are allowed in the condition"); |
|
return -1; |
|
} |
|
t->in_key = 1; |
|
t->in_cond = 0; |
|
} else { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"unexpected exclamation-marks: !"); |
|
return -1; |
|
} |
|
|
|
break; |
|
case '\t': |
|
case ' ': |
|
t->offset++; |
|
t->line_pos++; |
|
break; |
|
case '\n': |
|
case '\r': |
|
if (t->in_brace == 0) { |
|
int done = 0; |
|
while (!done && t->offset < t->size) { |
|
switch (t->input[t->offset]) { |
|
case '\r': |
|
case '\n': |
|
config_skip_newline(t); |
|
t->line_pos = 1; |
|
t->line++; |
|
break; |
|
|
|
case '#': |
|
t->line_pos += config_skip_comment(t); |
|
break; |
|
|
|
case '\t': |
|
case ' ': |
|
t->offset++; |
|
t->line_pos++; |
|
break; |
|
|
|
default: |
|
done = 1; |
|
} |
|
} |
|
t->in_key = 1; |
|
tid = TK_EOL; |
|
buffer_copy_string_len(token, CONST_STR_LEN("(EOL)")); |
|
} else { |
|
config_skip_newline(t); |
|
t->line_pos = 1; |
|
t->line++; |
|
} |
|
break; |
|
case ',': |
|
if (t->in_brace > 0) { |
|
tid = TK_COMMA; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("(COMMA)")); |
|
} |
|
|
|
t->offset++; |
|
t->line_pos++; |
|
break; |
|
case '"': |
|
/* search for the terminating " */ |
|
start = t->input + t->offset + 1; |
|
buffer_copy_string_len(token, CONST_STR_LEN("")); |
|
|
|
for (i = 1; t->input[t->offset + i]; i++) { |
|
if (t->input[t->offset + i] == '\\' && |
|
t->input[t->offset + i + 1] == '"') { |
|
|
|
buffer_append_string_len(token, start, t->input + t->offset + i - start); |
|
|
|
start = t->input + t->offset + i + 1; |
|
|
|
/* skip the " */ |
|
i++; |
|
continue; |
|
} |
|
|
|
|
|
if (t->input[t->offset + i] == '"') { |
|
tid = TK_STRING; |
|
|
|
buffer_append_string_len(token, start, t->input + t->offset + i - start); |
|
|
|
break; |
|
} |
|
} |
|
|
|
if (t->input[t->offset + i] == '\0') { |
|
/* ERROR */ |
|
|
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"missing closing quote"); |
|
|
|
return -1; |
|
} |
|
|
|
t->offset += i + 1; |
|
t->line_pos += i + 1; |
|
|
|
break; |
|
case '(': |
|
t->offset++; |
|
t->in_brace++; |
|
|
|
tid = TK_LPARAN; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("(")); |
|
break; |
|
case ')': |
|
t->offset++; |
|
t->in_brace--; |
|
|
|
tid = TK_RPARAN; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN(")")); |
|
break; |
|
case '$': |
|
t->offset++; |
|
|
|
tid = TK_DOLLAR; |
|
t->in_cond = 1; |
|
t->in_key = 0; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("$")); |
|
|
|
break; |
|
|
|
case '+': |
|
if (t->input[t->offset + 1] == '=') { |
|
t->offset += 2; |
|
buffer_copy_string_len(token, CONST_STR_LEN("+=")); |
|
tid = TK_APPEND; |
|
} else { |
|
t->offset++; |
|
tid = TK_PLUS; |
|
buffer_copy_string_len(token, CONST_STR_LEN("+")); |
|
} |
|
break; |
|
|
|
case ':': |
|
if (t->input[t->offset+1] == '=') { |
|
t->offset += 2; |
|
tid = TK_FORCE_ASSIGN; |
|
buffer_copy_string_len(token, CONST_STR_LEN(":=")); |
|
} |
|
break; |
|
|
|
case '{': |
|
t->offset++; |
|
|
|
tid = TK_LCURLY; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("{")); |
|
|
|
break; |
|
|
|
case '}': |
|
t->offset++; |
|
|
|
tid = TK_RCURLY; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("}")); |
|
|
|
break; |
|
|
|
case '[': |
|
t->offset++; |
|
|
|
tid = TK_LBRACKET; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("[")); |
|
|
|
break; |
|
|
|
case ']': |
|
t->offset++; |
|
|
|
tid = TK_RBRACKET; |
|
|
|
buffer_copy_string_len(token, CONST_STR_LEN("]")); |
|
|
|
break; |
|
case '#': |
|
t->line_pos += config_skip_comment(t); |
|
|
|
break; |
|
default: |
|
if (t->in_cond) { |
|
for (i = 0; t->input[t->offset + i] && |
|
(isalpha((unsigned char)t->input[t->offset + i]) |
|
|| t->input[t->offset + i] == '_'); ++i); |
|
|
|
if (i && t->input[t->offset + i]) { |
|
tid = TK_SRVVARNAME; |
|
buffer_copy_string_len(token, t->input + t->offset, i); |
|
|
|
t->offset += i; |
|
t->line_pos += i; |
|
} else { |
|
/* ERROR */ |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"invalid character in condition"); |
|
return -1; |
|
} |
|
} else if (isdigit((unsigned char)c)) { |
|
/* take all digits */ |
|
for (i = 0; t->input[t->offset + i] && isdigit((unsigned char)t->input[t->offset + i]); i++); |
|
|
|
/* was there it least a digit ? */ |
|
if (i) { |
|
tid = TK_INTEGER; |
|
|
|
buffer_copy_string_len(token, t->input + t->offset, i); |
|
|
|
t->offset += i; |
|
t->line_pos += i; |
|
} |
|
} else { |
|
/* the key might consist of [-.0-9a-z] */ |
|
for (i = 0; t->input[t->offset + i] && |
|
(isalnum((unsigned char)t->input[t->offset + i]) || |
|
t->input[t->offset + i] == '.' || |
|
t->input[t->offset + i] == '_' || /* for env.* */ |
|
t->input[t->offset + i] == '-' |
|
); i++); |
|
|
|
if (i && t->input[t->offset + i]) { |
|
buffer_copy_string_len(token, t->input + t->offset, i); |
|
|
|
if (strcmp(token->ptr, "include") == 0) { |
|
tid = TK_INCLUDE; |
|
} else if (strcmp(token->ptr, "include_shell") == 0) { |
|
tid = TK_INCLUDE_SHELL; |
|
} else if (strcmp(token->ptr, "global") == 0) { |
|
tid = TK_GLOBAL; |
|
} else if (strcmp(token->ptr, "else") == 0) { |
|
tid = TK_ELSE; |
|
} else { |
|
tid = TK_LKEY; |
|
} |
|
|
|
t->offset += i; |
|
t->line_pos += i; |
|
} else { |
|
/* ERROR */ |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsds", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"invalid character in variable name"); |
|
return -1; |
|
} |
|
} |
|
break; |
|
} |
|
} |
|
|
|
if (tid) { |
|
*token_id = tid; |
|
#if 0 |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsdbdd", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
token, token->used - 1, tid); |
|
#endif |
|
|
|
return 1; |
|
} else if (t->offset < t->size) { |
|
log_error_write(srv, __FILE__, __LINE__, "Dsb", tid, ",", token); |
|
} |
|
return 0; |
|
} |
|
|
|
static int config_parse(server *srv, config_t *context, tokenizer_t *t) { |
|
void *pParser; |
|
int token_id; |
|
buffer *token, *lasttoken; |
|
int ret; |
|
|
|
pParser = configparserAlloc( malloc ); |
|
force_assert(pParser); |
|
lasttoken = buffer_init(); |
|
token = buffer_init(); |
|
while((1 == (ret = config_tokenizer(srv, t, &token_id, token))) && context->ok) { |
|
buffer_copy_buffer(lasttoken, token); |
|
configparser(pParser, token_id, token, context); |
|
|
|
token = buffer_init(); |
|
} |
|
buffer_free(token); |
|
|
|
if (ret != -1 && context->ok) { |
|
/* add an EOL at EOF, better than say sorry */ |
|
configparser(pParser, TK_EOL, buffer_init_string("(EOL)"), context); |
|
if (context->ok) { |
|
configparser(pParser, 0, NULL, context); |
|
} |
|
} |
|
configparserFree(pParser, free); |
|
|
|
if (ret == -1) { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"configfile parser failed at:", lasttoken); |
|
} else if (context->ok == 0) { |
|
log_error_write(srv, __FILE__, __LINE__, "sbsdsdsb", |
|
"source:", t->source, |
|
"line:", t->line, "pos:", t->line_pos, |
|
"parser failed somehow near here:", lasttoken); |
|
ret = -1; |
|
} |
|
buffer_free(lasttoken); |
|
|
|
return ret == -1 ? -1 : 0; |
|
} |
|
|
|
static int tokenizer_init(tokenizer_t *t, const buffer *source, const char *input, size_t size) { |
|
|
|
t->source = source; |
|
t->input = input; |
|
t->size = size; |
|
t->offset = 0; |
|
t->line = 1; |
|
t->line_pos = 1; |
|
|
|
t->in_key = 1; |
|
t->in_brace = 0; |
|
t->in_cond = 0; |
|
return 0; |
|
} |
|
|
|
static int config_parse_file_stream(server *srv, config_t *context, const buffer *filename) { |
|
tokenizer_t t; |
|
stream s; |
|
int ret; |
|
|
|
if (0 != stream_open(&s, filename)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sbss", |
|
"opening configfile ", filename, "failed:", strerror(errno)); |
|
return -1; |
|
} else { |
|
tokenizer_init(&t, filename, s.start, s.size); |
|
ret = config_parse(srv, context, &t); |
|
} |
|
|
|
stream_close(&s); |
|
return ret; |
|
} |
|
|
|
int config_parse_file(server *srv, config_t *context, const char *fn) { |
|
buffer *filename; |
|
size_t i; |
|
int ret = -1; |
|
#ifdef GLOB_BRACE |
|
int flags = GLOB_BRACE; |
|
#else |
|
int flags = 0; |
|
#endif |
|
glob_t gl; |
|
|
|
if ((fn[0] == '/' || fn[0] == '\\') || |
|
(fn[0] == '.' && (fn[1] == '/' || fn[1] == '\\')) || |
|
(fn[0] == '.' && fn[1] == '.' && (fn[2] == '/' || fn[2] == '\\'))) { |
|
filename = buffer_init_string(fn); |
|
} else { |
|
filename = buffer_init_buffer(context->basedir); |
|
buffer_append_string(filename, fn); |
|
} |
|
|
|
switch (glob(filename->ptr, flags, NULL, &gl)) { |
|
case 0: |
|
for (i = 0; i < gl.gl_pathc; ++i) { |
|
buffer_copy_string(filename, gl.gl_pathv[i]); |
|
ret = config_parse_file_stream(srv, context, filename); |
|
if (0 != ret) break; |
|
} |
|
globfree(&gl); |
|
break; |
|
case GLOB_NOMATCH: |
|
if (filename->ptr[strcspn(filename->ptr, "*?[]{}")] != '\0') { /*(contains glob metachars)*/ |
|
ret = 0; /* not an error if no files match glob pattern */ |
|
} |
|
else { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", "include file not found: ", filename); |
|
} |
|
break; |
|
case GLOB_ABORTED: |
|
case GLOB_NOSPACE: |
|
log_error_write(srv, __FILE__, __LINE__, "sbss", "glob()", filename, "failed:", strerror(errno)); |
|
break; |
|
} |
|
|
|
buffer_free(filename); |
|
return ret; |
|
} |
|
|
|
#ifdef __CYGWIN__ |
|
|
|
static char* getCWD(char *buf, size_t sz) { |
|
if (NULL == getcwd(buf, sz)) { |
|
return NULL; |
|
} |
|
for (size_t i = 0; buf[i]; ++i) { |
|
if (buf[i] == '\\') buf[i] = '/'; |
|
} |
|
return buf; |
|
} |
|
|
|
#define getcwd(buf, sz) getCWD((buf),(sz)) |
|
|
|
#endif /* __CYGWIN__ */ |
|
|
|
int config_parse_cmd(server *srv, config_t *context, const char *cmd) { |
|
int ret = 0; |
|
int fds[2]; |
|
char oldpwd[PATH_MAX]; |
|
|
|
if (NULL == getcwd(oldpwd, sizeof(oldpwd))) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"cannot get cwd", strerror(errno)); |
|
return -1; |
|
} |
|
|
|
if (!buffer_string_is_empty(context->basedir)) { |
|
if (0 != chdir(context->basedir->ptr)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sbs", |
|
"cannot change directory to", context->basedir, strerror(errno)); |
|
return -1; |
|
} |
|
} |
|
|
|
if (pipe(fds)) { |
|
log_error_write(srv, __FILE__, __LINE__, "ss", |
|
"pipe failed: ", strerror(errno)); |
|
ret = -1; |
|
} |
|
else { |
|
char *shell = getenv("SHELL"); |
|
char *args[4]; |
|
pid_t pid; |
|
*(const char **)&args[0] = shell ? shell : "/bin/sh"; |
|
*(const char **)&args[1] = "-c"; |
|
*(const char **)&args[2] = cmd; |
|
args[3] = NULL; |
|
|
|
fdevent_setfd_cloexec(fds[0]); |
|
pid = fdevent_fork_execve(args[0], args, NULL, -1, fds[1], -1, -1); |
|
if (-1 == pid) { |
|
log_error_write(srv, __FILE__, __LINE__, "SSss", |
|
"fork/exec(", cmd, "):", strerror(errno)); |
|
ret = -1; |
|
} |
|
else { |
|
ssize_t rd; |
|
pid_t wpid; |
|
int wstatus; |
|
buffer *out = srv->tmp_buf; |
|
buffer_clear(out); |
|
close(fds[1]); |
|
fds[1] = -1; |
|
do { |
|
rd = read(fds[0], buffer_string_prepare_append(out, 1023), 1023); |
|
if (rd >= 0) buffer_commit(out, (size_t)rd); |
|
} while (rd > 0 || (-1 == rd && errno == EINTR)); |
|
if (0 != rd) { |
|
log_error_write(srv, __FILE__, __LINE__, "SSss", |
|
"read \"", cmd, "\" failed:", strerror(errno)); |
|
ret = -1; |
|
} |
|
close(fds[0]); |
|
fds[0] = -1; |
|
while (-1 == (wpid = waitpid(pid, &wstatus, 0)) && errno == EINTR) ; |
|
if (wpid != pid) { |
|
log_error_write(srv, __FILE__, __LINE__, "SSss", |
|
"waitpid \"", cmd, "\" failed:", strerror(errno)); |
|
ret = -1; |
|
} |
|
if (0 != wstatus) { |
|
log_error_write(srv, __FILE__, __LINE__, "SSsd", |
|
"command \"", cmd, "\" exited non-zero:", WEXITSTATUS(wstatus)); |
|
ret = -1; |
|
} |
|
|
|
if (-1 != ret) { |
|
buffer *source = buffer_init_string(cmd); |
|
tokenizer_t t; |
|
tokenizer_init(&t, source, CONST_BUF_LEN(out)); |
|
ret = config_parse(srv, context, &t); |
|
buffer_free(source); |
|
} |
|
} |
|
if (-1 != fds[0]) close(fds[0]); |
|
if (-1 != fds[1]) close(fds[1]); |
|
} |
|
|
|
if (0 != chdir(oldpwd)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sss", |
|
"cannot change directory to", oldpwd, strerror(errno)); |
|
ret = -1; |
|
} |
|
return ret; |
|
} |
|
|
|
static void context_init(server *srv, config_t *context) { |
|
context->srv = srv; |
|
context->ok = 1; |
|
vector_config_weak_init(&context->configs_stack); |
|
context->basedir = buffer_init(); |
|
} |
|
|
|
static void context_free(config_t *context) { |
|
vector_config_weak_clear(&context->configs_stack); |
|
buffer_free(context->basedir); |
|
} |
|
|
|
int config_read(server *srv, const char *fn) { |
|
config_t context; |
|
data_config *dc; |
|
buffer *dcwd; |
|
int ret; |
|
char *pos; |
|
buffer *filename; |
|
|
|
context_init(srv, &context); |
|
context.all_configs = srv->config_context; |
|
|
|
#ifdef __WIN32 |
|
pos = strrchr(fn, '\\'); |
|
#else |
|
pos = strrchr(fn, '/'); |
|
#endif |
|
if (pos) { |
|
buffer_copy_string_len(context.basedir, fn, pos - fn + 1); |
|
} |
|
|
|
dc = data_config_init(); |
|
buffer_copy_string_len(dc->key, CONST_STR_LEN("global")); |
|
|
|
force_assert(context.all_configs->used == 0); |
|
dc->context_ndx = context.all_configs->used; |
|
array_insert_unique(context.all_configs, (data_unset *)dc); |
|
context.current = dc; |
|
|
|
/* default context */ |
|
*array_get_int_ptr(dc->value, CONST_STR_LEN("var.PID")) = getpid(); |
|
|
|
dcwd = srv->tmp_buf; |
|
buffer_string_prepare_copy(dcwd, PATH_MAX-1); |
|
if (NULL != getcwd(dcwd->ptr, buffer_string_space(dcwd)+1)) { |
|
buffer_commit(dcwd, strlen(dcwd->ptr)); |
|
array_set_key_value(dc->value, CONST_STR_LEN("var.CWD"), CONST_BUF_LEN(dcwd)); |
|
} |
|
|
|
filename = buffer_init_string(fn); |
|
ret = config_parse_file_stream(srv, &context, filename); |
|
buffer_free(filename); |
|
|
|
/* remains nothing if parser is ok */ |
|
force_assert(!(0 == ret && context.ok && 0 != context.configs_stack.used)); |
|
context_free(&context); |
|
|
|
if (0 != ret) { |
|
return ret; |
|
} |
|
|
|
if (0 != config_insert(srv)) { |
|
return -1; |
|
} |
|
|
|
return 0; |
|
} |
|
|
|
int config_set_defaults(server *srv) { |
|
size_t i; |
|
specific_config *s = srv->config_storage[0]; |
|
struct stat st1, st2; |
|
|
|
force_assert(sizeof(((connection *)0)->conditional_is_valid) >= COMP_LAST_ELEMENT); |
|
|
|
if (0 != fdevent_config(srv)) return -1; |
|
|
|
if (!buffer_string_is_empty(srv->srvconf.changeroot)) { |
|
if (-1 == stat(srv->srvconf.changeroot->ptr, &st1)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"server.chroot doesn't exist:", srv->srvconf.changeroot); |
|
return -1; |
|
} |
|
if (!S_ISDIR(st1.st_mode)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"server.chroot isn't a directory:", srv->srvconf.changeroot); |
|
return -1; |
|
} |
|
} |
|
|
|
if (!srv->srvconf.upload_tempdirs->used) { |
|
const char *tmpdir = getenv("TMPDIR"); |
|
if (NULL == tmpdir) tmpdir = "/var/tmp"; |
|
array_insert_value(srv->srvconf.upload_tempdirs, tmpdir, strlen(tmpdir)); |
|
} |
|
|
|
if (srv->srvconf.upload_tempdirs->used) { |
|
buffer * const b = srv->tmp_buf; |
|
size_t len; |
|
buffer_clear(b); |
|
if (!buffer_string_is_empty(srv->srvconf.changeroot)) { |
|
buffer_copy_buffer(b, srv->srvconf.changeroot); |
|
buffer_append_slash(b); |
|
} |
|
len = buffer_string_length(b); |
|
|
|
for (i = 0; i < srv->srvconf.upload_tempdirs->used; ++i) { |
|
const data_string * const ds = (data_string *)srv->srvconf.upload_tempdirs->data[i]; |
|
buffer_string_set_length(b, len); /*(truncate)*/ |
|
buffer_append_string_buffer(b, ds->value); |
|
if (-1 == stat(b->ptr, &st1)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"server.upload-dirs doesn't exist:", b); |
|
} else if (!S_ISDIR(st1.st_mode)) { |
|
log_error_write(srv, __FILE__, __LINE__, "sb", |
|
"server.upload-dirs isn't a directory:", b); |
|
} |
|
} |
|
} |
|
|
|
chunkqueue_set_tempdirs_default( |
|
srv->srvconf.upload_tempdirs, |
|
srv->srvconf.upload_temp_file_size); |
|
|
|
if (buffer_string_is_empty(s->document_root)) { |
|
log_error_write(srv, __FILE__, __LINE__, "s", |
|
"a default document-root has to be set"); |
|
|
|
return -1; |
|
} |
|
|
|
buffer_copy_buffer(srv->tmp_buf, s->document_root); |
|
|
|
buffer_to_lower(srv->tmp_buf); |
|
|
|
if (2 == s->force_lowercase_filenames) { /* user didn't configure it in global section? */ |
|
s->force_lowercase_filenames = 0; /* default to 0 */ |
|
|
|
if (0 == stat(srv->tmp_buf->ptr, &st1)) { |
|
int is_lower = 0; |
|
|
|
is_lower = buffer_is_equal(srv->tmp_buf, s->document_root); |
|
|
|
/* lower-case existed, check upper-case */ |
|
buffer_copy_buffer(srv->tmp_buf, s->document_root); |
|
|
|
buffer_to_upper(srv->tmp_buf); |
|
|
|
/* we have to handle the special case that upper and lower-casing results in the same filename |
|
* as in server.document-root = "/" or "/12345/" */ |
|
|
|
if (is_lower && buffer_is_equal(srv->tmp_buf, s->document_root)) { |
|
/* lower-casing and upper-casing didn't result in |
|
* an other filename, no need to stat(), |
|
* just assume it is case-sensitive. */ |
|
|
|
s->force_lowercase_filenames = 0; |
|
} else if (0 == stat(srv->tmp_buf->ptr, &st2)) { |
|
|
|
/* upper case exists too, doesn't the FS handle this ? */ |
|
|
|
/* upper and lower have the same inode -> case-insensitve FS */ |
|
|
|
if (st1.st_ino == st2.st_ino) { |
|
/* upper and lower have the same inode -> case-insensitve FS */ |
|
|
|
s->force_lowercase_filenames = 1; |
|
} |
|
} |
|
} |
|
} |
|
|
|
if (srv->srvconf.port == 0) { |
|
srv->srvconf.port = s->ssl_enabled ? 443 : 80; |
|
} |
|
|
|
return 0; |
|
}
|
|
|