mirror of
https://github.com/gnustep/libs-gsweb.git
synced 2025-02-22 19:21:23 +00:00
use strncasecmp to be more tolerant with header case update x-webobjects-adaptor-version (old WO uses lowercase, I think) git-svn-id: svn+ssh://svn.gna.org/svn/gnustep/libs/gsweb/trunk@36725 72102866-910b-0410-8b05-ffd578937521
2243 lines
75 KiB
C
2243 lines
75 KiB
C
/*
|
|
Copyright (C) 2007-2008 Free Software Foundation, Inc.
|
|
|
|
Written by: David Wetzel <dave@turbocat.de>
|
|
Based on Apache2 Sample Module
|
|
|
|
This file is part of the GNUstep Web Library.
|
|
|
|
This library is free software; you can redistribute it and/or
|
|
modify it under the terms of the GNU Library General Public
|
|
License as published by the Free Software Foundation; either
|
|
version 2 of the License, or (at your option) any later version.
|
|
|
|
This library is distributed in the hope that it will be useful,
|
|
but WITHOUT ANY WARRANTY; without even the implied warranty of
|
|
MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
|
|
Library General Public License for more details.
|
|
|
|
You should have received a copy of the GNU Library General Public
|
|
License along with this library; if not, write to the Free
|
|
Software Foundation, Inc., 675 Mass Ave, Cambridge, MA 02139, USA.
|
|
*/
|
|
|
|
#include "httpd.h"
|
|
#include "http_config.h"
|
|
#include "http_core.h"
|
|
#include "http_log.h"
|
|
#include "http_main.h"
|
|
#include "http_protocol.h"
|
|
#include "http_request.h"
|
|
#include "util_script.h"
|
|
#include "http_connection.h"
|
|
#include "apr_tables.h"
|
|
|
|
#include "apr_strings.h"
|
|
|
|
#include <stdio.h>
|
|
|
|
#include <sys/socket.h>
|
|
#include <netinet/in.h>
|
|
#include <netinet/tcp.h>
|
|
#include <netdb.h>
|
|
#include <arpa/inet.h>
|
|
|
|
#if !defined(OS2) && !defined(WIN32) && !defined(BEOS) && !defined(NETWARE)
|
|
#include "unixd.h"
|
|
#define MOD_EXIPC_SET_MUTEX_PERMS /* XXX Apache should define something */
|
|
#endif
|
|
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* Data declarations. */
|
|
/* */
|
|
/* Here are the static cells and structure declarations private to our */
|
|
/* module. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
|
|
/*
|
|
* Sample configuration record. Used for both per-directory and per-server
|
|
* configuration data.
|
|
*
|
|
* It's perfectly reasonable to have two different structures for the two
|
|
* different environments. The same command handlers will be called for
|
|
* both, though, so the handlers need to be able to tell them apart. One
|
|
* possibility is for both structures to start with an int which is 0 for
|
|
* one and 1 for the other.
|
|
*
|
|
* Note that while the per-directory and per-server configuration records are
|
|
* available to most of the module handlers, they should be treated as
|
|
* READ-ONLY by all except the command and merge handlers. Sometimes handlers
|
|
* are handed a record that applies to the current location by implication or
|
|
* inheritance, and modifying it will change the rules for other locations.
|
|
*/
|
|
|
|
|
|
typedef struct gsw_cfg {
|
|
int cmode; /* Environment to which record applies
|
|
* (directory, server, or combination).
|
|
*/
|
|
#define CONFIG_MODE_SERVER 1
|
|
#define CONFIG_MODE_DIRECTORY 2
|
|
#define CONFIG_MODE_COMBO 3 /* Shouldn't ever happen. */
|
|
int local; /* Boolean: "Example" directive declared
|
|
* here?
|
|
*/
|
|
int congenital; /* Boolean: did we inherit an "Example"? */
|
|
char *trace; /* Pointer to trace string. */
|
|
char *loc; /* Location to which this record applies. */
|
|
int showApps;
|
|
apr_table_t * app_table;
|
|
} gsw_cfg;
|
|
|
|
#define MAX_URL_LENGTH 256
|
|
#define MAX_NAME_LENGTH 64
|
|
#define UNREACHABLE -10
|
|
#define INTERNAL_ERROR 500
|
|
|
|
#define RETRY_COUNT 3
|
|
|
|
typedef struct gsw_app_conf {
|
|
char app_name[MAX_NAME_LENGTH];
|
|
char host_name[MAX_NAME_LENGTH];
|
|
u_int16_t instance_number;
|
|
u_int16_t port;
|
|
u_int16_t total_index; // index in shared memory
|
|
char redirect_url[MAX_URL_LENGTH]; /* in case of error */
|
|
|
|
} gsw_app_conf;
|
|
|
|
|
|
#define GSW_INST_CACHE "gsw_inst_cache"
|
|
#define X_WO_VERSION_HEADER "x-webobjects-adaptor-version: 20130612\r\n"
|
|
#define SERVER_SOFTWARE "SERVER_SOFTWARE"
|
|
#define SERVER_NAME "SERVER_NAME"
|
|
#define SERVER_PORT "SERVER_PORT"
|
|
#ifndef REMOTE_HOST
|
|
#define REMOTE_HOST "REMOTE_HOST"
|
|
#endif
|
|
#define DOCUMENT_ROOT "DOCUMENT_ROOT"
|
|
#define SERVER_ADMIN "SERVER_ADMIN"
|
|
#define SCRIPT_FILENAME "SCRIPT_FILENAME"
|
|
#define REMOTE_PORT "REMOTE_PORT"
|
|
#define REMOTE_ADDR "REMOTE_ADDR"
|
|
#define REMOTE_USER "REMOTE_USER"
|
|
#define AUTH_TYPE "AUTH_TYPE"
|
|
#define REMOTE_IDENT "REMOTE_IDENT"
|
|
#define REDIRECT_QUERY_STRING "REDIRECT_QUERY_STRING"
|
|
#define REDIRECT_URL "REDIRECT_URL"
|
|
#define CONTENT_LENGTH "content-length"
|
|
#define DEFAULT_APP_COUNT 10
|
|
#define REFUSING_SESSIONS_HEADER "x-webobjects-refusenewsessions: "
|
|
|
|
// used to read configs
|
|
static int instance_count;
|
|
static int last_app_index;
|
|
|
|
|
|
/*
|
|
* Let's set up a module-local static cell to point to the accreting callback
|
|
* trace. As each API callback is made to us, we'll tack on the particulars
|
|
* to whatever we've already recorded. To avoid massive memory bloat as
|
|
* directories are walked again and again, we record the routine/environment
|
|
* the first time (non-request context only), and ignore subsequent calls for
|
|
* the same routine/environment.
|
|
*/
|
|
static const char *trace = NULL;
|
|
static apr_table_t *static_calls_made = NULL;
|
|
|
|
/*
|
|
* To avoid leaking memory from pools other than the per-request one, we
|
|
* allocate a module-private pool, and then use a sub-pool of that which gets
|
|
* freed each time we modify the trace. That way previous layers of trace
|
|
* data don't get lost.
|
|
*/
|
|
static apr_pool_t *gsw_pool = NULL;
|
|
static apr_pool_t *gsw_subpool = NULL;
|
|
|
|
|
|
// shared memory
|
|
apr_shm_t *exipc_shm;
|
|
char *shmfilename;
|
|
apr_global_mutex_t *exipc_mutex;
|
|
char *mutexfilename;
|
|
|
|
|
|
typedef struct exipc_data {
|
|
apr_time_t last_response_time; // in sec since January 1, 1970
|
|
apr_time_t last_request_time; // in sec since January 1, 1970
|
|
u_int32_t load;
|
|
u_int8_t unreachable; // 0=online 1=unreachable
|
|
u_int8_t refusing; // 0=serving new sessions 1=refusing
|
|
} exipc_data;
|
|
|
|
/*
|
|
* Declare ourselves so the configuration routines can find and know us.
|
|
* We'll fill it in at the end of the module.
|
|
*/
|
|
module AP_MODULE_DECLARE_DATA gsw_module;
|
|
|
|
#define ADAPTOR_PREFIX "/wo/"
|
|
// xx handler uri: wo/TCWebMail.woa/1/wo/xxxx
|
|
// PREFIX/APPNAME.woa/INSTANCE/...
|
|
|
|
|
|
|
|
// callback function for looping the table
|
|
|
|
int print_app(void *rec, const char *key, gsw_app_conf *appconf)
|
|
{
|
|
|
|
request_rec *r = rec;
|
|
// gsw_app_conf *appconf = (gsw_app_conf *) value;
|
|
|
|
if (!appconf) {
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "print_app: got a NULL conf");
|
|
return 0;
|
|
}
|
|
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Key:'%s'", key);
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "app_name:'%s'", appconf->app_name);
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "host_name:'%s'", appconf->host_name);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "instance_number:'%u'", appconf->instance_number);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "load:'%d'", appconf->load);
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "port:'%u'", appconf->port);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "unreachable:'%d'", appconf->unreachable);
|
|
|
|
return 1; // continue loop
|
|
}
|
|
|
|
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* These routines are strictly internal to this module, and support its */
|
|
/* operation. They are not referenced by any external portion of the */
|
|
/* server. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
|
|
/*
|
|
* Locate our directory configuration record for the current request.
|
|
*/
|
|
static gsw_cfg *our_dconfig(const request_rec *r)
|
|
{
|
|
return (gsw_cfg *) ap_get_module_config(r->per_dir_config, &gsw_module);
|
|
}
|
|
|
|
/*
|
|
* Likewise for our configuration record for a connection.
|
|
*/
|
|
static gsw_cfg *our_cconfig(const conn_rec *c)
|
|
{
|
|
return (gsw_cfg *) ap_get_module_config(c->conn_config, &gsw_module);
|
|
}
|
|
|
|
/*
|
|
* This routine sets up some module-wide cells if they haven't been already.
|
|
*/
|
|
static void setup_module_cells(void)
|
|
{
|
|
/*
|
|
* If we haven't already allocated our module-private pool, do so now.
|
|
*/
|
|
if (gsw_pool == NULL) {
|
|
apr_pool_create(&gsw_pool, NULL);
|
|
|
|
};
|
|
/*
|
|
* Likewise for the table of routine/environment pairs we visit outside of
|
|
* request context.
|
|
*/
|
|
if (static_calls_made == NULL) {
|
|
static_calls_made = apr_table_make(gsw_pool, 16);
|
|
};
|
|
}
|
|
|
|
|
|
void * read_shared_mem(apr_pool_t * pool, int appcount)
|
|
{
|
|
apr_size_t memsize = apr_shm_size_get(exipc_shm);
|
|
void * mem = NULL;
|
|
|
|
if (memsize) {
|
|
mem = apr_pcalloc(pool, memsize);
|
|
|
|
if (mem) {
|
|
void * base = NULL;
|
|
apr_status_t rv;
|
|
|
|
|
|
rv = apr_global_mutex_lock(exipc_mutex);
|
|
if (rv != APR_SUCCESS) {
|
|
//char errstr[1024];
|
|
//apr_strerror(rv,errstr,1024);
|
|
//syslog(LOG_ERR,"rv != APR_SUCCESS %s\n", errstr);
|
|
return NULL;
|
|
}
|
|
base = apr_shm_baseaddr_get(exipc_shm);
|
|
memcpy(mem, base, memsize);
|
|
apr_global_mutex_unlock(exipc_mutex);
|
|
}
|
|
}
|
|
|
|
return mem;
|
|
}
|
|
|
|
|
|
void mark_unreachable(request_rec *r, gsw_app_conf * app)
|
|
{
|
|
exipc_data * mem = NULL;
|
|
apr_time_t now = apr_time_now();
|
|
u_int16_t index = app->total_index;
|
|
|
|
apr_global_mutex_lock(exipc_mutex);
|
|
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
|
|
|
|
mem[index].last_request_time = now;
|
|
mem[index].unreachable = 1;
|
|
|
|
apr_global_mutex_unlock(exipc_mutex);
|
|
}
|
|
|
|
void mark_refusing(gsw_app_conf * app)
|
|
{
|
|
exipc_data * mem = NULL;
|
|
apr_time_t now = apr_time_now();
|
|
u_int16_t index = app->total_index;
|
|
|
|
apr_global_mutex_lock(exipc_mutex);
|
|
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
|
|
|
|
mem[index].last_request_time = now;
|
|
mem[index].refusing = 1;
|
|
|
|
apr_global_mutex_unlock(exipc_mutex);
|
|
}
|
|
|
|
void update_app_statistics(gsw_app_conf * app, apr_time_t last_request_time, apr_time_t last_response_time, u_int32_t load)
|
|
{
|
|
exipc_data * mem = NULL;
|
|
u_int16_t index = app->total_index;
|
|
|
|
apr_global_mutex_lock(exipc_mutex);
|
|
mem = (exipc_data *) apr_shm_baseaddr_get(exipc_shm);
|
|
|
|
mem[index].last_request_time = last_request_time;
|
|
mem[index].last_response_time = last_response_time;
|
|
mem[index].load = load;
|
|
mem[index].unreachable = 0;
|
|
|
|
apr_global_mutex_unlock(exipc_mutex);
|
|
}
|
|
|
|
|
|
/*
|
|
*
|
|
*/
|
|
|
|
gsw_app_conf * find_app_by_name(char * name, gsw_cfg *cfg, request_rec *r)
|
|
{
|
|
|
|
if (((name) && (strlen(name))) && (cfg->app_table))
|
|
{
|
|
|
|
const apr_array_header_t *tarr = apr_table_elts(cfg->app_table);
|
|
const apr_table_entry_t *telts = (const apr_table_entry_t*)tarr->elts;
|
|
int i;
|
|
apr_time_t t;
|
|
exipc_data * mem;
|
|
int appcount = tarr->nelts;
|
|
u_int32_t lastload = UINT32_MAX;
|
|
int lastindex = -1;
|
|
int lastUnreachableIndex = -1;
|
|
|
|
if (!appcount) {
|
|
return NULL;
|
|
}
|
|
|
|
mem = read_shared_mem(r->pool, appcount);
|
|
if (!mem) {
|
|
return NULL;
|
|
}
|
|
|
|
|
|
// current time
|
|
t = apr_time_now();
|
|
// substract 300 sec / 5 min
|
|
t = t - apr_time_from_sec(300);
|
|
|
|
for (i = 0; i < tarr->nelts; i++) {
|
|
gsw_app_conf *appconf = (gsw_app_conf *) telts[i].val;
|
|
|
|
if ((strcasecmp(appconf->app_name, name) == 0)) {
|
|
// enable unreachable instances after some time
|
|
if (mem[i].last_request_time < t) {
|
|
mem[i].unreachable = 0;
|
|
mem[i].refusing = 0;
|
|
}
|
|
|
|
if ((mem[i].unreachable == 0) && (mem[i].refusing == 0)) {
|
|
if (mem[i].load <= lastload) {
|
|
lastindex = i;
|
|
lastload = mem[i].load;
|
|
}
|
|
} else {
|
|
// if there is only one app, we have to hit it anyways.
|
|
if ((appcount == 1)) {
|
|
if ((mem[i].unreachable == 1)) {
|
|
lastUnreachableIndex = i;
|
|
}
|
|
}
|
|
}
|
|
|
|
}
|
|
}
|
|
if (lastindex >= 0) {
|
|
return (gsw_app_conf *) telts[lastindex].val;
|
|
}
|
|
if (lastUnreachableIndex >= 0) {
|
|
return (gsw_app_conf *) telts[lastUnreachableIndex].val;
|
|
}
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
gsw_app_conf * find_app(request_rec *r)
|
|
{
|
|
char * appName;
|
|
char * instance_str = NULL;
|
|
char app_name[128];
|
|
int instance_nr = -1;
|
|
gsw_cfg * cfg = NULL;
|
|
gsw_app_conf * app_conf = NULL;
|
|
|
|
if ((appName = index(r->uri, '/'))) {
|
|
appName++;
|
|
if ((appName = index(appName, '/'))) {
|
|
appName++;
|
|
} else {
|
|
return NULL;
|
|
}
|
|
} else {
|
|
return NULL;
|
|
}
|
|
|
|
strncpy(app_name, appName, sizeof(app_name));
|
|
//ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "app_name '%s'", app_name);
|
|
|
|
if ((appName = index(app_name, '.'))) {
|
|
*appName = '\0';
|
|
appName++;
|
|
|
|
// now get the instance number if any
|
|
|
|
if ((instance_str = index(appName, '/'))) {
|
|
instance_str++;
|
|
if ((appName = index(instance_str, '/'))) {
|
|
*appName = '\0';
|
|
instance_nr = atoi(instance_str);
|
|
// parse error?
|
|
if (instance_nr == 0) {
|
|
instance_nr = -1;
|
|
}
|
|
}
|
|
}
|
|
|
|
} else {
|
|
// return NULL;
|
|
|
|
}
|
|
|
|
cfg = our_dconfig(r);
|
|
|
|
if (instance_nr != -1) {
|
|
char tmp_key[128];
|
|
|
|
snprintf(tmp_key, sizeof(tmp_key), "%s:%d", app_name, instance_nr);
|
|
|
|
app_conf = (gsw_app_conf *) apr_table_get(cfg->app_table, (const char *)tmp_key);
|
|
|
|
return app_conf;
|
|
|
|
}
|
|
|
|
app_conf = find_app_by_name(app_name, cfg, r);
|
|
|
|
//print_app(r, NULL, app_conf);
|
|
|
|
return app_conf;
|
|
}
|
|
|
|
|
|
// returns the socket or <0 on error
|
|
|
|
int connect_host(char * hostname, u_int16_t port)
|
|
{
|
|
int ok;
|
|
struct sockaddr_in socketAddress;
|
|
in_addr_t in_addr;
|
|
int sock;
|
|
int flag = 1;
|
|
|
|
socketAddress.sin_addr.s_addr = 0;
|
|
|
|
sock = socket(AF_INET, SOCK_STREAM, 0);
|
|
|
|
if (socket < 0) {
|
|
return -1;
|
|
}
|
|
|
|
ok = setsockopt(sock, /* socket affected */
|
|
IPPROTO_TCP, /* set option at TCP level */
|
|
TCP_NODELAY, /* name of option */
|
|
(char *) &flag, /* the cast is historical cruft */
|
|
sizeof(int)); /* length of option value */
|
|
if (ok != 0) {
|
|
goto saveclose;
|
|
}
|
|
|
|
if (inet_aton(hostname, &socketAddress.sin_addr) == 0) {
|
|
// failure
|
|
struct hostent * host = NULL;
|
|
|
|
host = gethostbyname((const char *)hostname);
|
|
if (host != NULL) {
|
|
memcpy(&socketAddress.sin_addr, host->h_addr_list[0], host->h_length);
|
|
}
|
|
|
|
}
|
|
|
|
socketAddress.sin_family = AF_INET;
|
|
socketAddress.sin_port = htons(port);
|
|
|
|
if (socketAddress.sin_addr.s_addr != 0) {
|
|
ok = connect(sock, (struct sockaddr *)&socketAddress, sizeof(struct sockaddr_in));
|
|
|
|
if (ok == 0) {
|
|
return sock;
|
|
}
|
|
}
|
|
|
|
saveclose:
|
|
|
|
close(sock);
|
|
return -1;
|
|
}
|
|
|
|
static int write_sock(int socket, const void *data, size_t len, request_rec *r)
|
|
{
|
|
int rval = 0;
|
|
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "sending '%s' len:%d", data, len);
|
|
|
|
rval = send(socket, data, len, 0);
|
|
|
|
if (rval < 0) {
|
|
|
|
/*
|
|
* Anything except EAGAIN or EWOULDBLOCK is trouble. If it's
|
|
* EPIPE or ECONNRESET, assume we've lost the backend
|
|
* connection permanently.
|
|
*/
|
|
switch (errno) {
|
|
case EAGAIN:
|
|
break;
|
|
case EINTR:
|
|
break;
|
|
default:
|
|
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, "cannot write to socket '%s'", data);
|
|
return -1;
|
|
break;
|
|
}
|
|
}
|
|
return 0;
|
|
}
|
|
|
|
void * read_sock_line(int socket, request_rec *r, apr_pool_t * pool)
|
|
{
|
|
size_t rval = 1;
|
|
int i = 0;
|
|
int done = 0;
|
|
char buffer[1024];
|
|
char b;
|
|
|
|
|
|
while (((done == 0) && (i < sizeof(buffer) -1)) && (rval >0)) {
|
|
rval= read(socket, &b, 1);
|
|
|
|
if ((rval == -1)) {
|
|
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, "read_sock_line:'%s'", strerror(errno));
|
|
|
|
return NULL;
|
|
}
|
|
|
|
buffer[i] = b;
|
|
|
|
if (b == '\n') {
|
|
done = 1;
|
|
buffer[i] = '\0';
|
|
if ((i>0) && (buffer[i-1] == '\r')) {
|
|
buffer[i-1] = '\0';
|
|
}
|
|
}
|
|
i++;
|
|
}
|
|
|
|
buffer[i] = '\0';
|
|
|
|
// in case we got a \0 in the string?
|
|
i = strlen(buffer);
|
|
if (i > 0) {
|
|
void * newBuf = apr_palloc(pool,i+1);
|
|
strncpy(newBuf, buffer, i+1);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "read_sock_line:'%s'", newBuf);
|
|
return newBuf;
|
|
}
|
|
return NULL;
|
|
}
|
|
|
|
|
|
/*
|
|
HTTP/1.0 200 OK NeXT WebObjects
|
|
x-webobjects-loadaverage: 1
|
|
content-length: 3315
|
|
content-type: text/html
|
|
x-webobjects-adaptorstats: applicationThreadCreation=+0.000s applicationThreadRun=+0.000s applicationBeginDispatchRequest=+1.368s applicationEndDispatchRequest=+1.387s applicationDispatchRequest=0.019s applicationBeginSendResponse=+1.387s applicationTimeSpent=1.387s
|
|
|
|
*/
|
|
|
|
static int send_header_string(int soc, const char * key, const char * value, request_rec *r)
|
|
{
|
|
int retval = 0;
|
|
char tmpStr[512];
|
|
|
|
snprintf(tmpStr, sizeof(tmpStr)-1, "%s: %s\r\n",key, value);
|
|
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
|
|
}
|
|
|
|
const char * fixRequestString(request_rec *r, gsw_app_conf *app)
|
|
{
|
|
char * req_str = r->the_request;
|
|
size_t len = strlen(req_str);
|
|
char * appName = apr_palloc(r->pool,len+5);
|
|
char * spaceStr;
|
|
char * instanceStr;
|
|
char * restStr = NULL;
|
|
int instance_nr = -1;
|
|
char * newString = NULL;
|
|
|
|
strncpy(appName, req_str, len);
|
|
|
|
// GET /wo/PBX HTTP/1.1
|
|
|
|
if (appName = index(appName, '/')) {
|
|
appName++;
|
|
if (appName = index(appName, '/')) {
|
|
appName++;
|
|
if (spaceStr = index(appName, ' ')) {
|
|
*spaceStr = '\0';
|
|
instanceStr = appName;
|
|
instanceStr++;
|
|
if (instanceStr = index(appName, '/')) {
|
|
*instanceStr = '\0';
|
|
instanceStr++;
|
|
if (spaceStr = index(instanceStr, '/')) {
|
|
*spaceStr = '\0';
|
|
restStr = spaceStr;
|
|
restStr++;
|
|
}
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "instanceStr:'%s'", instanceStr);
|
|
}
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "appName:'%s'", appName);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "restStr:'%s'", restStr);
|
|
}
|
|
}
|
|
}
|
|
|
|
if (!restStr) {
|
|
restStr = "";
|
|
}
|
|
|
|
if (spaceStr = index(appName, '.')) {
|
|
*spaceStr = '\0';
|
|
}
|
|
|
|
|
|
newString = apr_psprintf(r->pool, "%s %s%s.woa/%d/%s HTTP/1.1\r\n", r->method, ADAPTOR_PREFIX, appName, app->instance_number
|
|
,restStr);
|
|
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "newString:'%s'", newString);
|
|
|
|
|
|
return newString;
|
|
}
|
|
|
|
static int send_headers(int soc, gsw_app_conf *app, request_rec *r)
|
|
{
|
|
apr_array_header_t * hdrs_arr = NULL;
|
|
apr_table_entry_t * hdrs = NULL;
|
|
int retval = 0;
|
|
int i = 0;
|
|
char tmpStr[512];
|
|
const char * ap_str;
|
|
server_rec * s = r->server;
|
|
conn_rec * c = r->connection;
|
|
|
|
hdrs_arr = (apr_array_header_t*) apr_table_elts(r->headers_in);
|
|
hdrs = (apr_table_entry_t *) hdrs_arr->elts;
|
|
|
|
// GET /wo/PBX HTTP/1.1
|
|
|
|
|
|
//snprintf(tmpStr, sizeof(tmpStr), "%s\r\n", r->the_request);
|
|
strncpy(tmpStr, fixRequestString(r,app), sizeof(tmpStr));
|
|
|
|
retval = write_sock(soc,tmpStr,strlen(tmpStr), r);
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "send_headers:'%s'", tmpStr);
|
|
|
|
if (retval != 0) {
|
|
return retval;
|
|
}
|
|
|
|
for (i = 0; i < hdrs_arr->nelts; ++i) {
|
|
if (!hdrs[i].key)
|
|
continue;
|
|
snprintf(tmpStr, sizeof(tmpStr), "%s: %s\r\n", hdrs[i].key, hdrs[i].val);
|
|
retval = write_sock(soc,tmpStr,strlen(tmpStr), r);
|
|
if (retval != 0) {
|
|
return retval;
|
|
}
|
|
}
|
|
// write x-webobjects-adaptor-version to the app
|
|
snprintf(tmpStr, sizeof(tmpStr), X_WO_VERSION_HEADER);
|
|
|
|
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
|
|
|
|
retval = send_header_string(soc, SERVER_NAME, s->server_hostname, r);
|
|
|
|
// SERVER_PORT
|
|
snprintf(tmpStr, sizeof(tmpStr), "SERVER_PORT: %hu\r\n",ap_get_server_port(r));
|
|
retval = write_sock(soc, tmpStr, strlen(tmpStr), r);
|
|
|
|
retval = send_header_string(soc, REMOTE_ADDR, c->remote_ip, r);
|
|
|
|
if (r->user != NULL) {
|
|
retval = send_header_string(soc, REMOTE_USER, r->user, r);
|
|
}
|
|
|
|
if (r->ap_auth_type != NULL) {
|
|
retval = send_header_string(soc, AUTH_TYPE, r->ap_auth_type, r);
|
|
}
|
|
|
|
ap_str = (char *)ap_get_remote_logname(r);
|
|
|
|
if (ap_str != NULL) {
|
|
retval = send_header_string(soc, REMOTE_IDENT, ap_str, r);
|
|
}
|
|
|
|
// the_request
|
|
if (r->unparsed_uri != NULL) {
|
|
retval = send_header_string(soc, "the_request", r->the_request, r);
|
|
}
|
|
|
|
/*
|
|
* Apache custom responses. If we have redirected, add special headers
|
|
*/
|
|
|
|
if (r->prev) {
|
|
if (r->prev->args) {
|
|
retval = send_header_string(soc, REDIRECT_QUERY_STRING, r->prev->args, r);
|
|
}
|
|
if (r->prev->uri) {
|
|
retval = send_header_string(soc, REDIRECT_URL, r->prev->uri, r);
|
|
}
|
|
}
|
|
|
|
return retval;
|
|
}
|
|
|
|
uint32_t get_content_len(request_rec *r)
|
|
{
|
|
apr_array_header_t * hdrs_arr = NULL;
|
|
apr_table_entry_t * hdrs = NULL;
|
|
int i = 0;
|
|
const char * ap_str;
|
|
uint32_t len = 0;
|
|
|
|
hdrs_arr = (apr_array_header_t*) apr_table_elts(r->headers_in);
|
|
hdrs = (apr_table_entry_t *) hdrs_arr->elts;
|
|
|
|
for (i = 0; i < hdrs_arr->nelts; ++i) {
|
|
if (!hdrs[i].key)
|
|
continue;
|
|
if (strcasecmp(hdrs[i].key, CONTENT_LENGTH) == 0) {
|
|
len = atoi((const char *)hdrs[i].val);
|
|
break;
|
|
}
|
|
}
|
|
return len;
|
|
}
|
|
|
|
void * read_post_data(request_rec *r, apr_off_t clength, apr_pool_t * pool, gsw_app_conf * app)
|
|
{
|
|
char * postbuf = NULL;
|
|
char * tmpbuf = NULL;
|
|
if ((r->method_number == M_POST) && (ap_should_client_block(r))) {
|
|
apr_off_t bytesread = 0;
|
|
apr_off_t len_read = 0;
|
|
|
|
if (!clength) {
|
|
return NULL;
|
|
}
|
|
|
|
postbuf = apr_palloc(pool,clength+1);
|
|
tmpbuf = postbuf;
|
|
|
|
while (bytesread < clength) {
|
|
len_read = ap_get_client_block(r, tmpbuf, clength - bytesread);
|
|
if (len_read < 0) {
|
|
return NULL;
|
|
}
|
|
bytesread += len_read;
|
|
tmpbuf += len_read;
|
|
}
|
|
postbuf[clength] = '\0';
|
|
}
|
|
|
|
return postbuf;
|
|
}
|
|
|
|
static int handle_request(request_rec *r, gsw_app_conf * app, void * postdata, uint32_t contentLen)
|
|
{
|
|
int soc = -1;
|
|
char * newBuf = NULL;
|
|
apr_pool_t * sub_pool = NULL;
|
|
int refusing_seen = 0;
|
|
int load_avr_seen = 0;
|
|
int length_seen = 0;
|
|
u_int32_t newload = 0;
|
|
size_t content_length = 0;
|
|
char * content_type = NULL;
|
|
char * content_encoding = NULL;
|
|
char * location = NULL;
|
|
int http_status = DECLINED;
|
|
char tmpStr[512];
|
|
apr_time_t request_time;
|
|
apr_time_t done_time;
|
|
|
|
apr_pool_create(&sub_pool, r->pool);
|
|
|
|
|
|
soc = connect_host(app->host_name, app->port);
|
|
|
|
if (soc != -1) {
|
|
if (send_headers(soc, app, r) == 0) {
|
|
int headers_done = 0;
|
|
|
|
request_time = apr_time_now();
|
|
// check if we are on a POST trip...
|
|
if (postdata) {
|
|
write_sock(soc, CRLF, 2, r);
|
|
write_sock(soc, postdata, contentLen, r);
|
|
}
|
|
write_sock(soc, CRLF, 2, r);
|
|
|
|
// HTTP/1.0 200 OK NeXT WebObjects
|
|
if (newBuf = read_sock_line(soc, r, sub_pool)) {
|
|
if ((strncasecmp(newBuf,"HTTP/",5) != 0) || (strlen(newBuf) < 15)) {
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Got '%s' but no 'HTTP/...'", newBuf);
|
|
apr_pool_destroy(sub_pool);
|
|
return DECLINED;
|
|
} else {
|
|
newBuf[12] = '\0';
|
|
http_status = atoi(newBuf+9);
|
|
if (http_status==200) {
|
|
http_status=OK;
|
|
}
|
|
if (http_status == 302) {
|
|
r->status = http_status;
|
|
}
|
|
}
|
|
}
|
|
|
|
while (headers_done == 0) {
|
|
newBuf = read_sock_line(soc, r, sub_pool);
|
|
int copy_header = 1;
|
|
|
|
if (newBuf != NULL) {
|
|
if (load_avr_seen == 0) {
|
|
if (strncasecmp(newBuf, "x-webobjects-loadaverage: ", 26) == 0) {
|
|
load_avr_seen = 1;
|
|
newload = atoi(newBuf+26);
|
|
copy_header = 0;
|
|
}
|
|
}
|
|
if (refusing_seen == 0) {
|
|
if (strncasecmp(newBuf, REFUSING_SESSIONS_HEADER, 32) == 0) {
|
|
refusing_seen = 1;
|
|
copy_header = 0;
|
|
}
|
|
}
|
|
if (length_seen == 0) {
|
|
if (strncasecmp(newBuf, "content-length: ", 16) == 0) {
|
|
length_seen = 1;
|
|
content_length = atol(newBuf+16);
|
|
snprintf(tmpStr, sizeof(tmpStr), "%d", content_length);
|
|
apr_table_set(r->headers_out, "Content-Length", tmpStr);
|
|
copy_header = 0;
|
|
}
|
|
}
|
|
if (content_type == NULL) {
|
|
if (strncasecmp(newBuf, "content-type: ", 14) == 0) {
|
|
content_type = newBuf+14;
|
|
copy_header = 1;
|
|
}
|
|
}
|
|
if (content_encoding == NULL) {
|
|
if (strncasecmp(newBuf, "content-encoding: ", 18) == 0) {
|
|
content_encoding = newBuf+18;
|
|
apr_table_set(r->headers_out, "Content-Encoding", content_encoding);
|
|
copy_header = 0;
|
|
}
|
|
}
|
|
if (location == NULL) {
|
|
// Apple has a bug, giving us a 'L', so we do that too but accept a 'l' too -- dw
|
|
if (strncasecmp(newBuf, "location: ", 10) == 0) {
|
|
location = newBuf+10;
|
|
apr_table_set(r->headers_out, "Location", location);
|
|
//ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "location '%s'", location);
|
|
copy_header = 0;
|
|
}
|
|
}
|
|
if ((copy_header == 1)) {
|
|
char * hdrValue = index(newBuf, ':');
|
|
|
|
if (hdrValue) {
|
|
*hdrValue = '\0';
|
|
hdrValue++; // space
|
|
hdrValue++; // first pos.
|
|
|
|
apr_table_set(r->headers_out, newBuf, hdrValue);
|
|
}
|
|
}
|
|
} else {
|
|
headers_done = 1;
|
|
}
|
|
} // while
|
|
|
|
// do the request
|
|
if ((content_length > 0)) {
|
|
size_t bytesDone = 0;
|
|
size_t blockSize = 1024;
|
|
size_t rval=1;
|
|
char * transferBuf = NULL;
|
|
|
|
if (content_type != NULL) {
|
|
ap_set_content_type(r, content_type);
|
|
}
|
|
|
|
if (content_length < blockSize) {
|
|
blockSize = content_length;
|
|
}
|
|
transferBuf = apr_palloc(sub_pool, blockSize);
|
|
if (! transferBuf) {
|
|
goto internal_error;
|
|
}
|
|
|
|
while ((bytesDone < content_length) && (rval > 0)) {
|
|
rval= read(soc, transferBuf, blockSize);
|
|
if (rval > 0) {
|
|
ap_rwrite(transferBuf, rval, r);
|
|
bytesDone += rval;
|
|
}
|
|
}
|
|
}
|
|
}
|
|
|
|
close(soc);
|
|
|
|
done_time = apr_time_now();
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "Request took %d ms", apr_time_msec(done_time - request_time));
|
|
|
|
if ((http_status==302) && (refusing_seen==1)) {
|
|
mark_refusing(app);
|
|
} else {
|
|
update_app_statistics(app, request_time, done_time, newload);
|
|
}
|
|
|
|
} else { // -1
|
|
http_status = UNREACHABLE;
|
|
}
|
|
|
|
//apr_pool_destroy(sub_pool);
|
|
|
|
return http_status;
|
|
|
|
internal_error:
|
|
close(soc);
|
|
return INTERNAL_ERROR;
|
|
}
|
|
|
|
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* We prototyped the various syntax for command handlers (routines that */
|
|
/* are called when the configuration parser detects a directive declared */
|
|
/* by our module) earlier. Now we actually declare a "real" routine that */
|
|
/* will be invoked by the parser when our "real" directive is */
|
|
/* encountered. */
|
|
/* */
|
|
/* If a command handler encounters a problem processing the directive, it */
|
|
/* signals this fact by returning a non-NULL pointer to a string */
|
|
/* describing the problem. */
|
|
/* */
|
|
/* The magic return value DECLINE_CMD is used to deal with directives */
|
|
/* that might be declared by multiple modules. If the command handler */
|
|
/* returns NULL, the directive was processed; if it returns DECLINE_CMD, */
|
|
/* the next module (if any) that declares the directive is given a chance */
|
|
/* at it. If it returns any other value, it's treated as the text of an */
|
|
/* error message. */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* Command handler for the NO_ARGS "Example" directive. All we do is mark the
|
|
* call in the trace log, and flag the applicability of the directive to the
|
|
* current location in that location's configuration record.
|
|
*/
|
|
static const char *cmd_gsw(cmd_parms *cmd, void *mconfig)
|
|
{
|
|
gsw_cfg *cfg = (gsw_cfg *) mconfig;
|
|
|
|
/*
|
|
* "Example Wuz Here"
|
|
*/
|
|
cfg->local = 1;
|
|
return NULL;
|
|
}
|
|
|
|
|
|
static const char * set_ShowApps(cmd_parms *cmd, void *mconfig, int mybool)
|
|
{
|
|
gsw_cfg *cfg = (gsw_cfg *) mconfig;
|
|
|
|
cfg->showApps = mybool;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
static const char *set_inst_count(cmd_parms *cmd, void *key, const char *value)
|
|
{
|
|
gsw_cfg *cfg = ap_get_module_config(cmd->server->module_config, &gsw_module);
|
|
|
|
if (instance_count != DEFAULT_APP_COUNT) {
|
|
return "InstanceCount is only allowed once.";
|
|
}
|
|
|
|
instance_count = atoi((char *)value);
|
|
|
|
// success
|
|
return NULL;
|
|
}
|
|
|
|
static const char * set_App(cmd_parms *cmd, void *mconfig,
|
|
char *word1, char *word2, char *word3)
|
|
{
|
|
const command_rec *thiscmd = cmd->cmd;
|
|
|
|
gsw_cfg *cfg = (gsw_cfg *) mconfig;
|
|
gsw_app_conf * appConf = NULL;
|
|
char tmpStr[128];
|
|
char * appName = NULL;
|
|
char * instanceStr = NULL;
|
|
char * hostName = NULL;
|
|
char * portStr = NULL;
|
|
char * keyStr = NULL;
|
|
int len = 0;
|
|
gsw_cfg *modulecfg = ap_get_module_config(cmd->server->module_config, &gsw_module);
|
|
const apr_array_header_t *tarr = apr_table_elts(cfg->app_table);
|
|
|
|
//App Name=TCWebMail Instance=1 Host=10.1.0.1:9901
|
|
//App Name=PBX Instance=1 Host=10.1.0.1:9001
|
|
|
|
appName = strrchr(word1, '=');
|
|
instanceStr = strrchr(word2, '=');
|
|
hostName = strrchr(word3, '=');
|
|
|
|
if ((!appName) || (!instanceStr) || (!hostName)) {
|
|
return apr_psprintf(cmd->temp_pool, "App '%s' '%s' '%s' is invalid.", word1, word2, word3);
|
|
}
|
|
|
|
appConf = apr_pcalloc(cmd->pool, sizeof(gsw_app_conf));
|
|
|
|
appName++;
|
|
hostName++;
|
|
instanceStr++;
|
|
|
|
strncpy(appConf->app_name, appName, sizeof(appConf->app_name));
|
|
|
|
portStr = strrchr(hostName, ':');
|
|
|
|
// remove port from string
|
|
*portStr = '\0';
|
|
portStr++;
|
|
|
|
appConf->port = atoi(portStr);
|
|
|
|
|
|
strncpy(appConf->host_name, hostName, sizeof(appConf->host_name));
|
|
|
|
appConf->instance_number = atoi(instanceStr);
|
|
appConf->total_index = last_app_index;
|
|
|
|
if (instance_count < appConf->total_index) {
|
|
return apr_psprintf(cmd->temp_pool, "InstanceCount is '%d', but you added '%d' applications. Increase InstanceCount.",
|
|
instance_count, appConf->total_index);
|
|
}
|
|
|
|
snprintf(tmpStr, sizeof(tmpStr), "%s:%d", appName, appConf->instance_number);
|
|
|
|
len = strlen(tmpStr)+1;
|
|
keyStr = apr_pcalloc(cmd->pool,len);
|
|
strncpy(keyStr, tmpStr, len);
|
|
|
|
apr_table_addn((apr_table_t*) tarr, (const char *) keyStr, (const char *) appConf);
|
|
last_app_index++;
|
|
|
|
return NULL;
|
|
}
|
|
|
|
// done using http://www.sveinbjorn.org/dataurlmaker
|
|
|
|
static void print_image(request_rec * r)
|
|
{
|
|
ap_rputs("<img alt=\"exclamation sign\" src=\""
|
|
"data:image/png;base64,iVBORw0KGgoAAAANSUhEUgAAADwAAAAyCAYAAAF38YiUAAAAAXNSR0IArs"
|
|
"4c6QAAAAZiS0dEAP8A/wD/oL2nkwAAAAlwSFlzAAAN1wAADdcBQiibeAAAD8dJREFUaN7dmnl0VVWWh7"
|
|
"9735S8zGQAAgQSQhKGhmAAMQ6ABhAZBCkRQSgcy6Gbru7VzrW6rVKrre5eRVG6UBBXIRoQooBQgkDQAk"
|
|
"WwFQpEUKEKEUwgCYSQvPnde3b/cd97ySOggILaZ627zrjP7+yz99l3n30vnE/aAEq9tUbatultKyOrqz"
|
|
"UtNZ0Xobkd9bE7bxERkenTp4uUlcXNwrtgrynQJRQKyQcffCC1tbXyQa/81kF1PXXZu3ev1NbWyoQJE2"
|
|
"Tfvn3ymhMB0jSAeSB+4PTHCw3nzqLs2SP3wNh2HdWpySIiIo88Iu2pKisFEBGRubreOqBhTJk0NDRIQk"
|
|
"KC+Hw+eTtVEwC9Etb46ms4efIkTqeTEydO0G3bp2zNzRHtxbOw4v+21R++eaysA+F8k++Pz4hUV4tUVs"
|
|
"qOwQPObYLV8LRUV4ssXy6AFBcXi9x+u9SNGi6A66yEr4NIZaW0fPmliIgAMnfuXFFKiZSUSGN+ntwO/x"
|
|
"Idr0UL67vlSn/nMRpX7yE1NZWUlBQSEhIQEXw+H83NzTSsrOLIYw+xPYD6b7BpAA33zZDA25WETAiZED"
|
|
"TFylV83Spb+V5d5+KkDbA1sHi+AB3Om7jxwftFtm+XtzPSzk/O60Bk2zaRN98UWbBA/gjLzpWwh7l2tU"
|
|
"UoIvLkk3J44qhzQ999RZnIqlUxOUtDg8iUKTLv29R0FdTKqlUiW7a0EouIDBsm3pJekgcFZyVuuG+6yP"
|
|
"z5EgqF4oi9Xq9IcbEszsw4sxWr0nVRG5dyZMwYgsFgbIBSilAoxPvZbjKDJ3kIdsYRL4OKYX2TCJsQDA"
|
|
"bx+/34fD4WLFiAz+fD7/eTuaCSsIKf9+41MKrWGsAX4yskee87NK3ZA0BSUhJut5ucnByOHTuG1+slEA"
|
|
"gggQC7h5axPQzPgqYthtDInrojaJ5dj2O6Hqm7nS6eCQSvsXvh+Tf/rmYbQBg4pzwQZA+0XLDubwR5Pz"
|
|
"NDFsFcLkWqhsx3E1xiVK8T2bNHamZMlhVw9HznOS9jsB5mZw7oc3z4Rx9jS0qHujpyfzaTa2bf3Wm5pf"
|
|
"mO7x14HXzW77ZJc0tfeAnq6kAEhg2Dujoy8/swbva9vKJpoSzo/L0BrwG5/KF/LMmd9YAF2q8fWnk5ms"
|
|
"PB84YBdXUkKjvTZ87ghcyM2rthxneW6SoQ/++ftgxLZaWIUrFjDsiIESMsWzF7tsgNN4gMGybbS/vI01"
|
|
"B9QYAroXR9dgdRS1+1AOfPF9M0JZqiwA8//HCsLfzyyyIlJSLFxfLllYPldxA4L9DXYeGnFVdKQy9djv"
|
|
"XUpXHa9dLY2Ch+v78dcFVVlQUaDktzc7PUffG5vJOuycY0TT7pXyy/tsYlfSvoMjhV/4vpUl+oS22BLn"
|
|
"977H45ePCgHD16VE6ePCler1fC4bAcOHBABg0aJIZhSCAQkObmZmloaJDDhw/L/v37ZW0ysiYJebdjmj"
|
|
"xhs0k/6N8WR2tbWQJSMWsS6r03MQRa/rQRldUJXddJSEjA6XTidDqx2+1kZGQAUFhYyIcffkg4HCYUCh"
|
|
"EIBAiHwwDsv6IUIxhGaTqehGQ2NTX/dgk8HgOeD+4Uh91bcXUvjENfYAqYCoKzfolCQwAlgq7bQNfRdR"
|
|
"uChgiYIiglhE0TwzBRSlACCmjespnmHTswIvMV5uTw8rH6gwuhpwawCGTMnTdjejwoZYISlGGiTIUohT"
|
|
"JMUAqlTFQ40qYUmAplRsaZJkopxIj0R9tMhSgz1u4A5h5v/ICfVNoIv9+akyUbLY11XhJQAW0jSGDRPD"
|
|
"k4vkKWwXuXituGunumi3zxhRirV8hah10GQfHFBh26tVO2qF07RXbsENmyRRrumyUrrPe8dtFeiwq29b"
|
|
"3vDjRTwOsFj4esa8eSWdDd/iQ8clGA34YlBdcPI23clBhoNC8ddz094bdA8vcKvBZcyma7tfttM1tBR4"
|
|
"+GxETwekntUkDZqKtZANu/V2CBxiH3z8CR18sCzc8HXYexY2MLKSjsg9vl7DsCyr4X4LUwPi0/z505aU"
|
|
"Zsex9/5RU0TUPXdRg/Hrxe7IZw3egRTIWPzmXebx1gwOr+s6ZCIGhxN3YsGzZssHZCBHr3hqDV10lPpE"
|
|
"dBnvYr+J/vBLwaNvWbdD0pg4dboC4XJCaSl5cXP3DOnNiWD87JJse60qZfEPBaSNWczmu7jZ3QqlDjxw"
|
|
"O0B3Y4oKwMvF4yvCEqysv4L/jkgoAD0Fh+/0zsadng8WCUtepMjx492p/xxx6zFhcK0et4M8mJCd3GQs"
|
|
"V5Aa+Auzv2LbKl9S61JvP7CRcWxvp79+7djsY0TTzPPQeAXdMZOaA35bARsJ+zVakCqZ86WuoLdTnWyy"
|
|
"H1R45IS0uLhMNhERE5ePBgzOeKJp/PJ42NjfJJURfZlKbJhlRN1nTLlX+Gl8+J4yr465BpN8LHGzEFwg"
|
|
"PLMWw2DMPAMAxEhPz8/DiacDiMaZoYhkHq+vctD0ago1MjHWYCOd8IvBy62JPcpe5Df7XcFwH/Uy/GJo"
|
|
"36VUoprrjiCtavXx9rj4IrEdyTp2GKcPRoDZP7FPEwfH46sK1t5SZoHn7XLahPtmIKeP7jeczO3bDZbO"
|
|
"i6jqZpaJqGiFBcXExeXh5JSUkx4FAoRCgUwjn0ShpfnIcSaPZ68Gn2RKdh7jsA+9px/Bo8nj94AKr6NW"
|
|
"urXG6MQVchInFchUIhVq1axYgRIygqKiIUCsX6ouIAyKv6M6aAPxhkZG5HimB5W29Fb2Ohniromo5SCi"
|
|
"XQsmxrnAzbPgMGDIj1RbmMAlu+Pji656MlJaMUfHr4MMOzM7kDVsT51a/CVyNm3Zxne++NmCsaGliOOe"
|
|
"BylFgXQzTQdFura6tF3FtTYSiFYSoM00QiuqFMRe2zf8BUEUVLSWXNqWaWCN1PwmFtCZS4OqR/dlUPJ0"
|
|
"bT8dhAU8CIlpXEFmSelre2y2n10+eAsk45zDtW718IbnsYXhk1bSLh4/VoSqGbCk2Z2AyF3TRjPrSYls"
|
|
"+s1Gm+smn1K1MhhjU+6k9HfWtRgqiIbw6JQKG2HJxNcFSgg7LcGxRgtimfS/1caZpg/kr4lcYlTMvBmQ"
|
|
"FzsIyKGYJFH8G/PWEFhC5JumQMvw0DbPBxYlYHe8mtNyJKsffVFfhPtQRfh7EvwaZLsQ7bJYqM3anB2s"
|
|
"y+RXrRrFvpcMc/4R5yFelujZYjNfYeTadm9oFT78DHES386TK8ERYAv8677kryb72F1JumQzgMgQAJPU"
|
|
"tI75CE2XIKZ82x64dD3p8tzyH8k1Pp5WBLh4/R9dK+t4wja8IknP0GQShkMRwKxZ7Avl3UvLORXWvfxQ"
|
|
"s7HoAxnvP6XvYDS/ht6OyCI7Ykd/fSu24le/od2LsWgN8PgYCVR8uBAHZ3CqmdOpGRkUj9/oO5Y0x15z"
|
|
"FYewTqf/QMr4drBT5J6drZ1f/OaXS45XZ0Z0KMOfx+MAxLul5vjHEdnZTszmRmp3D869rE/v7AvZmwd+"
|
|
"cZPLUfDcPr4FETFucO6k/xtJ+RPnYKWthoZTQchuHDoU8fKCmBrl1h1y7w+SAQQAuGSE7pQGZWCj6fV0"
|
|
"s7eWpKKdj/Au9HXqc/HobfgtUK7u89/jp6TLyR5Cuui1dfhwOzooIFixYxd+5cNm3ahD05mcLJk2HnTm"
|
|
"hqimmB2+kmIzURW6IT/9H6a66BgRvgLSD4gxutNeDWYC92e4/LbptI9rWjsefmtxqlcBhyc6G8nNLSUn"
|
|
"bv3h1H379/f6tt4ULYvTvOqPmaGznccpItmz8kKPL3Z2BELRz5LuvVvyOzJQKNjoy0HkMf+Dkdb5yKPa"
|
|
"tLawDK64W+faG8HICsrKx2czidkSvFXXfBqFFxASy3qVGouRhdcTXuBFfPR+DzMXDlD8LwarjVhM86FB"
|
|
"W4Bt99G5mjJqFr9lZGvV6oqLAiMpHULm4B5ObmtlbGj4cHH4xj2h4IkXfCw+ghpWRnZrhHwfv3wC8u9D"
|
|
"heEMOrYK4BSwquuZz+0yaTUT4SfP7WhRoGMmUK5MTfwbt3795uri5dusQ3DBiALFpkXdI8HvB40Hw+ut"
|
|
"Y1MSKvC8U9utELXngInsO6iVw8hgW0FbBNadrsy6aMpde4G0jpO6SVUY8HMymJwJQpKGf7WH1hm5jNWR"
|
|
"kGzIwMAm++icrNtc505Lbb0RdmaGIiV/UrogPc++/WB7zMi8LwGsh6Axr0xISh5XdNJfnoZ3heeoqWZc"
|
|
"9h1nwFXi/+7t1pGTkS0zStCIiKd4uLi4u/WaWx/iUwTRMTaF68mMANNwBwKuxn18mv2Vl7AN3bxPjL/g"
|
|
"G3TS9/AvYVQcn3aqWroBx4P61zjjZw0mi0rWtQ3mbruk/kyv/EPByjJmK323E4HNjt9tijR/6O8Xq9JC"
|
|
"fHB8/Xr1/PqFGjYlG5tiGlaH5i6cvU/ebR1vCCgDMhkS55PVm37wCN/oD5MUxca7265Du9h6vglwqWdy"
|
|
"vtq/W+ZhDa5jdQwUAruNNFcOE6GDDE2kGtdQ+jgZdou9PpZPPmzRw6dAiAtLQ05syZg91uj2M2Wo7W7c"
|
|
"V9cF01guZVVZhKEBFCRpimxhMMLCjAZ5i6yx+YVgDh3dZXAXVBEl4GSwWm9h8znKwUG+x81wr6RKRqdO"
|
|
"yGZ95KbInudlK12WyxPBqPi8bk4uyCSEyNo3mU6baSNgyD8KkmaqaMI3z8eJx25XXJo9YbZOvROpqh6n"
|
|
"m4k7P8WqKf7RvLEvhc2WxTr5pxE9lmIxJhVkUCRYGh1+FZuBacrtjiYgtro45tA4vBYJCZM2ficDhwOB"
|
|
"wkJyezcuXKWDiubViubTQ0ugF6cgrd3voLrsuGxIJXSuDgkcOkYzKhe1eS4ebZ8KEbcs9Jwssh34C9Ca"
|
|
"kpiVdPn4jsqEadqItJVQkEbv9XQpNvbzfZN0lW13WWLFnC7Nmz42hcLhc1NTVWYCzynC5l02zvRtc/O4"
|
|
"fjf1qIgtjxSnMn0SUzk2Vf1eAxzZYtULEb/vesZ7gSbjRhW3ZBnmPIjSOR91ahWppijCrAzO1B4KHfgd"
|
|
"b+NCilYuc2qqoiEnv69evHyJEj+frrr3G5XEycOJGlS5ei6/oZz7BhGO0sfTS5ywZzomo5pt8fi636Qm"
|
|
"EafV6uze1EbSDkyjDNuzLh0N9gT9SYxVb9KvyngkdKysvo3jMX2bbWWnQbyxiVsrTZgGjZOlMSZ0nbak"
|
|
"Vc+Yy0beeW+P5voj1DH2j0zclil8fHTo+Xk/CH5fAoELABLIZKBfddedP1ZLvMuPP6zQuL9su3LuxsG3"
|
|
"DGec5Ae7Z1nKnPFKjz+Chyu+mW4OJQIDi0CHrthWo71kVzvwA7N39IcnoqIt0QJPJCi+y2Fq1Z7aJZiy"
|
|
"Mi1ThVjuRWd2S8RGjb5hEa1W6s1W62mVPaYCmsHVMxmui88bjb/QEaDAMT8MEhIOf0g5gUcdXs/P9Kyo"
|
|
"rF0/R/NzVwuE9PAZoAAAAASUVORK5CYII=\" width=\"60\" height=\"50\">\n", r);
|
|
|
|
}
|
|
|
|
/*
|
|
* this prints some CSS for use in the error page in gsw_handler
|
|
*/
|
|
|
|
static void print_css(request_rec * r)
|
|
{
|
|
ap_rputs("<style type=\"text/css\"> \
|
|
body {color: #111;font-family:\"Helvetica Neue\",Helvetica,sans-serif;} \
|
|
.fail {margin: auto; padding: 40px; display: block; \
|
|
border: 1px solid #000000; \
|
|
position: relative;} \
|
|
.fail h2 {margin: 0 0 .2em; font-size: 24px} \
|
|
.fail p {margin: 0; font-size: .8em;} \
|
|
.power {float:right;padding-top: 10px;} \
|
|
img {float:left;padding-right: 10px;} \
|
|
a {color: #0092E8;} \
|
|
a:hover {color: #0071b3;} \
|
|
table {white-space:nowrap;} \
|
|
</style>\n", r);
|
|
}
|
|
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* Now we declare our content handlers, which are invoked when the server */
|
|
/* encounters a document which our module is supposed to have a chance to */
|
|
/* see. (See mod_mime's SetHandler and AddHandler directives, and the */
|
|
/* mod_info and mod_status gsws, for more details.) */
|
|
/* */
|
|
/* Since content handlers are dumping data directly into the connection */
|
|
/* (using the r*() routines, such as rputs() and rprintf()) without */
|
|
/* intervention by other parts of the server, they need to make */
|
|
/* sure any accumulated HTTP headers are sent first. This is done by */
|
|
/* calling send_http_header(). Otherwise, no header will be sent at all, */
|
|
/* and the output sent to the client will actually be HTTP-uncompliant. */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* Sample content handler. All this does is display the call list that has
|
|
* been built up so far.
|
|
*
|
|
* The return value instructs the caller concerning what happened and what to
|
|
* do next:
|
|
* OK ("we did our thing")
|
|
* DECLINED ("this isn't something with which we want to get involved")
|
|
* HTTP_mumble ("an error status should be reported")
|
|
*/
|
|
static int gsw_handler(request_rec *r)
|
|
{
|
|
gsw_app_conf * app = NULL;
|
|
gsw_cfg * dcfg;
|
|
char data1[1024];
|
|
char data[1024];
|
|
void * user_data;
|
|
int handle_status = OK;
|
|
void * postdata = NULL;
|
|
uint32_t contentLen = 0;
|
|
|
|
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "xx handler uri: %s", r->uri);
|
|
|
|
if (strncmp(r->uri, "/wo/",4) != 0) {
|
|
// ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "xx handler DECLINED");
|
|
return DECLINED;
|
|
}
|
|
|
|
|
|
dcfg = our_dconfig(r);
|
|
|
|
/*
|
|
* We're about to start sending content, so we need to force the HTTP
|
|
* headers to be sent at this point. Otherwise, no headers will be sent
|
|
* at all. We can set any we like first, of course. **NOTE** Here's
|
|
* where you set the "Content-type" header, and you do so by putting it in
|
|
* r->content_type, *not* r->headers_out("Content-type"). If you don't
|
|
* set it, it will be filled in with the server's default type (typically
|
|
* "text/plain"). You *must* also ensure that r->content_type is lower
|
|
* case.
|
|
*
|
|
* We also need to start a timer so the server can know if the connexion
|
|
* is broken.
|
|
*/
|
|
|
|
|
|
app = find_app(r);
|
|
|
|
if (app != NULL) {
|
|
int i;
|
|
handle_status = OK;
|
|
|
|
if (ap_setup_client_block(r, REQUEST_CHUNKED_ERROR) != OK) {
|
|
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, "handle_request: DECLINED");
|
|
} else {
|
|
if (r->method_number == M_POST) {
|
|
contentLen = get_content_len(r);
|
|
postdata = read_post_data(r, contentLen, r->pool, app);
|
|
}
|
|
|
|
|
|
for (i = 0; ((i < RETRY_COUNT) && (handle_status <= OK)); i++) {
|
|
handle_status = handle_request(r, app, postdata, contentLen);
|
|
|
|
switch (handle_status) {
|
|
case UNREACHABLE:
|
|
mark_unreachable(r,app);
|
|
app = find_app(r);
|
|
break;
|
|
case DECLINED:
|
|
break;
|
|
case OK:
|
|
return handle_status;
|
|
case HTTP_MOVED_TEMPORARILY:
|
|
return OK; // otherwise, we get a apache error doc!
|
|
default:
|
|
break;
|
|
}
|
|
}
|
|
|
|
if ((handle_status > OK)) {
|
|
return handle_status;
|
|
}
|
|
|
|
}
|
|
}
|
|
|
|
ap_set_content_type(r, "text/html");
|
|
/*
|
|
* If we're only supposed to send header information (HEAD request), we're
|
|
* already there.
|
|
*/
|
|
if (r->header_only) {
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* Now send our actual output. Since we tagged this as being
|
|
* "text/html", we need to embed any HTML.
|
|
*/
|
|
ap_rputs(DOCTYPE_HTML_3_2, r);
|
|
ap_rputs("<html>\n", r);
|
|
ap_rputs("<head>\n", r);
|
|
print_css(r);
|
|
ap_rputs("<title>GNUstepWeb Status</title>\n", r);
|
|
ap_rputs("<meta name=\"robots\" content=\"NOINDEX, NOFOLLOW\">\n", r);
|
|
ap_rputs("</head>\n", r);
|
|
ap_rputs("<body>\n", r);
|
|
ap_rputs("<h1>GNUstepWeb Status</h1><br>\n", r);
|
|
|
|
if ((dcfg->showApps)) {
|
|
if ((dcfg->app_table)) {
|
|
const apr_array_header_t *tarr = apr_table_elts(dcfg->app_table);
|
|
const apr_table_entry_t *telts = (const apr_table_entry_t*)tarr->elts;
|
|
int i;
|
|
exipc_data * mem;
|
|
int appcount = tarr->nelts;
|
|
char timestr[APR_CTIME_LEN];
|
|
|
|
mem = read_shared_mem(r->pool, appcount);
|
|
|
|
if (mem) {
|
|
ap_rputs("<div class=\"fail\"><table width=\"700\">\n",r);
|
|
print_image(r);
|
|
ap_rputs("<tr><th>Name</th><th>Instance</th><th>Host</th><th>Port</th><th>Load</th><th>Unreachable</th><th>Refusing</th><th>Last Request</th><th>Last Response</th></tr>\n",r);
|
|
|
|
for (i = 0; i < tarr->nelts; i++) {
|
|
gsw_app_conf *appconf = (gsw_app_conf *) telts[i].val;
|
|
|
|
ap_rprintf(r, "<tr><td><a href=\"%s%s.woa/%d/\">%s</a></td>", ADAPTOR_PREFIX,
|
|
appconf->app_name,
|
|
appconf->instance_number,
|
|
appconf->app_name);
|
|
ap_rprintf(r, "<td>%u</td>", appconf->instance_number);
|
|
ap_rprintf(r, "<td>%s</td>", appconf->host_name);
|
|
ap_rprintf(r, "<td>%u</td>", appconf->port);
|
|
ap_rprintf(r, "<td>%u</td>", mem[i].load);
|
|
ap_rprintf(r, "<td>%s</td>", (mem[i].unreachable == 1) ? "YES": "NO");
|
|
ap_rprintf(r, "<td>%s</td>", (mem[i].refusing == 1) ? "YES": "NO");
|
|
apr_ctime(timestr, mem[i].last_request_time);
|
|
ap_rprintf(r, "<td>%s</td>", timestr);
|
|
if (mem[i].last_response_time > 0) {
|
|
apr_ctime(timestr, mem[i].last_response_time);
|
|
ap_rprintf(r, "<td>%s</td></tr>\n", timestr);
|
|
} else {
|
|
ap_rprintf(r, "<td>never</td></tr>\n");
|
|
}
|
|
}
|
|
|
|
ap_rputs("</table><br>\n",r);
|
|
|
|
}
|
|
|
|
}
|
|
} else {
|
|
ap_rputs("<p>Application list hidden. Set <samp>ShowApps on</samp> in your Apache config to list.</p>\n",r);
|
|
|
|
}
|
|
|
|
ap_rputs("<p class=\"power\">Powered by <a href=\"http://wiki.gnustep.org/index.php/GNUstepWeb\">GNUstep Web</a></p>\n",r);
|
|
|
|
ap_rputs("</div>\n</body>\n", r);
|
|
ap_rputs("</html>\n", r);
|
|
/*
|
|
* We're all done, so cancel the timeout we set. Since this is probably
|
|
* the end of the request we *could* assume this would be done during
|
|
* post-processing - but it's possible that another handler might be
|
|
* called and inherit our outstanding timer. Not good; to each its own.
|
|
*/
|
|
/*
|
|
* We did what we wanted to do, so tell the rest of the server we
|
|
* succeeded.
|
|
*/
|
|
return OK;
|
|
}
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* Now let's declare routines for each of the callback phase in order. */
|
|
/* (That's the order in which they're listed in the callback list, *not */
|
|
/* the order in which the server calls them! See the command_rec */
|
|
/* declaration near the bottom of this file.) Note that these may be */
|
|
/* called for situations that don't relate primarily to our function - in */
|
|
/* other words, the fixup handler shouldn't assume that the request has */
|
|
/* to do with "gsw" stuff. */
|
|
/* */
|
|
/* With the exception of the content handler, all of our routines will be */
|
|
/* called for each request, unless an earlier handler from another module */
|
|
/* aborted the sequence. */
|
|
/* */
|
|
/* Handlers that are declared as "int" can return the following: */
|
|
/* */
|
|
/* OK Handler accepted the request and did its thing with it. */
|
|
/* DECLINED Handler took no action. */
|
|
/* HTTP_mumble Handler looked at request and found it wanting. */
|
|
/* */
|
|
/* What the server does after calling a module handler depends upon the */
|
|
/* handler's return value. In all cases, if the handler returns */
|
|
/* DECLINED, the server will continue to the next module with an handler */
|
|
/* for the current phase. However, if the handler return a non-OK, */
|
|
/* non-DECLINED status, the server aborts the request right there. If */
|
|
/* the handler returns OK, the server's next action is phase-specific; */
|
|
/* see the individual handler comments below for details. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* This function is called during server initialisation. Any information
|
|
* that needs to be recorded must be in static cells, since there's no
|
|
* configuration record.
|
|
*
|
|
* There is no return value.
|
|
*/
|
|
|
|
/*
|
|
* This function is called when an heavy-weight process (such as a child) is
|
|
* being run down or destroyed. As with the child initialisation function,
|
|
* any information that needs to be recorded must be in static cells, since
|
|
* there's no configuration record.
|
|
*
|
|
* There is no return value.
|
|
*/
|
|
|
|
/*
|
|
* This function is called during server initialisation when an heavy-weight
|
|
* process (such as a child) is being initialised. As with the
|
|
* module initialisation function, any information that needs to be recorded
|
|
* must be in static cells, since there's no configuration record.
|
|
*
|
|
* There is no return value.
|
|
*/
|
|
|
|
/*
|
|
* This function gets called to create a per-directory configuration
|
|
* record. This will be called for the "default" server environment, and for
|
|
* each directory for which the parser finds any of our directives applicable.
|
|
* If a directory doesn't have any of our directives involved (i.e., they
|
|
* aren't in the .htaccess file, or a <Location>, <Directory>, or related
|
|
* block), this routine will *not* be called - the configuration for the
|
|
* closest ancestor is used.
|
|
*
|
|
* The return value is a pointer to the created module-specific
|
|
* structure.
|
|
*/
|
|
static void *gsw_create_dir_config(apr_pool_t *p, char *dirspec)
|
|
{
|
|
gsw_cfg *cfg;
|
|
char *dname = dirspec;
|
|
|
|
/*
|
|
* Allocate the space for our record from the pool supplied.
|
|
*/
|
|
cfg = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
|
|
/*
|
|
* Now fill in the defaults. If there are any `parent' configuration
|
|
* records, they'll get merged as part of a separate callback.
|
|
*/
|
|
cfg->local = 0;
|
|
cfg->congenital = 0;
|
|
cfg->cmode = CONFIG_MODE_DIRECTORY;
|
|
/*
|
|
* Finally, add our trace to the callback list.
|
|
*/
|
|
|
|
cfg->app_table = apr_table_make(p, 1); // default
|
|
|
|
|
|
dname = (dname != NULL) ? dname : "";
|
|
cfg->loc = apr_pstrcat(p, "DIR(", dname, ")", NULL);
|
|
return (void *) cfg;
|
|
}
|
|
|
|
/*
|
|
* This function gets called to merge two per-directory configuration
|
|
* records. This is typically done to cope with things like .htaccess files
|
|
* or <Location> directives for directories that are beneath one for which a
|
|
* configuration record was already created. The routine has the
|
|
* responsibility of creating a new record and merging the contents of the
|
|
* other two into it appropriately. If the module doesn't declare a merge
|
|
* routine, the record for the closest ancestor location (that has one) is
|
|
* used exclusively.
|
|
*
|
|
* The routine MUST NOT modify any of its arguments!
|
|
*
|
|
* The return value is a pointer to the created module-specific structure
|
|
* containing the merged values.
|
|
*/
|
|
static void *gsw_merge_dir_config(apr_pool_t *p, void *parent_conf,
|
|
void *newloc_conf)
|
|
{
|
|
|
|
gsw_cfg *merged_config = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
|
|
gsw_cfg *pconf = (gsw_cfg *) parent_conf;
|
|
gsw_cfg *nconf = (gsw_cfg *) newloc_conf;
|
|
char *note;
|
|
|
|
/*
|
|
* Some things get copied directly from the more-specific record, rather
|
|
* than getting merged.
|
|
*/
|
|
merged_config->local = nconf->local;
|
|
merged_config->loc = apr_pstrdup(p, nconf->loc);
|
|
|
|
// dave
|
|
merged_config->showApps = nconf->showApps;
|
|
// snprintf(merged_config->appInfo, 1000, nconf->appInfo);
|
|
merged_config->app_table = apr_table_copy(p, nconf->app_table);
|
|
|
|
|
|
/*
|
|
* Others, like the setting of the `congenital' flag, get ORed in. The
|
|
* setting of that particular flag, for instance, is TRUE if it was ever
|
|
* true anywhere in the upstream configuration.
|
|
*/
|
|
merged_config->congenital = (pconf->congenital | pconf->local);
|
|
/*
|
|
* If we're merging records for two different types of environment (server
|
|
* and directory), mark the new record appropriately. Otherwise, inherit
|
|
* the current value.
|
|
*/
|
|
merged_config->cmode =
|
|
(pconf->cmode == nconf->cmode) ? pconf->cmode : CONFIG_MODE_COMBO;
|
|
/*
|
|
* Now just record our being called in the trace list. Include the
|
|
* locations we were asked to merge.
|
|
*/
|
|
note = apr_pstrcat(p, "gsw_merge_dir_config(\"", pconf->loc, "\",\"",
|
|
nconf->loc, "\")", NULL);
|
|
|
|
return (void *) merged_config;
|
|
}
|
|
|
|
/*
|
|
* This function gets called to create a per-server configuration
|
|
* record. It will always be called for the "default" server.
|
|
*
|
|
* The return value is a pointer to the created module-specific
|
|
* structure.
|
|
*/
|
|
static void *gsw_create_server_config(apr_pool_t *p, server_rec *s)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
char *sname = s->server_hostname;
|
|
|
|
/*
|
|
* As with the gsw_create_dir_config() reoutine, we allocate and fill
|
|
* in an empty record.
|
|
*/
|
|
cfg = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
|
|
cfg->local = 0;
|
|
cfg->congenital = 0;
|
|
cfg->cmode = CONFIG_MODE_SERVER;
|
|
/*
|
|
* Note that we were called in the trace list.
|
|
*/
|
|
sname = (sname != NULL) ? sname : "";
|
|
cfg->loc = apr_pstrcat(p, "SVR(", sname, ")", NULL);
|
|
|
|
return (void *) cfg;
|
|
}
|
|
|
|
/*
|
|
* This function gets called to merge two per-server configuration
|
|
* records. This is typically done to cope with things like virtual hosts and
|
|
* the default server configuration The routine has the responsibility of
|
|
* creating a new record and merging the contents of the other two into it
|
|
* appropriately. If the module doesn't declare a merge routine, the more
|
|
* specific existing record is used exclusively.
|
|
*
|
|
* The routine MUST NOT modify any of its arguments!
|
|
*
|
|
* The return value is a pointer to the created module-specific structure
|
|
* containing the merged values.
|
|
*/
|
|
static void *gsw_merge_server_config(apr_pool_t *p, void *server1_conf,
|
|
void *server2_conf)
|
|
{
|
|
|
|
gsw_cfg *merged_config = (gsw_cfg *) apr_pcalloc(p, sizeof(gsw_cfg));
|
|
gsw_cfg *s1conf = (gsw_cfg *) server1_conf;
|
|
gsw_cfg *s2conf = (gsw_cfg *) server2_conf;
|
|
char *note;
|
|
|
|
/*
|
|
* Our inheritance rules are our own, and part of our module's semantics.
|
|
* Basically, just note whence we came.
|
|
*/
|
|
merged_config->cmode =
|
|
(s1conf->cmode == s2conf->cmode) ? s1conf->cmode : CONFIG_MODE_COMBO;
|
|
merged_config->local = s2conf->local;
|
|
merged_config->congenital = (s1conf->congenital | s1conf->local);
|
|
merged_config->loc = apr_pstrdup(p, s2conf->loc);
|
|
/*
|
|
* Trace our call, including what we were asked to merge.
|
|
*/
|
|
note = apr_pstrcat(p, "gsw_merge_server_config(\"", s1conf->loc, "\",\"",
|
|
s2conf->loc, "\")", NULL);
|
|
|
|
return (void *) merged_config;
|
|
}
|
|
|
|
/*
|
|
* This routine is called before the server processes the configuration
|
|
* files. There is no return value.
|
|
*/
|
|
static int gsw_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
|
|
apr_pool_t *ptemp)
|
|
{
|
|
/*
|
|
* Log the call and exit.
|
|
*/
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* Returns the number of instances configured
|
|
*/
|
|
|
|
static int app_count(server_rec *s)
|
|
{
|
|
gsw_cfg * cfg = (gsw_cfg *) ap_get_module_config(s->module_config, &gsw_module);
|
|
const apr_array_header_t * tarr = NULL;
|
|
|
|
if (cfg) {
|
|
tarr = apr_table_elts((apr_table_t *)cfg->app_table);
|
|
if (tarr) {
|
|
return tarr->nelts;
|
|
}
|
|
}
|
|
|
|
return 0;
|
|
}
|
|
|
|
void init_shared_mem(const apr_shm_t * xxx, int count, server_rec * s)
|
|
{
|
|
int i;
|
|
|
|
exipc_data *currentRecord = (exipc_data *) apr_shm_baseaddr_get(xxx);
|
|
|
|
for (i = 0;i<count;i++) {
|
|
currentRecord[i].last_response_time = 0;
|
|
currentRecord[i].load = 0;
|
|
currentRecord[i].unreachable = 0;
|
|
currentRecord[i].refusing = 0;
|
|
}
|
|
|
|
}
|
|
|
|
|
|
/*
|
|
* This routine is called to perform any module-specific fixing of header
|
|
* fields, et cetera. It is invoked just before any content-handler.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static int gsw_post_config(apr_pool_t *pconf, apr_pool_t *plog,
|
|
apr_pool_t *ptemp, server_rec *s)
|
|
{
|
|
void * data; /* These two help ensure that we only init once. */
|
|
const char * userdata_key = "gsw_init_module";
|
|
apr_status_t rs;
|
|
void * base;
|
|
const char * temp_dir;
|
|
int appcount = 0;
|
|
gsw_cfg * cfg;
|
|
|
|
//openlog("www", LOG_PID,LOG_USER);
|
|
|
|
/*
|
|
* The following checks if this routine has been called before.
|
|
* This is necessary because the parent process gets initialized
|
|
* a couple of times as the server starts up, and we don't want
|
|
* to create any more mutexes and shared memory segments than
|
|
* we're actually going to use.
|
|
*/
|
|
|
|
apr_pool_userdata_get(&data, userdata_key, s->process->pool);
|
|
if (!data) {
|
|
apr_pool_userdata_set((const void *) 1, userdata_key,
|
|
apr_pool_cleanup_null, s->process->pool);
|
|
|
|
return OK;
|
|
}
|
|
|
|
/* Create the shared memory segment */
|
|
|
|
/*
|
|
* Create a unique filename using our pid. This information is
|
|
* stashed in the global variable so the children inherit it.
|
|
* TODO get the location from the environment $TMPDIR or somesuch.
|
|
*/
|
|
|
|
cfg = ap_get_module_config(s->module_config, &gsw_module);
|
|
|
|
appcount = instance_count;
|
|
|
|
apr_temp_dir_get(&temp_dir, pconf);
|
|
|
|
apr_filepath_merge(&shmfilename, temp_dir,
|
|
apr_psprintf(pconf, "gsw_shm.%ld", (long int)getpid()), 0, pconf);
|
|
|
|
/* Now create that segment */
|
|
|
|
rs = apr_shm_create(&exipc_shm, (sizeof(exipc_data) * appcount),
|
|
(const char *) shmfilename, pconf);
|
|
if (rs != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_ERR, rs, s,
|
|
"Failed to create shared memory segment on file %s",
|
|
shmfilename);
|
|
return HTTP_INTERNAL_SERVER_ERROR;
|
|
}
|
|
|
|
|
|
/* Create global mutex */
|
|
|
|
/*
|
|
* Create another unique filename to lock upon. Note that
|
|
* depending on OS and locking mechanism of choice, the file
|
|
* may or may not be actually created.
|
|
*/
|
|
|
|
apr_filepath_merge(&mutexfilename, temp_dir,
|
|
apr_psprintf(pconf, "gsw_mutex.%ld", (long int)getpid()), 0, pconf);
|
|
|
|
rs = apr_global_mutex_create(&exipc_mutex, (const char *) mutexfilename,
|
|
APR_LOCK_DEFAULT, pconf);
|
|
if (rs != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_ERR, rs, s,
|
|
"Failed to create mutex on file %s",
|
|
mutexfilename);
|
|
|
|
return HTTP_INTERNAL_SERVER_ERROR;
|
|
}
|
|
|
|
#ifdef MOD_EXIPC_SET_MUTEX_PERMS
|
|
rs = unixd_set_global_mutex_perms(exipc_mutex);
|
|
if (rs != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
|
|
"Parent could not set permissions on Example IPC "
|
|
"mutex: check User and Group directives");
|
|
return HTTP_INTERNAL_SERVER_ERROR;
|
|
}
|
|
#endif /* MOD_EXIPC_SET_MUTEX_PERMS */
|
|
|
|
apr_global_mutex_lock(exipc_mutex);
|
|
|
|
/* Created it, now let's zero it out */
|
|
init_shared_mem(exipc_shm, appcount, s);
|
|
|
|
apr_global_mutex_unlock(exipc_mutex);
|
|
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to perform any module-specific log file
|
|
* openings. It is invoked just before the post_config phase
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static int gsw_open_logs(apr_pool_t *pconf, apr_pool_t *plog,
|
|
apr_pool_t *ptemp, server_rec *s)
|
|
{
|
|
/*
|
|
* Log the call and exit.
|
|
*/
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* All our process-death routine does is add its trace to the log.
|
|
*/
|
|
static apr_status_t gsw_child_exit(void *data)
|
|
{
|
|
char *note;
|
|
server_rec *s = data;
|
|
char *sname = s->server_hostname;
|
|
|
|
/*
|
|
* The arbitrary text we add to our trace entry indicates for which server
|
|
* we're being called.
|
|
*/
|
|
sname = (sname != NULL) ? sname : "";
|
|
note = apr_pstrcat(s->process->pool, "gsw_child_exit(", sname, ")", NULL);
|
|
|
|
return APR_SUCCESS;
|
|
}
|
|
|
|
/*
|
|
* This routine gets called when a child inits. We use it to attach
|
|
* to the shared memory segment, and reinitialize the mutex.
|
|
*/
|
|
|
|
static void gsw_child_init(apr_pool_t *p, server_rec *s)
|
|
{
|
|
apr_status_t rs;
|
|
|
|
/*
|
|
* Set up any module cells that ought to be initialised.
|
|
*/
|
|
setup_module_cells();
|
|
|
|
/*
|
|
* Re-open the mutex for the child. Note we're reusing
|
|
* the mutex pointer global here.
|
|
*/
|
|
|
|
rs = apr_global_mutex_child_init(&exipc_mutex,
|
|
(const char *) mutexfilename,
|
|
p);
|
|
if (rs != APR_SUCCESS) {
|
|
ap_log_error(APLOG_MARK, APLOG_CRIT, rs, s,
|
|
"Failed to reopen mutex on file %s",
|
|
mutexfilename);
|
|
/* There's really nothing else we can do here, since
|
|
* This routine doesn't return a status. */
|
|
exit(1); /* Ugly, but what else? */
|
|
}
|
|
|
|
apr_pool_cleanup_register(p, s, gsw_child_exit, gsw_child_exit);
|
|
|
|
|
|
}
|
|
|
|
|
|
/*
|
|
* XXX: This routine is called XXX
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static void gsw_insert_filter(request_rec *r)
|
|
{
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
/*
|
|
* Log the call and exit.
|
|
*/
|
|
}
|
|
|
|
/*
|
|
* XXX: This routine is called XXX
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static int gsw_quick_handler(request_rec *r, int lookup_uri)
|
|
{
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called just after the server accepts the connection,
|
|
* but before it is handed off to a protocol module to be served. The point
|
|
* of this hook is to allow modules an opportunity to modify the connection
|
|
* as soon as possible. The core server uses this phase to setup the
|
|
* connection record based on the type of connection that is being used.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static int gsw_pre_connection(conn_rec *c, void *csd)
|
|
{
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_cconfig(c);
|
|
|
|
return OK;
|
|
}
|
|
|
|
/* This routine is used to actually process the connection that was received.
|
|
* Only protocol modules should implement this hook, as it gives them an
|
|
* opportunity to replace the standard HTTP processing with processing for
|
|
* some other protocol. Both echo and POP3 modules are available as
|
|
* gsws.
|
|
*
|
|
* The return VALUE is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* further modules are called for this phase.
|
|
*/
|
|
|
|
// FIXME: remove??
|
|
static int gsw_process_connection(conn_rec *c)
|
|
{
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called after the request has been read but before any other
|
|
* phases have been processed. This allows us to make decisions based upon
|
|
* the input header fields.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* further modules are called for this phase.
|
|
*/
|
|
// FIXME: remove??
|
|
static int gsw_post_read_request(request_rec *r)
|
|
{
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine gives our module an opportunity to translate the URI into an
|
|
* actual filename. If we don't do anything special, the server's default
|
|
* rules (Alias directives and the like) will continue to be followed.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* further modules are called for this phase.
|
|
*/
|
|
static int gsw_translate_handler(request_rec *r)
|
|
{
|
|
if (strncmp(r->uri, "/wo/",4) != 0) {
|
|
return DECLINED;
|
|
}
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* This routine maps r->filename to a physical file on disk. Useful for
|
|
* overriding default core behavior, including skipping mapping for
|
|
* requests that are not file based.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* further modules are called for this phase.
|
|
*/
|
|
static int gsw_map_to_storage_handler(request_rec *r)
|
|
{
|
|
if (strncmp(r->uri, "/wo/",4) != 0) {
|
|
return DECLINED;
|
|
}
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* this routine gives our module another chance to examine the request
|
|
* headers and to take special action. This is the first phase whose
|
|
* hooks' configuration directives can appear inside the <Directory>
|
|
* and similar sections, because at this stage the URI has been mapped
|
|
* to the filename. For gsw this phase can be used to block evil
|
|
* clients, while little resources were wasted on these.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK,
|
|
* the server will still call any remaining modules with an handler
|
|
* for this phase.
|
|
*/
|
|
static int gsw_header_parser_handler(request_rec *r)
|
|
{
|
|
return DECLINED;
|
|
}
|
|
|
|
|
|
/*
|
|
* This routine is called to check the authentication information sent with
|
|
* the request (such as looking up the user in a database and verifying that
|
|
* the [encrypted] password sent matches the one in the database).
|
|
*
|
|
* The return value is OK, DECLINED, or some HTTP_mumble error (typically
|
|
* HTTP_UNAUTHORIZED). If we return OK, no other modules are given a chance
|
|
* at the request during this phase.
|
|
*/
|
|
static int gsw_check_user_id(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
/*
|
|
* Don't do anything except log the call.
|
|
*/
|
|
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to check to see if the resource being requested
|
|
* requires authorisation.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* other modules are called during this phase.
|
|
*
|
|
* If *all* modules return DECLINED, the request is aborted with a server
|
|
* error.
|
|
*/
|
|
static int gsw_auth_checker(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
/*
|
|
* Log the call and return OK, or access will be denied (even though we
|
|
* didn't actually do anything).
|
|
*/
|
|
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to check for any module-specific restrictions placed
|
|
* upon the requested resource. (See the mod_access module for an gsw.)
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. All modules with an
|
|
* handler for this phase are called regardless of whether their predecessors
|
|
* return OK or DECLINED. The first one to return any other status, however,
|
|
* will abort the sequence (and the request) as usual.
|
|
*/
|
|
static int gsw_access_checker(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to determine and/or set the various document type
|
|
* information bits, like Content-type (via r->content_type), language, et
|
|
* cetera.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, no
|
|
* further modules are given a chance at the request for this phase.
|
|
*/
|
|
static int gsw_type_checker(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
/*
|
|
* Log the call, but don't do anything else - and report truthfully that
|
|
* we didn't do anything.
|
|
*/
|
|
|
|
return DECLINED;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to perform any module-specific fixing of header
|
|
* fields, et cetera. It is invoked just before any content-handler.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, the
|
|
* server will still call any remaining modules with an handler for this
|
|
* phase.
|
|
*/
|
|
static int gsw_fixer_upper(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
|
|
return OK;
|
|
}
|
|
|
|
/*
|
|
* This routine is called to perform any module-specific logging activities
|
|
* over and above the normal server things.
|
|
*
|
|
* The return value is OK, DECLINED, or HTTP_mumble. If we return OK, any
|
|
* remaining modules with an handler for this phase will still be called.
|
|
*/
|
|
static int gsw_logger(request_rec *r)
|
|
{
|
|
|
|
gsw_cfg *cfg;
|
|
|
|
cfg = our_dconfig(r);
|
|
|
|
return DECLINED;
|
|
}
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* Which functions are responsible for which hooks in the server. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* Each function our module provides to handle a particular hook is
|
|
* specified here. The functions are registered using
|
|
* ap_hook_foo(name, predecessors, successors, position)
|
|
* where foo is the name of the hook.
|
|
*
|
|
* The args are as follows:
|
|
* name -> the name of the function to call.
|
|
* predecessors -> a list of modules whose calls to this hook must be
|
|
* invoked before this module.
|
|
* successors -> a list of modules whose calls to this hook must be
|
|
* invoked after this module.
|
|
* position -> The relative position of this module. One of
|
|
* APR_HOOK_FIRST, APR_HOOK_MIDDLE, or APR_HOOK_LAST.
|
|
* Most modules will use APR_HOOK_MIDDLE. If multiple
|
|
* modules use the same relative position, Apache will
|
|
* determine which to call first.
|
|
* If your module relies on another module to run first,
|
|
* or another module running after yours, use the
|
|
* predecessors and/or successors.
|
|
*
|
|
* The number in brackets indicates the order in which the routine is called
|
|
* during request processing. Note that not all routines are necessarily
|
|
* called (such as if a resource doesn't have access restrictions).
|
|
* The actual delivery of content to the browser [9] is not handled by
|
|
* a hook; see the handler declarations below.
|
|
*/
|
|
static void gsw_register_hooks(apr_pool_t *p)
|
|
{
|
|
instance_count = DEFAULT_APP_COUNT; // default value
|
|
last_app_index = 0;
|
|
|
|
ap_hook_pre_config(gsw_pre_config, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_post_config(gsw_post_config, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_open_logs(gsw_open_logs, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_child_init(gsw_child_init, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_handler(gsw_handler, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_quick_handler(gsw_quick_handler, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_pre_connection(gsw_pre_connection, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_process_connection(gsw_process_connection, NULL, NULL, APR_HOOK_MIDDLE);
|
|
/* [1] post read_request handling */
|
|
ap_hook_post_read_request(gsw_post_read_request, NULL, NULL,
|
|
APR_HOOK_MIDDLE);
|
|
ap_hook_log_transaction(gsw_logger, NULL, NULL, APR_HOOK_MIDDLE);
|
|
#if 0
|
|
ap_hook_http_scheme(gsw_http_scheme, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_default_port(gsw_default_port, NULL, NULL, APR_HOOK_MIDDLE);
|
|
#endif
|
|
ap_hook_translate_name(gsw_translate_handler, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_map_to_storage(gsw_map_to_storage_handler, NULL,NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_header_parser(gsw_header_parser_handler, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_check_user_id(gsw_check_user_id, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_fixups(gsw_fixer_upper, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_type_checker(gsw_type_checker, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_access_checker(gsw_access_checker, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_auth_checker(gsw_auth_checker, NULL, NULL, APR_HOOK_MIDDLE);
|
|
ap_hook_insert_filter(gsw_insert_filter, NULL, NULL, APR_HOOK_MIDDLE);
|
|
}
|
|
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* All of the routines have been declared now. Here's the list of */
|
|
/* directives specific to our module, and information about where they */
|
|
/* may appear and how the command parser should pass them to us for */
|
|
/* processing. Note that care must be taken to ensure that there are NO */
|
|
/* collisions of directive names between modules. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* List of directives specific to our module.
|
|
*/
|
|
|
|
/*
|
|
RSRC_CONF - httpd.conf at top level or in a VirtualHost context.
|
|
|
|
ACCESS_CONF - httpd.conf in a Directory context.
|
|
*/
|
|
|
|
|
|
// AP_INIT_RAW_ARGS("<GSWApplications",
|
|
// proxysection,
|
|
// (void*)1,
|
|
// RSRC_CONF,
|
|
|
|
|
|
static const command_rec gsw_cmds[] =
|
|
{
|
|
AP_INIT_FLAG("ShowApps",
|
|
set_ShowApps,
|
|
NULL,
|
|
RSRC_CONF,
|
|
"on | off if invalid requests should show available applications"),
|
|
|
|
AP_INIT_TAKE3("App",
|
|
set_App,
|
|
NULL,
|
|
RSRC_CONF,
|
|
"Container for directives affecting resources located in the proxied "
|
|
"location, in regular expression syntax"),
|
|
|
|
AP_INIT_TAKE1("InstanceCount",
|
|
set_inst_count,
|
|
NULL,
|
|
RSRC_CONF,
|
|
"InstanceCount <number> -- the number of instances to tell the module how much shared memory is needed"
|
|
),
|
|
|
|
{NULL}
|
|
};
|
|
/*--------------------------------------------------------------------------*/
|
|
/* */
|
|
/* Finally, the list of callback routines and data structures that provide */
|
|
/* the static hooks into our module from the other parts of the server. */
|
|
/* */
|
|
/*--------------------------------------------------------------------------*/
|
|
/*
|
|
* Module definition for configuration. If a particular callback is not
|
|
* needed, replace its routine name below with the word NULL.
|
|
*/
|
|
module AP_MODULE_DECLARE_DATA gsw_module =
|
|
{
|
|
STANDARD20_MODULE_STUFF,
|
|
gsw_create_dir_config, /* per-directory config creator */
|
|
gsw_merge_dir_config, /* dir config merger */
|
|
gsw_create_server_config, /* server config creator */
|
|
gsw_merge_server_config, /* server config merger */
|
|
gsw_cmds, /* command table */
|
|
gsw_register_hooks, /* set up other request processing hooks */
|
|
};
|