libs-gsweb/GSWAdaptors/Apache2/mod_gsw.c
Dave Wetzel 0fbad4521b * GSWAdaptors/Apache2/mod_gsw.c
use strncasecmp to be more tolerant with header case
  update x-webobjects-adaptor-version (old WO uses lowercase, I think) 



git-svn-id: svn+ssh://svn.gna.org/svn/gnustep/libs/gsweb/trunk@36725 72102866-910b-0410-8b05-ffd578937521
2013-06-13 02:37:54 +00:00

2243 lines
75 KiB
C

/*
Copyright (C) 2007-2008 Free Software Foundation, Inc.
Written by: David Wetzel <dave@turbocat.de>
Based on Apache2 Sample Module
This file is part of the GNUstep Web Library.
This library is free software; you can redistribute it and/or
modify it under the terms of the GNU Library General Public
License as published by the Free Software Foundation; either
version 2 of the License, or (at your option) any later version.
This library is distributed in the hope that it will be useful,
but WITHOUT ANY WARRANTY; without even the implied warranty of
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
Library General Public License for more details.
You should have received a copy of the GNU Library General Public
License along with this library; if not, write to the Free
Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
*/
#include "httpd.h"
#include "http_config.h"
#include "http_core.h"
#include "http_log.h"
#include "http_main.h"
#include "http_protocol.h"
#include "http_request.h"
#include "util_script.h"
#include "http_connection.h"
#include "apr_tables.h"
#include "apr_strings.h"
#include <stdio.h>
#include <sys/socket.h>
#include <netinet/in.h>
#include <netinet/tcp.h>
#include <netdb.h>
#include <arpa/inet.h>
#if !defined(OS2) && !defined(WIN32) && !defined(BEOS) && !defined(NETWARE)
#include "unixd.h"
#define MOD_EXIPC_SET_MUTEX_PERMS /* XXX Apache should define something */
#endif
/*--------------------------------------------------------------------------*/
/* */
/* Data declarations. */
/* */
/* Here are the static cells and structure declarations private to our */
/* module. */
/* */
/*--------------------------------------------------------------------------*/
/*
* Sample configuration record. Used for both per-directory and per-server
* configuration data.
*
* It's perfectly reasonable to have two different structures for the two
* different environments. The same command handlers will be called for
* both, though, so the handlers need to be able to tell them apart. One
* possibility is for both structures to start with an int which is 0 for
* one and 1 for the other.
*
* Note that while the per-directory and per-server configuration records are
* available to most of the module handlers, they should be treated as
* READ-ONLY by all except the command and merge handlers. Sometimes handlers
* are handed a record that applies to the current location by implication or
* inheritance, and modifying it will change the rules for other locations.
*/
typedef struct gsw_cfg {
int cmode; /* Environment to which record applies
* (directory, server, or combination).
*/
#define CONFIG_MODE_SERVER 1
#define CONFIG_MODE_DIRECTORY 2
#define CONFIG_MODE_COMBO 3 /* Shouldn't ever happen. */
int local; /* Boolean: "Example" directive declared
* here?
*/
int congenital; /* Boolean: did we inherit an "Example"? */
char *trace; /* Pointer to trace string. */
char *loc; /* Location to which this record applies. */
int showApps;
apr_table_t * app_table;
} gsw_cfg;
#define MAX_URL_LENGTH 256
#define MAX_NAME_LENGTH 64
#define UNREACHABLE -10
#define INTERNAL_ERROR 500
#define RETRY_COUNT 3
typedef struct gsw_app_conf {
char app_name[MAX_NAME_LENGTH];
char host_name[MAX_NAME_LENGTH];
u_int16_t instance_number;
u_int16_t port;
u_int16_t total_index; // index in shared memory
char redirect_url[MAX_URL_LENGTH]; /* in case of error */
} gsw_app_conf;
#define GSW_INST_CACHE "gsw_inst_cache"
#define X_WO_VERSION_HEADER "x-webobjects-adaptor-version: 20130612\r\n"
#define SERVER_SOFTWARE "SERVER_SOFTWARE"
#define SERVER_NAME "SERVER_NAME"
#define SERVER_PORT "SERVER_PORT"
#ifndef REMOTE_HOST
#define REMOTE_HOST "REMOTE_HOST"
#endif
#define DOCUMENT_ROOT "DOCUMENT_ROOT"
#define SERVER_ADMIN "SERVER_ADMIN"
#define SCRIPT_FILENAME "SCRIPT_FILENAME"
#define REMOTE_PORT "REMOTE_PORT"
#define REMOTE_ADDR "REMOTE_ADDR"
#define REMOTE_USER "REMOTE_USER"
#define AUTH_TYPE "AUTH_TYPE"
#define REMOTE_IDENT "REMOTE_IDENT"
#define REDIRECT_QUERY_STRING "REDIRECT_QUERY_STRING"
#define REDIRECT_URL "REDIRECT_URL"
#define CONTENT_LENGTH "content-length"
#define DEFAULT_APP_COUNT 10
#define REFUSING_SESSIONS_HEADER "x-webobjects-refusenewsessions: "
// used to read configs
static int instance_count;
static int last_app_index;
/*
* Let's set up a module-local static cell to point to the accreting callback
* trace. As each API callback is made to us, we'll tack on the particulars
* to whatever we've already recorded. To avoid massive memory bloat as
* directories are walked again and again, we record the routine/environment
* the first time (non-request context only), and ignore subsequent calls for
* the same routine/environment.
*/
static const char *trace = NULL;
static apr_table_t *static_calls_made = NULL;
/*
* To avoid leaking memory from pools other than the per-request one, we
* allocate a module-private pool, and then use a sub-pool of that which gets
* freed each time we modify the trace. That way previous layers of trace
* data don't get lost.
*/
static apr_pool_t *gsw_pool = NULL;
static apr_pool_t *gsw_subpool = NULL;
// shared memory
apr_shm_t *exipc_shm;
char *shmfilename;
apr_global_mutex_t *exipc_mutex;
char *mutexfilename;
typedef struct exipc_data {
apr_time_t last_response_time; // in sec since January 1, 1970
apr_time_t last_request_time; // in sec since January 1, 1970
u_int32_t load;
u_int8_t unreachable; // 0=online 1=unreachable
u_int8_t refusing; // 0=serving new sessions 1=refusing
} exipc_data;
/*
* Declare ourselves so the configuration routines can find and know us.
* We'll fill it in at the end of the module.
*/
module AP_MODULE_DECLARE_DATA gsw_module;
#define ADAPTOR_PREFIX "/wo/"
// xx handler uri: wo/TCWebMail.woa/1/wo/xxxx
// PREFIX/APPNAME.woa/INSTANCE/...
// callback function for looping the table
int print_app(void *rec, const char *key, gsw_app_conf *appconf)
{
request_rec *r = rec;
// gsw_app_conf *appconf = (gsw_app_conf *) value;
if (!appconf) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "print_app: got a NULL conf");
return 0;
}
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Key:'%s'", key);
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "app_name:'%s'", appconf->app_name);
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "host_name:'%s'", appconf->host_name);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "instance_number:'%u'", appconf->instance_number);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "load:'%d'", appconf->load);
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "port:'%u'", appconf->port);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "unreachable:'%d'", appconf->unreachable);
return 1; // continue loop
}
/*--------------------------------------------------------------------------*/
/* */
/* These routines are strictly internal to this module, and support its */
/* operation. They are not referenced by any external portion of the */
/* server. */
/* */
/*--------------------------------------------------------------------------*/
/*
* Locate our directory configuration record for the current request.
*/
static gsw_cfg *our_dconfig(const request_rec *r)
{
return (gsw_cfg *) ap_get_module_config(r->per_dir_config, &gsw_module);
}
/*
* Likewise for our configuration record for a connection.
*/
static gsw_cfg *our_cconfig(const conn_rec *c)
{
return (gsw_cfg *) ap_get_module_config(c->conn_config, &gsw_module);
}
/*
* This routine sets up some module-wide cells if they haven't been already.
*/
static void setup_module_cells(void)
{
/*
* If we haven't already allocated our module-private pool, do so now.
*/
if (gsw_pool == NULL) {
apr_pool_create(&gsw_pool, NULL);
};
/*
* Likewise for the table of routine/environment pairs we visit outside of
* request context.
*/
if (static_calls_made == NULL) {
static_calls_made = apr_table_make(gsw_pool, 16);
};
}
void * read_shared_mem(apr_pool_t * pool, int appcount)
{
apr_size_t memsize = apr_shm_size_get(exipc_shm);
void * mem = NULL;
if (memsize) {
mem = apr_pcalloc(pool, memsize);
if (mem) {
void * base = NULL;
apr_status_t rv;
rv = apr_global_mutex_lock(exipc_mutex);
if (rv != APR_SUCCESS) {
//char errstr[1024];
//apr_strerror(rv,errstr,1024);
//syslog(LOG_ERR,"rv != APR_SUCCESS %s\n", errstr);
return NULL;
}
base = apr_shm_baseaddr_get(exipc_shm);
memcpy(mem, base, memsize);
apr_global_mutex_unlock(exipc_mutex);
}
}
return mem;
}
void mark_unreachable(request_rec *r, gsw_app_conf * app)
{
exipc_data * mem = NULL;
apr_time_t now = apr_time_now();
u_int16_t index = app->total_index;
apr_global_mutex_lock(exipc_mutex);
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
mem[index].last_request_time = now;
mem[index].unreachable = 1;
apr_global_mutex_unlock(exipc_mutex);
}
void mark_refusing(gsw_app_conf * app)
{
exipc_data * mem = NULL;
apr_time_t now = apr_time_now();
u_int16_t index = app->total_index;
apr_global_mutex_lock(exipc_mutex);
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
mem[index].last_request_time = now;
mem[index].refusing = 1;
apr_global_mutex_unlock(exipc_mutex);
}
void update_app_statistics(gsw_app_conf * app, apr_time_t last_request_time, apr_time_t last_response_time, u_int32_t load)
{
exipc_data * mem = NULL;
u_int16_t index = app->total_index;
apr_global_mutex_lock(exipc_mutex);
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
mem[index].last_request_time = last_request_time;
mem[index].last_response_time = last_response_time;
mem[index].load = load;
mem[index].unreachable = 0;
apr_global_mutex_unlock(exipc_mutex);
}
/*
*
*/
gsw_app_conf * find_app_by_name(char * name, gsw_cfg *cfg, request_rec *r)
{
if (((name) && (strlen(name))) && (cfg->app_table))
{
const apr_array_header_t *tarr = apr_table_elts(cfg->app_table);
const apr_table_entry_t *telts = (const apr_table_entry_t*)tarr->elts;
int i;
apr_time_t t;
exipc_data * mem;
int appcount = tarr->nelts;
u_int32_t lastload = UINT32_MAX;
int lastindex = -1;
int lastUnreachableIndex = -1;
if (!appcount) {
return NULL;
}
mem = read_shared_mem(r->pool, appcount);
if (!mem) {
return NULL;
}
// current time
t = apr_time_now();
// substract 300 sec / 5 min
t = t - apr_time_from_sec(300);
for (i = 0; i < tarr->nelts; i++) {
gsw_app_conf *appconf = (gsw_app_conf *) telts[i].val;
if ((strcasecmp(appconf->app_name, name) == 0)) {
// enable unreachable instances after some time
if (mem[i].last_request_time < t) {
mem[i].unreachable = 0;
mem[i].refusing = 0;
}
if ((mem[i].unreachable == 0) && (mem[i].refusing == 0)) {
if (mem[i].load <= lastload) {
lastindex = i;
lastload = mem[i].load;
}
} else {
// if there is only one app, we have to hit it anyways.
if ((appcount == 1)) {
if ((mem[i].unreachable == 1)) {
lastUnreachableIndex = i;
}
}
}
}
}
if (lastindex >= 0) {
return (gsw_app_conf *) telts[lastindex].val;
}
if (lastUnreachableIndex >= 0) {
return (gsw_app_conf *) telts[lastUnreachableIndex].val;
}
}
return NULL;
}
gsw_app_conf * find_app(request_rec *r)
{
char * appName;
char * instance_str = NULL;
char app_name[128];
int instance_nr = -1;
gsw_cfg * cfg = NULL;
gsw_app_conf * app_conf = NULL;
if ((appName = index(r->uri, '/'))) {
appName++;
if ((appName = index(appName, '/'))) {
appName++;
} else {
return NULL;
}
} else {
return NULL;
}
strncpy(app_name, appName, sizeof(app_name));
//ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "app_name '%s'", app_name);
if ((appName = index(app_name, '.'))) {
*appName = '\0';
appName++;
// now get the instance number if any
if ((instance_str = index(appName, '/'))) {
instance_str++;
if ((appName = index(instance_str, '/'))) {
*appName = '\0';
instance_nr = atoi(instance_str);
// parse error?
if (instance_nr == 0) {
instance_nr = -1;
}
}
}
} else {
// return NULL;
}
cfg = our_dconfig(r);
if (instance_nr != -1) {
char tmp_key[128];
snprintf(tmp_key, sizeof(tmp_key), "%s:%d", app_name, instance_nr);
app_conf = (gsw_app_conf *) apr_table_get(cfg->app_table, (const char *)tmp_key);
return app_conf;
}
app_conf = find_app_by_name(app_name, cfg, r);
//print_app(r, NULL, app_conf);
return app_conf;
}
// returns the socket or <0 on error
int connect_host(char * hostname, u_int16_t port)
{
int ok;
struct sockaddr_in socketAddress;
in_addr_t in_addr;
int sock;
int flag = 1;
socketAddress.sin_addr.s_addr = 0;
sock = socket(AF_INET, SOCK_STREAM, 0);
if (socket < 0) {
return -1;
}
ok = setsockopt(sock, /* socket affected */
IPPROTO_TCP, /* set option at TCP level */
TCP_NODELAY, /* name of option */
(char *) &flag, /* the cast is historical cruft */
sizeof(int)); /* length of option value */
if (ok != 0) {
goto saveclose;
}
if (inet_aton(hostname, &socketAddress.sin_addr) == 0) {
// failure
struct hostent * host = NULL;
host = gethostbyname((const char *)hostname);
if (host != NULL) {
memcpy(&socketAddress.sin_addr, host->h_addr_list[0], host->h_length);
}
}
socketAddress.sin_family = AF_INET;
socketAddress.sin_port = htons(port);
if (socketAddress.sin_addr.s_addr != 0) {
ok = connect(sock, (struct sockaddr *)&socketAddress, sizeof(struct sockaddr_in));
if (ok == 0) {
return sock;
}
}
saveclose:
close(sock);
return -1;
}
static int write_sock(int socket, const void *data, size_t len, request_rec *r)
{
int rval = 0;
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "sending '%s' len:%d", data, len);
rval = send(socket, data, len, 0);
if (rval < 0) {
/*
* Anything except EAGAIN or EWOULDBLOCK is trouble. If it's
* EPIPE or ECONNRESET, assume we've lost the backend
* connection permanently.
*/
switch (errno) {
case EAGAIN:
break;
case EINTR:
break;
default:
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, "cannot write to socket '%s'", data);
return -1;
break;
}
}
return 0;
}
void * read_sock_line(int socket, request_rec *r, apr_pool_t * pool)
{
size_t rval = 1;
int i = 0;
int done = 0;
char buffer[1024];
char b;
while (((done == 0) && (i < sizeof(buffer) -1)) && (rval >0)) {
rval= read(socket, &b, 1);
if ((rval == -1)) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, "read_sock_line:'%s'", strerror(errno));
return NULL;
}
buffer[i] = b;
if (b == '\n') {
done = 1;
buffer[i] = '\0';
if ((i>0) && (buffer[i-1] == '\r')) {
buffer[i-1] = '\0';
}
}
i++;
}
buffer[i] = '\0';
// in case we got a \0 in the string?
i = strlen(buffer);
if (i > 0) {
void * newBuf = apr_palloc(pool,i+1);
strncpy(newBuf, buffer, i+1);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "read_sock_line:'%s'", newBuf);
return newBuf;
}
return NULL;
}
/*
HTTP/1.0 200 OK NeXT WebObjects
x-webobjects-loadaverage: 1
content-length: 3315
content-type: text/html
x-webobjects-adaptorstats: applicationThreadCreation=+0.000s applicationThreadRun=+0.000s applicationBeginDispatchRequest=+1.368s applicationEndDispatchRequest=+1.387s applicationDispatchRequest=0.019s applicationBeginSendResponse=+1.387s applicationTimeSpent=1.387s
*/
static int send_header_string(int soc, const char * key, const char * value, request_rec *r)
{
int retval = 0;
char tmpStr[512];
snprintf(tmpStr, sizeof(tmpStr)-1, "%s: %s\r\n",key, value);
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
}
const char * fixRequestString(request_rec *r, gsw_app_conf *app)
{
char * req_str = r->the_request;
size_t len = strlen(req_str);
char * appName = apr_palloc(r->pool,len+5);
char * spaceStr;
char * instanceStr;
char * restStr = NULL;
int instance_nr = -1;
char * newString = NULL;
strncpy(appName, req_str, len);
// GET /wo/PBX HTTP/1.1
if (appName = index(appName, '/')) {
appName++;
if (appName = index(appName, '/')) {
appName++;
if (spaceStr = index(appName, ' ')) {
*spaceStr = '\0';
instanceStr = appName;
instanceStr++;
if (instanceStr = index(appName, '/')) {
*instanceStr = '\0';
instanceStr++;
if (spaceStr = index(instanceStr, '/')) {
*spaceStr = '\0';
restStr = spaceStr;
restStr++;
}
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "instanceStr:'%s'", instanceStr);
}
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "appName:'%s'", appName);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "restStr:'%s'", restStr);
}
}
}
if (!restStr) {
restStr = "";
}
if (spaceStr = index(appName, '.')) {
*spaceStr = '\0';
}
newString = apr_psprintf(r->pool, "%s %s%s.woa/%d/%s HTTP/1.1\r\n", r->method, ADAPTOR_PREFIX, appName, app->instance_number
,restStr);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "newString:'%s'", newString);
return newString;
}
static int send_headers(int soc, gsw_app_conf *app, request_rec *r)
{
apr_array_header_t * hdrs_arr = NULL;
apr_table_entry_t * hdrs = NULL;
int retval = 0;
int i = 0;
char tmpStr[512];
const char * ap_str;
server_rec * s = r->server;
conn_rec * c = r->connection;
hdrs_arr = (apr_array_header_t*) apr_table_elts(r->headers_in);
hdrs = (apr_table_entry_t *) hdrs_arr->elts;
// GET /wo/PBX HTTP/1.1
//snprintf(tmpStr, sizeof(tmpStr), "%s\r\n", r->the_request);
strncpy(tmpStr, fixRequestString(r,app), sizeof(tmpStr));
retval = write_sock(soc,tmpStr,strlen(tmpStr), r);
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "send_headers:'%s'", tmpStr);
if (retval != 0) {
return retval;
}
for (i = 0; i < hdrs_arr->nelts; ++i) {
if (!hdrs[i].key)
continue;
snprintf(tmpStr, sizeof(tmpStr), "%s: %s\r\n", hdrs[i].key, hdrs[i].val);
retval = write_sock(soc,tmpStr,strlen(tmpStr), r);
if (retval != 0) {
return retval;
}
}
// write x-webobjects-adaptor-version to the app
snprintf(tmpStr, sizeof(tmpStr), X_WO_VERSION_HEADER);
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
retval = send_header_string(soc, SERVER_NAME, s->server_hostname, r);
// SERVER_PORT
snprintf(tmpStr, sizeof(tmpStr), "SERVER_PORT: %hu\r\n",ap_get_server_port(r));
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
retval = send_header_string(soc, REMOTE_ADDR, c->remote_ip, r);
if (r->user != NULL) {
retval = send_header_string(soc, REMOTE_USER, r->user, r);
}
if (r->ap_auth_type != NULL) {
retval = send_header_string(soc, AUTH_TYPE, r->ap_auth_type, r);
}
ap_str = (char *)ap_get_remote_logname(r);
if (ap_str != NULL) {
retval = send_header_string(soc, REMOTE_IDENT, ap_str, r);
}
// the_request
if (r->unparsed_uri != NULL) {
retval = send_header_string(soc, "the_request", r->the_request, r);
}
/*
* Apache custom responses. If we have redirected, add special headers
*/
if (r->prev) {
if (r->prev->args) {
retval = send_header_string(soc, REDIRECT_QUERY_STRING, r->prev->args, r);
}
if (r->prev->uri) {
retval = send_header_string(soc, REDIRECT_URL, r->prev->uri, r);
}
}
return retval;
}
uint32_t get_content_len(request_rec *r)
{
apr_array_header_t * hdrs_arr = NULL;
apr_table_entry_t * hdrs = NULL;
int i = 0;
const char * ap_str;
uint32_t len = 0;
hdrs_arr = (apr_array_header_t*) apr_table_elts(r->headers_in);
hdrs = (apr_table_entry_t *) hdrs_arr->elts;
for (i = 0; i < hdrs_arr->nelts; ++i) {
if (!hdrs[i].key)
continue;
if (strcasecmp(hdrs[i].key, CONTENT_LENGTH) == 0) {
len = atoi((const char *)hdrs[i].val);
break;
}
}
return len;
}
void * read_post_data(request_rec *r, apr_off_t clength, apr_pool_t * pool, gsw_app_conf * app)
{
char * postbuf = NULL;
char * tmpbuf = NULL;
if ((r->method_number == M_POST) && (ap_should_client_block(r))) {
apr_off_t bytesread = 0;
apr_off_t len_read = 0;
if (!clength) {
return NULL;
}
postbuf = apr_palloc(pool,clength+1);
tmpbuf = postbuf;
while (bytesread < clength) {
len_read = ap_get_client_block(r, tmpbuf, clength - bytesread);
if (len_read < 0) {
return NULL;
}
bytesread += len_read;
tmpbuf += len_read;
}
postbuf[clength] = '\0';
}
return postbuf;
}
static int handle_request(request_rec *r, gsw_app_conf * app, void * postdata, uint32_t contentLen)
{
int soc = -1;
char * newBuf = NULL;
apr_pool_t * sub_pool = NULL;
int refusing_seen = 0;
int load_avr_seen = 0;
int length_seen = 0;
u_int32_t newload = 0;
size_t content_length = 0;
char * content_type = NULL;
char * content_encoding = NULL;
char * location = NULL;
int http_status = DECLINED;
char tmpStr[512];
apr_time_t request_time;
apr_time_t done_time;
apr_pool_create(&sub_pool, r->pool);
soc = connect_host(app->host_name, app->port);
if (soc != -1) {
if (send_headers(soc, app, r) == 0) {
int headers_done = 0;
request_time = apr_time_now();
// check if we are on a POST trip...
if (postdata) {
write_sock(soc, CRLF, 2, r);
write_sock(soc, postdata, contentLen, r);
}
write_sock(soc, CRLF, 2, r);
// HTTP/1.0 200 OK NeXT WebObjects
if (newBuf = read_sock_line(soc, r, sub_pool)) {
if ((strncasecmp(newBuf,"HTTP/",5) != 0) || (strlen(newBuf) < 15)) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Got '%s' but no 'HTTP/...'", newBuf);
apr_pool_destroy(sub_pool);
return DECLINED;
} else {
newBuf[12] = '\0';
http_status = atoi(newBuf+9);
if (http_status==200) {
http_status=OK;
}
if (http_status == 302) {
r->status = http_status;
}
}
}
while (headers_done == 0) {
newBuf = read_sock_line(soc, r, sub_pool);
int copy_header = 1;
if (newBuf != NULL) {
if (load_avr_seen == 0) {
if (strncasecmp(newBuf, "x-webobjects-loadaverage: ", 26) == 0) {
load_avr_seen = 1;
newload = atoi(newBuf+26);
copy_header = 0;
}
}
if (refusing_seen == 0) {
if (strncasecmp(newBuf, REFUSING_SESSIONS_HEADER, 32) == 0) {
refusing_seen = 1;
copy_header = 0;
}
}
if (length_seen == 0) {
if (strncasecmp(newBuf, "content-length: ", 16) == 0) {
length_seen = 1;
content_length = atol(newBuf+16);
snprintf(tmpStr, sizeof(tmpStr), "%d", content_length);
apr_table_set(r->headers_out, "Content-Length", tmpStr);
copy_header = 0;
}
}
if (content_type == NULL) {
if (strncasecmp(newBuf, "content-type: ", 14) == 0) {
content_type = newBuf+14;
copy_header = 1;
}
}
if (content_encoding == NULL) {
if (strncasecmp(newBuf, "content-encoding: ", 18) == 0) {
content_encoding = newBuf+18;
apr_table_set(r->headers_out, "Content-Encoding", content_encoding);
copy_header = 0;
}
}
if (location == NULL) {
// Apple has a bug, giving us a 'L', so we do that too but accept a 'l' too -- dw
if (strncasecmp(newBuf, "location: ", 10) == 0) {
location = newBuf+10;
apr_table_set(r->headers_out, "Location", location);
//ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "location '%s'", location);
copy_header = 0;
}
}
if ((copy_header == 1)) {
char * hdrValue = index(newBuf, ':');
if (hdrValue) {
*hdrValue = '\0';
hdrValue++; // space
hdrValue++; // first pos.
apr_table_set(r->headers_out, newBuf, hdrValue);
}
}
} else {
headers_done = 1;
}
} // while
// do the request
if ((content_length > 0)) {
size_t bytesDone = 0;
size_t blockSize = 1024;
size_t rval=1;
char * transferBuf = NULL;
if (content_type != NULL) {
ap_set_content_type(r, content_type);
}
if (content_length < blockSize) {
blockSize = content_length;
}
transferBuf = apr_palloc(sub_pool, blockSize);
if (! transferBuf) {
goto internal_error;
}
while ((bytesDone < content_length) && (rval > 0)) {
rval= read(soc, transferBuf, blockSize);
if (rval > 0) {
ap_rwrite(transferBuf, rval, r);
bytesDone += rval;
}
}
}
}
close(soc);
done_time = apr_time_now();
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Request took %d ms", apr_time_msec(done_time - request_time));
if ((http_status==302) && (refusing_seen==1)) {
mark_refusing(app);
} else {
update_app_statistics(app, request_time, done_time, newload);
}
} else { // -1
http_status = UNREACHABLE;
}
//apr_pool_destroy(sub_pool);
return http_status;
internal_error:
close(soc);
return INTERNAL_ERROR;
}
/*--------------------------------------------------------------------------*/
/* We prototyped the various syntax for command handlers (routines that */
/* are called when the configuration parser detects a directive declared */
/* by our module) earlier. Now we actually declare a "real" routine that */
/* will be invoked by the parser when our "real" directive is */
/* encountered. */
/* */
/* If a command handler encounters a problem processing the directive, it */
/* signals this fact by returning a non-NULL pointer to a string */
/* describing the problem. */
/* */
/* The magic return value DECLINE_CMD is used to deal with directives */
/* that might be declared by multiple modules. If the command handler */
/* returns NULL, the directive was processed; if it returns DECLINE_CMD, */
/* the next module (if any) that declares the directive is given a chance */
/* at it. If it returns any other value, it's treated as the text of an */
/* error message. */
/*--------------------------------------------------------------------------*/
/*
* Command handler for the NO_ARGS "Example" directive. All we do is mark the
* call in the trace log, and flag the applicability of the directive to the
* current location in that location's configuration record.
*/
static const char *cmd_gsw(cmd_parms *cmd, void *mconfig)
{
gsw_cfg *cfg = (gsw_cfg *) mconfig;
/*
* "Example Wuz Here"
*/
cfg->local = 1;
return NULL;
}
static const char * set_ShowApps(cmd_parms *cmd, void *mconfig, int mybool)
{
gsw_cfg *cfg = (gsw_cfg *) mconfig;
cfg->showApps = mybool;
return NULL;
}
static const char *set_inst_count(cmd_parms *cmd, void *key, const char *value)
{
gsw_cfg *cfg = ap_get_module_config(cmd->server->module_config, &gsw_module);
if (instance_count != DEFAULT_APP_COUNT) {
return "InstanceCount is only allowed once.";
}
instance_count = atoi((char *)value);
// success
return NULL;
}
static const char * set_App(cmd_parms *cmd, void *mconfig,
char *word1, char *word2, char *word3)
{
const command_rec *thiscmd = cmd->cmd;
gsw_cfg *cfg = (gsw_cfg *) mconfig;
gsw_app_conf * appConf = NULL;
char tmpStr[128];
char * appName = NULL;
char * instanceStr = NULL;
char * hostName = NULL;
char * portStr = NULL;
char * keyStr = NULL;
int len = 0;
gsw_cfg *modulecfg = ap_get_module_config(cmd->server->module_config, &gsw_module);
const apr_array_header_t *tarr = apr_table_elts(cfg->app_table);
//App Name=TCWebMail Instance=1 Host=10.1.0.1:9901
//App Name=PBX Instance=1 Host=10.1.0.1:9001
appName = strrchr(word1, '=');
instanceStr = strrchr(word2, '=');
hostName = strrchr(word3, '=');
if ((!appName) || (!instanceStr) || (!hostName)) {
return apr_psprintf(cmd->temp_pool, "App '%s' '%s' '%s' is invalid.", word1, word2, word3);
}
appConf = apr_pcalloc(cmd->pool, sizeof(gsw_app_conf));
appName++;
hostName++;
instanceStr++;
strncpy(appConf->app_name, appName, sizeof(appConf->app_name));
portStr = strrchr(hostName, ':');
// remove port from string
*portStr = '\0';
portStr++;
appConf->port = atoi(portStr);
strncpy(appConf->host_name, hostName, sizeof(appConf->host_name));
appConf->instance_number = atoi(instanceStr);
appConf->total_index = last_app_index;
if (instance_count < appConf->total_index) {
return apr_psprintf(cmd->temp_pool, "InstanceCount is '%d', but you added '%d' applications. Increase InstanceCount.",
instance_count, appConf->total_index);
}
snprintf(tmpStr, sizeof(tmpStr), "%s:%d", appName, appConf->instance_number);
len = strlen(tmpStr)+1;
keyStr = apr_pcalloc(cmd->pool,len);
strncpy(keyStr, tmpStr, len);
apr_table_addn((apr_table_t*) tarr, (const char *) keyStr, (const char *) appConf);
last_app_index++;
return NULL;
}
// done using http://www.sveinbjorn.org/dataurlmaker
static void print_image(request_rec * r)
{
ap_rputs("<img alt=\"exclamation sign\" src=\""
"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADwAAAAyCAYAAAF38YiUAAAAAXNSR0IArs"
"4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAAN1wAADdcBQiibeAAAD8dJREFUaN7dmnl0VVWWh7"
"9735S8zGQAAgQSQhKGhmAAMQ6ABhAZBCkRQSgcy6Gbru7VzrW6rVKrre5eRVG6UBBXIRoQooBQgkDQAk"
"WwFQpEUKEKEUwgCYSQvPnde3b/cd97ySOggILaZ627zrjP7+yz99l3n30vnE/aAEq9tUbatultKyOrqz"
"UtNZ0Xobkd9bE7bxERkenTp4uUlcXNwrtgrynQJRQKyQcffCC1tbXyQa/81kF1PXXZu3ev1NbWyoQJE2"
"Tfvn3ymhMB0jSAeSB+4PTHCw3nzqLs2SP3wNh2HdWpySIiIo88Iu2pKisFEBGRubreOqBhTJk0NDRIQk"
"KC+Hw+eTtVEwC9Etb46ms4efIkTqeTEydO0G3bp2zNzRHtxbOw4v+21R++eaysA+F8k++Pz4hUV4tUVs"
"qOwQPObYLV8LRUV4ssXy6AFBcXi9x+u9SNGi6A66yEr4NIZaW0fPmliIgAMnfuXFFKiZSUSGN+ntwO/x"
"Idr0UL67vlSn/nMRpX7yE1NZWUlBQSEhIQEXw+H83NzTSsrOLIYw+xPYD6b7BpAA33zZDA25WETAiZED"
"TFylV83Spb+V5d5+KkDbA1sHi+AB3Om7jxwftFtm+XtzPSzk/O60Bk2zaRN98UWbBA/gjLzpWwh7l2tU"
"UoIvLkk3J44qhzQ999RZnIqlUxOUtDg8iUKTLv29R0FdTKqlUiW7a0EouIDBsm3pJekgcFZyVuuG+6yP"
"z5EgqF4oi9Xq9IcbEszsw4sxWr0nVRG5dyZMwYgsFgbIBSilAoxPvZbjKDJ3kIdsYRL4OKYX2TCJsQDA"
"bx+/34fD4WLFiAz+fD7/eTuaCSsIKf9+41MKrWGsAX4yskee87NK3ZA0BSUhJut5ucnByOHTuG1+slEA"
"gggQC7h5axPQzPgqYthtDInrojaJ5dj2O6Hqm7nS6eCQSvsXvh+Tf/rmYbQBg4pzwQZA+0XLDubwR5Pz"
"NDFsFcLkWqhsx3E1xiVK8T2bNHamZMlhVw9HznOS9jsB5mZw7oc3z4Rx9jS0qHujpyfzaTa2bf3Wm5pf"
"mO7x14HXzW77ZJc0tfeAnq6kAEhg2Dujoy8/swbva9vKJpoSzo/L0BrwG5/KF/LMmd9YAF2q8fWnk5ms"
"PB84YBdXUkKjvTZ87ghcyM2rthxneW6SoQ/++ftgxLZaWIUrFjDsiIESMsWzF7tsgNN4gMGybbS/vI01"
"B9QYAroXR9dgdRS1+1AOfPF9M0JZqiwA8//HCsLfzyyyIlJSLFxfLllYPldxA4L9DXYeGnFVdKQy9djv"
"XUpXHa9dLY2Ch+v78dcFVVlQUaDktzc7PUffG5vJOuycY0TT7pXyy/tsYlfSvoMjhV/4vpUl+oS22BLn"
"977H45ePCgHD16VE6ePCler1fC4bAcOHBABg0aJIZhSCAQkObmZmloaJDDhw/L/v37ZW0ysiYJebdjmj"
"xhs0k/6N8WR2tbWQJSMWsS6r03MQRa/rQRldUJXddJSEjA6XTidDqx2+1kZGQAUFhYyIcffkg4HCYUCh"
"EIBAiHwwDsv6IUIxhGaTqehGQ2NTX/dgk8HgOeD+4Uh91bcXUvjENfYAqYCoKzfolCQwAlgq7bQNfRdR"
"uChgiYIiglhE0TwzBRSlACCmjespnmHTswIvMV5uTw8rH6gwuhpwawCGTMnTdjejwoZYISlGGiTIUohT"
"JMUAqlTFQ40qYUmAplRsaZJkopxIj0R9tMhSgz1u4A5h5v/ICfVNoIv9+akyUbLY11XhJQAW0jSGDRPD"
"k4vkKWwXuXituGunumi3zxhRirV8hah10GQfHFBh26tVO2qF07RXbsENmyRRrumyUrrPe8dtFeiwq29b"
"3vDjRTwOsFj4esa8eSWdDd/iQ8clGA34YlBdcPI23clBhoNC8ddz094bdA8vcKvBZcyma7tfttM1tBR4"
"+GxETwekntUkDZqKtZANu/V2CBxiH3z8CR18sCzc8HXYexY2MLKSjsg9vl7DsCyr4X4LUwPi0/z505aU"
"Zsex9/5RU0TUPXdRg/Hrxe7IZw3egRTIWPzmXebx1gwOr+s6ZCIGhxN3YsGzZssHZCBHr3hqDV10lPpE"
"dBnvYr+J/vBLwaNvWbdD0pg4dboC4XJCaSl5cXP3DOnNiWD87JJse60qZfEPBaSNWczmu7jZ3QqlDjxw"
"O0B3Y4oKwMvF4yvCEqysv4L/jkgoAD0Fh+/0zsadng8WCUtepMjx492p/xxx6zFhcK0et4M8mJCd3GQs"
"V5Aa+Auzv2LbKl9S61JvP7CRcWxvp79+7djsY0TTzPPQeAXdMZOaA35bARsJ+zVakCqZ86WuoLdTnWyy"
"H1R45IS0uLhMNhERE5ePBgzOeKJp/PJ42NjfJJURfZlKbJhlRN1nTLlX+Gl8+J4yr465BpN8LHGzEFwg"
"PLMWw2DMPAMAxEhPz8/DiacDiMaZoYhkHq+vctD0ago1MjHWYCOd8IvBy62JPcpe5Df7XcFwH/Uy/GJo"
"36VUoprrjiCtavXx9rj4IrEdyTp2GKcPRoDZP7FPEwfH46sK1t5SZoHn7XLahPtmIKeP7jeczO3bDZbO"
"i6jqZpaJqGiFBcXExeXh5JSUkx4FAoRCgUwjn0ShpfnIcSaPZ68Gn2RKdh7jsA+9px/Bo8nj94AKr6NW"
"urXG6MQVchInFchUIhVq1axYgRIygqKiIUCsX6ouIAyKv6M6aAPxhkZG5HimB5W29Fb2Ohniromo5SCi"
"XQsmxrnAzbPgMGDIj1RbmMAlu+Pji656MlJaMUfHr4MMOzM7kDVsT51a/CVyNm3Zxne++NmCsaGliOOe"
"BylFgXQzTQdFura6tF3FtTYSiFYSoM00QiuqFMRe2zf8BUEUVLSWXNqWaWCN1PwmFtCZS4OqR/dlUPJ0"
"bT8dhAU8CIlpXEFmSelre2y2n10+eAsk45zDtW718IbnsYXhk1bSLh4/VoSqGbCk2Z2AyF3TRjPrSYls"
"+s1Gm+smn1K1MhhjU+6k9HfWtRgqiIbw6JQKG2HJxNcFSgg7LcGxRgtimfS/1caZpg/kr4lcYlTMvBmQ"
"FzsIyKGYJFH8G/PWEFhC5JumQMvw0DbPBxYlYHe8mtNyJKsffVFfhPtQRfh7EvwaZLsQ7bJYqM3anB2s"
"y+RXrRrFvpcMc/4R5yFelujZYjNfYeTadm9oFT78DHES386TK8ERYAv8677kryb72F1JumQzgMgQAJPU"
"tI75CE2XIKZ82x64dD3p8tzyH8k1Pp5WBLh4/R9dK+t4wja8IknP0GQShkMRwKxZ7Avl3UvLORXWvfxQ"
"s7HoAxnvP6XvYDS/ht6OyCI7Ykd/fSu24le/od2LsWgN8PgYCVR8uBAHZ3CqmdOpGRkUj9/oO5Y0x15z"
"FYewTqf/QMr4drBT5J6drZ1f/OaXS45XZ0Z0KMOfx+MAxLul5vjHEdnZTszmRmp3D869rE/v7AvZmwd+"
"cZPLUfDcPr4FETFucO6k/xtJ+RPnYKWthoZTQchuHDoU8fKCmBrl1h1y7w+SAQQAuGSE7pQGZWCj6fV0"
"s7eWpKKdj/Au9HXqc/HobfgtUK7u89/jp6TLyR5Cuui1dfhwOzooIFixYxd+5cNm3ahD05mcLJk2HnTm"
"hqimmB2+kmIzURW6IT/9H6a66BgRvgLSD4gxutNeDWYC92e4/LbptI9rWjsefmtxqlcBhyc6G8nNLSUn"
"bv3h1H379/f6tt4ULYvTvOqPmaGznccpItmz8kKPL3Z2BELRz5LuvVvyOzJQKNjoy0HkMf+Dkdb5yKPa"
"tLawDK64W+faG8HICsrKx2czidkSvFXXfBqFFxASy3qVGouRhdcTXuBFfPR+DzMXDlD8LwarjVhM86FB"
"W4Bt99G5mjJqFr9lZGvV6oqLAiMpHULm4B5ObmtlbGj4cHH4xj2h4IkXfCw+ghpWRnZrhHwfv3wC8u9D"
"heEMOrYK4BSwquuZz+0yaTUT4SfP7WhRoGMmUK5MTfwbt3795uri5dusQ3DBiALFpkXdI8HvB40Hw+ut"
"Y1MSKvC8U9utELXngInsO6iVw8hgW0FbBNadrsy6aMpde4G0jpO6SVUY8HMymJwJQpKGf7WH1hm5jNWR"
"kGzIwMAm++icrNtc505Lbb0RdmaGIiV/UrogPc++/WB7zMi8LwGsh6Axr0xISh5XdNJfnoZ3heeoqWZc"
"9h1nwFXi/+7t1pGTkS0zStCIiKd4uLi4u/WaWx/iUwTRMTaF68mMANNwBwKuxn18mv2Vl7AN3bxPjL/g"
"G3TS9/AvYVQcn3aqWroBx4P61zjjZw0mi0rWtQ3mbruk/kyv/EPByjJmK323E4HNjt9tijR/6O8Xq9JC"
"fHB8/Xr1/PqFGjYlG5tiGlaH5i6cvU/ebR1vCCgDMhkS55PVm37wCN/oD5MUxca7265Du9h6vglwqWdy"
"vtq/W+ZhDa5jdQwUAruNNFcOE6GDDE2kGtdQ+jgZdou9PpZPPmzRw6dAiAtLQ05syZg91uj2M2Wo7W7c"
"V9cF01guZVVZhKEBFCRpimxhMMLCjAZ5i6yx+YVgDh3dZXAXVBEl4GSwWm9h8znKwUG+x81wr6RKRqdO"
"yGZ95KbInudlK12WyxPBqPi8bk4uyCSEyNo3mU6baSNgyD8KkmaqaMI3z8eJx25XXJo9YbZOvROpqh6n"
"m4k7P8WqKf7RvLEvhc2WxTr5pxE9lmIxJhVkUCRYGh1+FZuBacrtjiYgtro45tA4vBYJCZM2ficDhwOB"
"wkJyezcuXKWDiubViubTQ0ugF6cgrd3voLrsuGxIJXSuDgkcOkYzKhe1eS4ebZ8KEbcs9Jwssh34C9Ca"
"kpiVdPn4jsqEadqItJVQkEbv9XQpNvbzfZN0lW13WWLFnC7Nmz42hcLhc1NTVWYCzynC5l02zvRtc/O4"
"fjf1qIgtjxSnMn0SUzk2Vf1eAxzZYtULEb/vesZ7gSbjRhW3ZBnmPIjSOR91ahWppijCrAzO1B4KHfgd"
"b+NCilYuc2qqoiEnv69evHyJEj+frrr3G5XEycOJGlS5ei6/oZz7BhGO0sfTS5ywZzomo5pt8fi636Qm"
"EafV6uze1EbSDkyjDNuzLh0N9gT9SYxVb9KvyngkdKysvo3jMX2bbWWnQbyxiVsrTZgGjZOlMSZ0nbak"
"Vc+Yy0beeW+P5voj1DH2j0zclil8fHTo+Xk/CH5fAoELABLIZKBfddedP1ZLvMuPP6zQuL9su3LuxsG3"
"DGec5Ae7Z1nKnPFKjz+Chyu+mW4OJQIDi0CHrthWo71kVzvwA7N39IcnoqIt0QJPJCi+y2Fq1Z7aJZiy"
"Mi1ThVjuRWd2S8RGjb5hEa1W6s1W62mVPaYCmsHVMxmui88bjb/QEaDAMT8MEhIOf0g5gUcdXs/P9Kyo"
"rF0/R/NzVwuE9PAZoAAAAASUVORK5CYII=\" width=\"60\" height=\"50\">\n", r);
}
/*
* this prints some CSS for use in the error page in gsw_handler
*/
static void print_css(request_rec * r)
{
ap_rputs("<style type=\"text/css\"> \
body {color: #111;font-family:\"Helvetica Neue\",Helvetica,sans-serif;} \
.fail {margin: auto; padding: 40px; display: block; \
border: 1px solid #000000; \
position: relative;} \
.fail h2 {margin: 0 0 .2em; font-size: 24px} \
.fail p {margin: 0; font-size: .8em;} \
.power {float:right;padding-top: 10px;} \
img {float:left;padding-right: 10px;} \
a {color: #0092E8;} \
a:hover {color: #0071b3;} \
table {white-space:nowrap;} \
</style>\n", r);
}
/*--------------------------------------------------------------------------*/
/* */
/* Now we declare our content handlers, which are invoked when the server */
/* encounters a document which our module is supposed to have a chance to */
/* see. (See mod_mime's SetHandler and AddHandler directives, and the */
/* mod_info and mod_status gsws, for more details.) */
/* */
/* Since content handlers are dumping data directly into the connection */
/* (using the r*() routines, such as rputs() and rprintf()) without */
/* intervention by other parts of the server, they need to make */
/* sure any accumulated HTTP headers are sent first. This is done by */
/* calling send_http_header(). Otherwise, no header will be sent at all, */
/* and the output sent to the client will actually be HTTP-uncompliant. */
/*--------------------------------------------------------------------------*/
/*
* Sample content handler. All this does is display the call list that has
* been built up so far.
*
* The return value instructs the caller concerning what happened and what to
* do next:
* OK ("we did our thing")
* DECLINED ("this isn't something with which we want to get involved")
* HTTP_mumble ("an error status should be reported")
*/
static int gsw_handler(request_rec *r)
{
gsw_app_conf * app = NULL;
gsw_cfg * dcfg;
char data1[1024];
char data[1024];
void * user_data;
int handle_status = OK;
void * postdata = NULL;
uint32_t contentLen = 0;
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "xx handler uri: %s", r->uri);
if (strncmp(r->uri, "/wo/",4) != 0) {
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "xx handler DECLINED");
return DECLINED;
}
dcfg = our_dconfig(r);
/*
* We're about to start sending content, so we need to force the HTTP
* headers to be sent at this point. Otherwise, no headers will be sent
* at all. We can set any we like first, of course. **NOTE** Here's
* where you set the "Content-type" header, and you do so by putting it in
* r->content_type, *not* r->headers_out("Content-type"). If you don't
* set it, it will be filled in with the server's default type (typically
* "text/plain"). You *must* also ensure that r->content_type is lower
* case.
*
* We also need to start a timer so the server can know if the connexion
* is broken.
*/
app = find_app(r);
if (app != NULL) {
int i;
handle_status = OK;
if (ap_setup_client_block(r, REQUEST_CHUNKED_ERROR) != OK) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "handle_request: DECLINED");
} else {
if (r->method_number == M_POST) {
contentLen = get_content_len(r);
postdata = read_post_data(r, contentLen, r->pool, app);
}
for (i = 0; ((i < RETRY_COUNT) && (handle_status <= OK)); i++) {
handle_status = handle_request(r, app, postdata, contentLen);
switch (handle_status) {
case UNREACHABLE:
mark_unreachable(r,app);
app = find_app(r);
break;
case DECLINED:
break;
case OK:
return handle_status;
case HTTP_MOVED_TEMPORARILY:
return OK; // otherwise, we get a apache error doc!
default:
break;
}
}
if ((handle_status > OK)) {
return handle_status;
}
}
}
ap_set_content_type(r, "text/html");
/*
* If we're only supposed to send header information (HEAD request), we're
* already there.
*/
if (r->header_only) {
return OK;
}
/*
* Now send our actual output. Since we tagged this as being
* "text/html", we need to embed any HTML.
*/
ap_rputs(DOCTYPE_HTML_3_2, r);
ap_rputs("<html>\n", r);
ap_rputs("<head>\n", r);
print_css(r);
ap_rputs("<title>GNUstepWeb Status</title>\n", r);
ap_rputs("<meta name=\"robots\" content=\"NOINDEX, NOFOLLOW\">\n", r);
ap_rputs("</head>\n", r);
ap_rputs("<body>\n", r);
ap_rputs("<h1>GNUstepWeb Status</h1><br>\n", r);
if ((dcfg->showApps)) {
if ((dcfg->app_table)) {
const apr_array_header_t *tarr = apr_table_elts(dcfg->app_table);
const apr_table_entry_t *telts = (const apr_table_entry_t*)tarr->elts;
int i;
exipc_data * mem;
int appcount = tarr->nelts;
char timestr[APR_CTIME_LEN];
mem = read_shared_mem(r->pool, appcount);
if (mem) {
ap_rputs("<div class=\"fail\"><table width=\"700\">\n",r);
print_image(r);
ap_rputs("<tr><th>Name</th><th>Instance</th><th>Host</th><th>Port</th><th>Load</th><th>Unreachable</th><th>Refusing</th><th>Last Request</th><th>Last Response</th></tr>\n",r);
for (i = 0; i < tarr->nelts; i++) {
gsw_app_conf *appconf = (gsw_app_conf *) telts[i].val;
ap_rprintf(r, "<tr><td><a href=\"%s%s.woa/%d/\">%s</a></td>", ADAPTOR_PREFIX,
appconf->app_name,
appconf->instance_number,
appconf->app_name);
ap_rprintf(r, "<td>%u</td>", appconf->instance_number);
ap_rprintf(r, "<td>%s</td>", appconf->host_name);
ap_rprintf(r, "<td>%u</td>", appconf->port);
ap_rprintf(r, "<td>%u</td>", mem[i].load);
ap_rprintf(r, "<td>%s</td>", (mem[i].unreachable == 1) ? "YES": "NO");
ap_rprintf(r, "<td>%s</td>", (mem[i].refusing == 1) ? "YES": "NO");
apr_ctime(timestr, mem[i].last_request_time);
ap_rprintf(r, "<td>%s</td>", timestr);
if (mem[i].last_response_time > 0) {
apr_ctime(timestr, mem[i].last_response_time);
ap_rprintf(r, "<td>%s</td></tr>\n", timestr);
} else {
ap_rprintf(r, "<td>never</td></tr>\n");
}
}
ap_rputs("</table><br>\n",r);
}
}
} else {
ap_rputs("<p>Application list hidden. Set <samp>ShowApps on</samp> in your Apache config to list.</p>\n",r);
}
ap_rputs("<p class=\"power\">Powered by <a href=\"http://wiki.gnustep.org/index.php/GNUstepWeb\">GNUstep Web</a></p>\n",r);
ap_rputs("</div>\n</body>\n", r);
ap_rputs("</html>\n", r);
/*
* We're all done, so cancel the timeout we set. Since this is probably
* the end of the request we *could* assume this would be done during
* post-processing - but it's possible that another handler might be
* called and inherit our outstanding timer. Not good; to each its own.
*/
/*
* We did what we wanted to do, so tell the rest of the server we
* succeeded.
*/
return OK;
}
/*--------------------------------------------------------------------------*/
/* */
/* Now let's declare routines for each of the callback phase in order. */
/* (That's the order in which they're listed in the callback list, *not */
/* the order in which the server calls them! See the command_rec */
/* declaration near the bottom of this file.) Note that these may be */
/* called for situations that don't relate primarily to our function - in */
/* other words, the fixup handler shouldn't assume that the request has */
/* to do with "gsw" stuff. */
/* */
/* With the exception of the content handler, all of our routines will be */
/* called for each request, unless an earlier handler from another module */
/* aborted the sequence. */
/* */
/* Handlers that are declared as "int" can return the following: */
/* */
/* OK Handler accepted the request and did its thing with it. */
/* DECLINED Handler took no action. */
/* HTTP_mumble Handler looked at request and found it wanting. */
/* */
/* What the server does after calling a module handler depends upon the */
/* handler's return value. In all cases, if the handler returns */
/* DECLINED, the server will continue to the next module with an handler */
/* for the current phase. However, if the handler return a non-OK, */
/* non-DECLINED status, the server aborts the request right there. If */
/* the handler returns OK, the server's next action is phase-specific; */
/* see the individual handler comments below for details. */
/* */
/*--------------------------------------------------------------------------*/
/*
* This function is called during server initialisation. Any information
* that needs to be recorded must be in static cells, since there's no
* configuration record.
*
* There is no return value.
*/
/*
* This function is called when an heavy-weight process (such as a child) is
* being run down or destroyed. As with the child initialisation function,
* any information that needs to be recorded must be in static cells, since
* there's no configuration record.
*
* There is no return value.
*/
/*
* This function is called during server initialisation when an heavy-weight
* process (such as a child) is being initialised. As with the
* module initialisation function, any information that needs to be recorded
* must be in static cells, since there's no configuration record.
*
* There is no return value.
*/
/*
* This function gets called to create a per-directory configuration
* record. This will be called for the "default" server environment, and for
* each directory for which the parser finds any of our directives applicable.
* If a directory doesn't have any of our directives involved (i.e., they
* aren't in the .htaccess file, or a <Location>, <Directory>, or related
* block), this routine will *not* be called - the configuration for the
* closest ancestor is used.
*
* The return value is a pointer to the created module-specific
* structure.
*/
static void *gsw_create_dir_config(apr_pool_t *p, char *dirspec)
{
gsw_cfg *cfg;
char *dname = dirspec;
/*
* Allocate the space for our record from the pool supplied.
*/
cfg = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
/*
* Now fill in the defaults. If there are any `parent' configuration
* records, they'll get merged as part of a separate callback.
*/
cfg->local = 0;
cfg->congenital = 0;
cfg->cmode = CONFIG_MODE_DIRECTORY;
/*
* Finally, add our trace to the callback list.
*/
cfg->app_table = apr_table_make(p, 1); // default
dname = (dname != NULL) ? dname : "";
cfg->loc = apr_pstrcat(p, "DIR(", dname, ")", NULL);
return (void *) cfg;
}
/*
* This function gets called to merge two per-directory configuration
* records. This is typically done to cope with things like .htaccess files
* or <Location> directives for directories that are beneath one for which a
* configuration record was already created. The routine has the
* responsibility of creating a new record and merging the contents of the
* other two into it appropriately. If the module doesn't declare a merge
* routine, the record for the closest ancestor location (that has one) is
* used exclusively.
*
* The routine MUST NOT modify any of its arguments!
*
* The return value is a pointer to the created module-specific structure
* containing the merged values.
*/
static void *gsw_merge_dir_config(apr_pool_t *p, void *parent_conf,
void *newloc_conf)
{
gsw_cfg *merged_config = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
gsw_cfg *pconf = (gsw_cfg *) parent_conf;
gsw_cfg *nconf = (gsw_cfg *) newloc_conf;
char *note;
/*
* Some things get copied directly from the more-specific record, rather
* than getting merged.
*/
merged_config->local = nconf->local;
merged_config->loc = apr_pstrdup(p, nconf->loc);
// dave
merged_config->showApps = nconf->showApps;
// snprintf(merged_config->appInfo, 1000, nconf->appInfo);
merged_config->app_table = apr_table_copy(p, nconf->app_table);
/*
* Others, like the setting of the `congenital' flag, get ORed in. The
* setting of that particular flag, for instance, is TRUE if it was ever
* true anywhere in the upstream configuration.
*/
merged_config->congenital = (pconf->congenital | pconf->local);
/*
* If we're merging records for two different types of environment (server
* and directory), mark the new record appropriately. Otherwise, inherit
* the current value.
*/
merged_config->cmode =
(pconf->cmode == nconf->cmode) ? pconf->cmode : CONFIG_MODE_COMBO;
/*
* Now just record our being called in the trace list. Include the
* locations we were asked to merge.
*/
note = apr_pstrcat(p, "gsw_merge_dir_config(\"", pconf->loc, "\",\"",
nconf->loc, "\")", NULL);
return (void *) merged_config;
}
/*
* This function gets called to create a per-server configuration
* record. It will always be called for the "default" server.
*
* The return value is a pointer to the created module-specific
* structure.
*/
static void *gsw_create_server_config(apr_pool_t *p, server_rec *s)
{
gsw_cfg *cfg;
char *sname = s->server_hostname;
/*
* As with the gsw_create_dir_config() reoutine, we allocate and fill
* in an empty record.
*/
cfg = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
cfg->local = 0;
cfg->congenital = 0;
cfg->cmode = CONFIG_MODE_SERVER;
/*
* Note that we were called in the trace list.
*/
sname = (sname != NULL) ? sname : "";
cfg->loc = apr_pstrcat(p, "SVR(", sname, ")", NULL);
return (void *) cfg;
}
/*
* This function gets called to merge two per-server configuration
* records. This is typically done to cope with things like virtual hosts and
* the default server configuration The routine has the responsibility of
* creating a new record and merging the contents of the other two into it
* appropriately. If the module doesn't declare a merge routine, the more
* specific existing record is used exclusively.
*
* The routine MUST NOT modify any of its arguments!
*
* The return value is a pointer to the created module-specific structure
* containing the merged values.
*/
static void *gsw_merge_server_config(apr_pool_t *p, void *server1_conf,
void *server2_conf)
{
gsw_cfg *merged_config = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
gsw_cfg *s1conf = (gsw_cfg *) server1_conf;
gsw_cfg *s2conf = (gsw_cfg *) server2_conf;
char *note;
/*
* Our inheritance rules are our own, and part of our module's semantics.
* Basically, just note whence we came.
*/
merged_config->cmode =
(s1conf->cmode == s2conf->cmode) ? s1conf->cmode : CONFIG_MODE_COMBO;
merged_config->local = s2conf->local;
merged_config->congenital = (s1conf->congenital | s1conf->local);
merged_config->loc = apr_pstrdup(p, s2conf->loc);
/*
* Trace our call, including what we were asked to merge.
*/
note = apr_pstrcat(p, "gsw_merge_server_config(\"", s1conf->loc, "\",\"",
s2conf->loc, "\")", NULL);
return (void *) merged_config;
}
/*
* This routine is called before the server processes the configuration
* files. There is no return value.
*/
static int gsw_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
apr_pool_t *ptemp)
{
/*
* Log the call and exit.
*/
return OK;
}
/*
* Returns the number of instances configured
*/
static int app_count(server_rec *s)
{
gsw_cfg * cfg = (gsw_cfg *) ap_get_module_config(s->module_config, &gsw_module);
const apr_array_header_t * tarr = NULL;
if (cfg) {
tarr = apr_table_elts((apr_table_t *)cfg->app_table);
if (tarr) {
return tarr->nelts;
}
}
return 0;
}
void init_shared_mem(const apr_shm_t * xxx, int count, server_rec * s)
{
int i;
exipc_data *currentRecord = (exipc_data *) apr_shm_baseaddr_get(xxx);
for (i = 0;i<count;i++) {
currentRecord[i].last_response_time = 0;
currentRecord[i].load = 0;
currentRecord[i].unreachable = 0;
currentRecord[i].refusing = 0;
}
}
/*
* This routine is called to perform any module-specific fixing of header
* fields, et cetera. It is invoked just before any content-handler.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static int gsw_post_config(apr_pool_t *pconf, apr_pool_t *plog,
apr_pool_t *ptemp, server_rec *s)
{
void * data; /* These two help ensure that we only init once. */
const char * userdata_key = "gsw_init_module";
apr_status_t rs;
void * base;
const char * temp_dir;
int appcount = 0;
gsw_cfg * cfg;
//openlog("www", LOG_PID,LOG_USER);
/*
* The following checks if this routine has been called before.
* This is necessary because the parent process gets initialized
* a couple of times as the server starts up, and we don't want
* to create any more mutexes and shared memory segments than
* we're actually going to use.
*/
apr_pool_userdata_get(&data, userdata_key, s->process->pool);
if (!data) {
apr_pool_userdata_set((const void *) 1, userdata_key,
apr_pool_cleanup_null, s->process->pool);
return OK;
}
/* Create the shared memory segment */
/*
* Create a unique filename using our pid. This information is
* stashed in the global variable so the children inherit it.
* TODO get the location from the environment $TMPDIR or somesuch.
*/
cfg = ap_get_module_config(s->module_config, &gsw_module);
appcount = instance_count;
apr_temp_dir_get(&temp_dir, pconf);
apr_filepath_merge(&shmfilename, temp_dir,
apr_psprintf(pconf, "gsw_shm.%ld", (long int)getpid()), 0, pconf);
/* Now create that segment */
rs = apr_shm_create(&exipc_shm, (sizeof(exipc_data) * appcount),
(const char *) shmfilename, pconf);
if (rs != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rs, s,
"Failed to create shared memory segment on file %s",
shmfilename);
return HTTP_INTERNAL_SERVER_ERROR;
}
/* Create global mutex */
/*
* Create another unique filename to lock upon. Note that
* depending on OS and locking mechanism of choice, the file
* may or may not be actually created.
*/
apr_filepath_merge(&mutexfilename, temp_dir,
apr_psprintf(pconf, "gsw_mutex.%ld", (long int)getpid()), 0, pconf);
rs = apr_global_mutex_create(&exipc_mutex, (const char *) mutexfilename,
APR_LOCK_DEFAULT, pconf);
if (rs != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rs, s,
"Failed to create mutex on file %s",
mutexfilename);
return HTTP_INTERNAL_SERVER_ERROR;
}
#ifdef MOD_EXIPC_SET_MUTEX_PERMS
rs = unixd_set_global_mutex_perms(exipc_mutex);
if (rs != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
"Parent could not set permissions on Example IPC "
"mutex: check User and Group directives");
return HTTP_INTERNAL_SERVER_ERROR;
}
#endif /* MOD_EXIPC_SET_MUTEX_PERMS */
apr_global_mutex_lock(exipc_mutex);
/* Created it, now let's zero it out */
init_shared_mem(exipc_shm, appcount, s);
apr_global_mutex_unlock(exipc_mutex);
return OK;
}
/*
* This routine is called to perform any module-specific log file
* openings. It is invoked just before the post_config phase
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static int gsw_open_logs(apr_pool_t *pconf, apr_pool_t *plog,
apr_pool_t *ptemp, server_rec *s)
{
/*
* Log the call and exit.
*/
return OK;
}
/*
* All our process-death routine does is add its trace to the log.
*/
static apr_status_t gsw_child_exit(void *data)
{
char *note;
server_rec *s = data;
char *sname = s->server_hostname;
/*
* The arbitrary text we add to our trace entry indicates for which server
* we're being called.
*/
sname = (sname != NULL) ? sname : "";
note = apr_pstrcat(s->process->pool, "gsw_child_exit(", sname, ")", NULL);
return APR_SUCCESS;
}
/*
* This routine gets called when a child inits. We use it to attach
* to the shared memory segment, and reinitialize the mutex.
*/
static void gsw_child_init(apr_pool_t *p, server_rec *s)
{
apr_status_t rs;
/*
* Set up any module cells that ought to be initialised.
*/
setup_module_cells();
/*
* Re-open the mutex for the child. Note we're reusing
* the mutex pointer global here.
*/
rs = apr_global_mutex_child_init(&exipc_mutex,
(const char *) mutexfilename,
p);
if (rs != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
"Failed to reopen mutex on file %s",
mutexfilename);
/* There's really nothing else we can do here, since
* This routine doesn't return a status. */
exit(1); /* Ugly, but what else? */
}
apr_pool_cleanup_register(p, s, gsw_child_exit, gsw_child_exit);
}
/*
* XXX: This routine is called XXX
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static void gsw_insert_filter(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
/*
* Log the call and exit.
*/
}
/*
* XXX: This routine is called XXX
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static int gsw_quick_handler(request_rec *r, int lookup_uri)
{
return DECLINED;
}
/*
* This routine is called just after the server accepts the connection,
* but before it is handed off to a protocol module to be served. The point
* of this hook is to allow modules an opportunity to modify the connection
* as soon as possible. The core server uses this phase to setup the
* connection record based on the type of connection that is being used.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static int gsw_pre_connection(conn_rec *c, void *csd)
{
gsw_cfg *cfg;
cfg = our_cconfig(c);
return OK;
}
/* This routine is used to actually process the connection that was received.
* Only protocol modules should implement this hook, as it gives them an
* opportunity to replace the standard HTTP processing with processing for
* some other protocol. Both echo and POP3 modules are available as
* gsws.
*
* The return VALUE is OK, DECLINED, or HTTP_mumble. If we return OK, no
* further modules are called for this phase.
*/
// FIXME: remove??
static int gsw_process_connection(conn_rec *c)
{
return DECLINED;
}
/*
* This routine is called after the request has been read but before any other
* phases have been processed. This allows us to make decisions based upon
* the input header fields.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
* further modules are called for this phase.
*/
// FIXME: remove??
static int gsw_post_read_request(request_rec *r)
{
return DECLINED;
}
/*
* This routine gives our module an opportunity to translate the URI into an
* actual filename. If we don't do anything special, the server's default
* rules (Alias directives and the like) will continue to be followed.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
* further modules are called for this phase.
*/
static int gsw_translate_handler(request_rec *r)
{
if (strncmp(r->uri, "/wo/",4) != 0) {
return DECLINED;
}
return OK;
}
/*
* This routine maps r->filename to a physical file on disk. Useful for
* overriding default core behavior, including skipping mapping for
* requests that are not file based.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
* further modules are called for this phase.
*/
static int gsw_map_to_storage_handler(request_rec *r)
{
if (strncmp(r->uri, "/wo/",4) != 0) {
return DECLINED;
}
return OK;
}
/*
* this routine gives our module another chance to examine the request
* headers and to take special action. This is the first phase whose
* hooks' configuration directives can appear inside the <Directory>
* and similar sections, because at this stage the URI has been mapped
* to the filename. For gsw this phase can be used to block evil
* clients, while little resources were wasted on these.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK,
* the server will still call any remaining modules with an handler
* for this phase.
*/
static int gsw_header_parser_handler(request_rec *r)
{
return DECLINED;
}
/*
* This routine is called to check the authentication information sent with
* the request (such as looking up the user in a database and verifying that
* the [encrypted] password sent matches the one in the database).
*
* The return value is OK, DECLINED, or some HTTP_mumble error (typically
* HTTP_UNAUTHORIZED). If we return OK, no other modules are given a chance
* at the request during this phase.
*/
static int gsw_check_user_id(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
/*
* Don't do anything except log the call.
*/
return DECLINED;
}
/*
* This routine is called to check to see if the resource being requested
* requires authorisation.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
* other modules are called during this phase.
*
* If *all* modules return DECLINED, the request is aborted with a server
* error.
*/
static int gsw_auth_checker(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
/*
* Log the call and return OK, or access will be denied (even though we
* didn't actually do anything).
*/
return DECLINED;
}
/*
* This routine is called to check for any module-specific restrictions placed
* upon the requested resource. (See the mod_access module for an gsw.)
*
* The return value is OK, DECLINED, or HTTP_mumble. All modules with an
* handler for this phase are called regardless of whether their predecessors
* return OK or DECLINED. The first one to return any other status, however,
* will abort the sequence (and the request) as usual.
*/
static int gsw_access_checker(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
return DECLINED;
}
/*
* This routine is called to determine and/or set the various document type
* information bits, like Content-type (via r->content_type), language, et
* cetera.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
* further modules are given a chance at the request for this phase.
*/
static int gsw_type_checker(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
/*
* Log the call, but don't do anything else - and report truthfully that
* we didn't do anything.
*/
return DECLINED;
}
/*
* This routine is called to perform any module-specific fixing of header
* fields, et cetera. It is invoked just before any content-handler.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
* server will still call any remaining modules with an handler for this
* phase.
*/
static int gsw_fixer_upper(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
return OK;
}
/*
* This routine is called to perform any module-specific logging activities
* over and above the normal server things.
*
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, any
* remaining modules with an handler for this phase will still be called.
*/
static int gsw_logger(request_rec *r)
{
gsw_cfg *cfg;
cfg = our_dconfig(r);
return DECLINED;
}
/*--------------------------------------------------------------------------*/
/* */
/* Which functions are responsible for which hooks in the server. */
/* */
/*--------------------------------------------------------------------------*/
/*
* Each function our module provides to handle a particular hook is
* specified here. The functions are registered using
* ap_hook_foo(name, predecessors, successors, position)
* where foo is the name of the hook.
*
* The args are as follows:
* name -> the name of the function to call.
* predecessors -> a list of modules whose calls to this hook must be
* invoked before this module.
* successors -> a list of modules whose calls to this hook must be
* invoked after this module.
* position -> The relative position of this module. One of
* APR_HOOK_FIRST, APR_HOOK_MIDDLE, or APR_HOOK_LAST.
* Most modules will use APR_HOOK_MIDDLE. If multiple
* modules use the same relative position, Apache will
* determine which to call first.
* If your module relies on another module to run first,
* or another module running after yours, use the
* predecessors and/or successors.
*
* The number in brackets indicates the order in which the routine is called
* during request processing. Note that not all routines are necessarily
* called (such as if a resource doesn't have access restrictions).
* The actual delivery of content to the browser [9] is not handled by
* a hook; see the handler declarations below.
*/
static void gsw_register_hooks(apr_pool_t *p)
{
instance_count = DEFAULT_APP_COUNT; // default value
last_app_index = 0;
ap_hook_pre_config(gsw_pre_config, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_post_config(gsw_post_config, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_open_logs(gsw_open_logs, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_child_init(gsw_child_init, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_handler(gsw_handler, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_quick_handler(gsw_quick_handler, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_pre_connection(gsw_pre_connection, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_process_connection(gsw_process_connection, NULL, NULL, APR_HOOK_MIDDLE);
/* [1] post read_request handling */
ap_hook_post_read_request(gsw_post_read_request, NULL, NULL,
APR_HOOK_MIDDLE);
ap_hook_log_transaction(gsw_logger, NULL, NULL, APR_HOOK_MIDDLE);
#if 0
ap_hook_http_scheme(gsw_http_scheme, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_default_port(gsw_default_port, NULL, NULL, APR_HOOK_MIDDLE);
#endif
ap_hook_translate_name(gsw_translate_handler, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_map_to_storage(gsw_map_to_storage_handler, NULL,NULL, APR_HOOK_MIDDLE);
ap_hook_header_parser(gsw_header_parser_handler, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_check_user_id(gsw_check_user_id, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_fixups(gsw_fixer_upper, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_type_checker(gsw_type_checker, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_access_checker(gsw_access_checker, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_auth_checker(gsw_auth_checker, NULL, NULL, APR_HOOK_MIDDLE);
ap_hook_insert_filter(gsw_insert_filter, NULL, NULL, APR_HOOK_MIDDLE);
}
/*--------------------------------------------------------------------------*/
/* */
/* All of the routines have been declared now. Here's the list of */
/* directives specific to our module, and information about where they */
/* may appear and how the command parser should pass them to us for */
/* processing. Note that care must be taken to ensure that there are NO */
/* collisions of directive names between modules. */
/* */
/*--------------------------------------------------------------------------*/
/*
* List of directives specific to our module.
*/
/*
RSRC_CONF - httpd.conf at top level or in a VirtualHost context.
ACCESS_CONF - httpd.conf in a Directory context.
*/
// AP_INIT_RAW_ARGS("<GSWApplications",
// proxysection,
// (void*)1,
// RSRC_CONF,
static const command_rec gsw_cmds[] =
{
AP_INIT_FLAG("ShowApps",
set_ShowApps,
NULL,
RSRC_CONF,
"on | off if invalid requests should show available applications"),
AP_INIT_TAKE3("App",
set_App,
NULL,
RSRC_CONF,
"Container for directives affecting resources located in the proxied "
"location, in regular expression syntax"),
AP_INIT_TAKE1("InstanceCount",
set_inst_count,
NULL,
RSRC_CONF,
"InstanceCount <number> -- the number of instances to tell the module how much shared memory is needed"
),
{NULL}
};
/*--------------------------------------------------------------------------*/
/* */
/* Finally, the list of callback routines and data structures that provide */
/* the static hooks into our module from the other parts of the server. */
/* */
/*--------------------------------------------------------------------------*/
/*
* Module definition for configuration. If a particular callback is not
* needed, replace its routine name below with the word NULL.
*/
module AP_MODULE_DECLARE_DATA gsw_module =
{
STANDARD20_MODULE_STUFF,
gsw_create_dir_config, /* per-directory config creator */
gsw_merge_dir_config, /* dir config merger */
gsw_create_server_config, /* server config creator */
gsw_merge_server_config, /* server config merger */
gsw_cmds, /* command table */
gsw_register_hooks, /* set up other request processing hooks */
};