diff options
Diffstat (limited to 'data/lighttpd/lighttpd-1.4.53/src/mod_fastcgi.c')
-rw-r--r-- | data/lighttpd/lighttpd-1.4.53/src/mod_fastcgi.c | 542 |
1 files changed, 542 insertions, 0 deletions
diff --git a/data/lighttpd/lighttpd-1.4.53/src/mod_fastcgi.c b/data/lighttpd/lighttpd-1.4.53/src/mod_fastcgi.c new file mode 100644 index 000000000..901b0b2c1 --- /dev/null +++ b/data/lighttpd/lighttpd-1.4.53/src/mod_fastcgi.c @@ -0,0 +1,542 @@ +#include "first.h" + +#include <sys/types.h> +#include <errno.h> +#include <stdlib.h> +#include <string.h> + +#include "gw_backend.h" +typedef gw_plugin_config plugin_config; +typedef gw_plugin_data plugin_data; +typedef gw_handler_ctx handler_ctx; + +#include "base.h" +#include "buffer.h" +#include "fdevent.h" +#include "http_chunk.h" +#include "log.h" +#include "status_counter.h" + +#ifdef HAVE_FASTCGI_FASTCGI_H +# include <fastcgi/fastcgi.h> +#else +# ifdef HAVE_FASTCGI_H +# include <fastcgi.h> +# else +# include "fastcgi.h" +# endif +#endif /* HAVE_FASTCGI_FASTCGI_H */ + +#if GW_RESPONDER != FCGI_RESPONDER +#error "mismatched defines: (GW_RESPONDER != FCGI_RESPONDER)" +#endif +#if GW_AUTHORIZER != FCGI_AUTHORIZER +#error "mismatched defines: (GW_AUTHORIZER != FCGI_AUTHORIZER)" +#endif +#if GW_FILTER != FCGI_FILTER +#error "mismatched defines: (GW_FILTER != FCGI_FILTER)" +#endif + +SETDEFAULTS_FUNC(mod_fastcgi_set_defaults) { + plugin_data *p = p_d; + data_unset *du; + size_t i = 0; + + config_values_t cv[] = { + { "fastcgi.server", NULL, T_CONFIG_LOCAL, T_CONFIG_SCOPE_CONNECTION }, /* 0 */ + { "fastcgi.debug", NULL, T_CONFIG_INT , T_CONFIG_SCOPE_CONNECTION }, /* 1 */ + { "fastcgi.map-extensions", NULL, T_CONFIG_ARRAY, T_CONFIG_SCOPE_CONNECTION }, /* 2 */ + { "fastcgi.balance", NULL, T_CONFIG_LOCAL, T_CONFIG_SCOPE_CONNECTION }, /* 3 */ + { NULL, NULL, T_CONFIG_UNSET, T_CONFIG_SCOPE_UNSET } + }; + + p->config_storage = calloc(1, srv->config_context->used * sizeof(plugin_config *)); + force_assert(p->config_storage); + + for (i = 0; i < srv->config_context->used; i++) { + data_config const* config = (data_config const*)srv->config_context->data[i]; + plugin_config *s; + + s = calloc(1, sizeof(plugin_config)); + force_assert(s); + s->exts = NULL; + s->exts_auth = NULL; + s->exts_resp = NULL; + s->debug = 0; + s->ext_mapping = array_init(); + + cv[0].destination = s->exts; /* not used; T_CONFIG_LOCAL */ + cv[1].destination = &(s->debug); + cv[2].destination = s->ext_mapping; + cv[3].destination = NULL; /* not used; T_CONFIG_LOCAL */ + + p->config_storage[i] = s; + + if (0 != config_insert_values_global(srv, config->value, cv, i == 0 ? T_CONFIG_SCOPE_SERVER : T_CONFIG_SCOPE_CONNECTION)) { + return HANDLER_ERROR; + } + + du = array_get_element(config->value, "fastcgi.server"); + if (!gw_set_defaults_backend(srv, p, du, i, 0)) { + return HANDLER_ERROR; + } + + du = array_get_element(config->value, "fastcgi.balance"); + if (!gw_set_defaults_balance(srv, s, du)) { + return HANDLER_ERROR; + } + } + + return HANDLER_GO_ON; +} + +static int fcgi_env_add(void *venv, const char *key, size_t key_len, const char *val, size_t val_len) { + buffer *env = venv; + size_t len; + char len_enc[8]; + size_t len_enc_len = 0; + char *dst; + + if (!key || !val) return -1; + + len = key_len + val_len; + + len += key_len > 127 ? 4 : 1; + len += val_len > 127 ? 4 : 1; + + if (buffer_string_length(env) + len >= FCGI_MAX_LENGTH + sizeof(FCGI_BeginRequestRecord) + sizeof(FCGI_Header)) { + /** + * we can't append more headers, ignore it + */ + return -1; + } + + /** + * field length can be 31bit max + * + * HINT: this can't happen as FCGI_MAX_LENGTH is only 16bit + */ + force_assert(key_len < 0x7fffffffu); + force_assert(val_len < 0x7fffffffu); + + if (buffer_string_space(env) < len) { + size_t extend = env->size * 2 - buffer_string_length(env); + extend = extend > len ? extend : len + 4095; + buffer_string_prepare_append(env, extend); + } + + if (key_len > 127) { + len_enc[len_enc_len++] = ((key_len >> 24) & 0xff) | 0x80; + len_enc[len_enc_len++] = (key_len >> 16) & 0xff; + len_enc[len_enc_len++] = (key_len >> 8) & 0xff; + len_enc[len_enc_len++] = (key_len >> 0) & 0xff; + } else { + len_enc[len_enc_len++] = (key_len >> 0) & 0xff; + } + + if (val_len > 127) { + len_enc[len_enc_len++] = ((val_len >> 24) & 0xff) | 0x80; + len_enc[len_enc_len++] = (val_len >> 16) & 0xff; + len_enc[len_enc_len++] = (val_len >> 8) & 0xff; + len_enc[len_enc_len++] = (val_len >> 0) & 0xff; + } else { + len_enc[len_enc_len++] = (val_len >> 0) & 0xff; + } + + dst = buffer_string_prepare_append(env, len); + memcpy(dst, len_enc, len_enc_len); + memcpy(dst + len_enc_len, key, key_len); + memcpy(dst + len_enc_len + key_len, val, val_len); + buffer_commit(env, len); + + return 0; +} + +static void fcgi_header(FCGI_Header * header, unsigned char type, int request_id, int contentLength, unsigned char paddingLength) { + force_assert(contentLength <= FCGI_MAX_LENGTH); + + header->version = FCGI_VERSION_1; + header->type = type; + header->requestIdB0 = request_id & 0xff; + header->requestIdB1 = (request_id >> 8) & 0xff; + header->contentLengthB0 = contentLength & 0xff; + header->contentLengthB1 = (contentLength >> 8) & 0xff; + header->paddingLength = paddingLength; + header->reserved = 0; +} + +static handler_t fcgi_stdin_append(server *srv, handler_ctx *hctx) { + FCGI_Header header; + connection *con = hctx->remote_conn; + chunkqueue *req_cq = con->request_content_queue; + off_t offset, weWant; + const off_t req_cqlen = req_cq->bytes_in - req_cq->bytes_out; + int request_id = hctx->request_id; + UNUSED(srv); + + /* something to send ? */ + for (offset = 0; offset != req_cqlen; offset += weWant) { + weWant = req_cqlen - offset > FCGI_MAX_LENGTH ? FCGI_MAX_LENGTH : req_cqlen - offset; + + if (-1 != hctx->wb_reqlen) { + if (hctx->wb_reqlen >= 0) { + hctx->wb_reqlen += sizeof(header); + } else { + hctx->wb_reqlen -= sizeof(header); + } + } + + fcgi_header(&(header), FCGI_STDIN, request_id, weWant, 0); + (chunkqueue_is_empty(hctx->wb) || hctx->wb->first->type == MEM_CHUNK) /* else FILE_CHUNK for temp file */ + ? chunkqueue_append_mem(hctx->wb, (const char *)&header, sizeof(header)) + : chunkqueue_append_mem_min(hctx->wb, (const char *)&header, sizeof(header)); + chunkqueue_steal(hctx->wb, req_cq, weWant); + /*(hctx->wb_reqlen already includes content_length)*/ + } + + if (hctx->wb->bytes_in == hctx->wb_reqlen) { + /* terminate STDIN */ + /* (future: must defer ending FCGI_STDIN + * if might later upgrade protocols + * and then have more data to send) */ + fcgi_header(&(header), FCGI_STDIN, request_id, 0, 0); + chunkqueue_append_mem(hctx->wb, (const char *)&header, sizeof(header)); + hctx->wb_reqlen += (int)sizeof(header); + } + + return HANDLER_GO_ON; +} + +static handler_t fcgi_create_env(server *srv, handler_ctx *hctx) { + FCGI_BeginRequestRecord beginRecord; + FCGI_Header header; + int request_id; + + gw_host *host = hctx->host; + connection *con = hctx->remote_conn; + + http_cgi_opts opts = { + (hctx->gw_mode == FCGI_AUTHORIZER), + host->break_scriptfilename_for_php, + host->docroot, + host->strip_request_uri + }; + + size_t rsz = (size_t)(con->read_queue->bytes_out - hctx->wb->bytes_in); + buffer * const b = chunkqueue_prepend_buffer_open_sz(hctx->wb, rsz < 65536 ? rsz : con->header_len); + + /* send FCGI_BEGIN_REQUEST */ + + if (hctx->request_id == 0) { + hctx->request_id = 1; /* always use id 1 as we don't use multiplexing */ + } else { + log_error_write(srv, __FILE__, __LINE__, "sd", + "fcgi-request is already in use:", hctx->request_id); + } + request_id = hctx->request_id; + + fcgi_header(&(beginRecord.header), FCGI_BEGIN_REQUEST, request_id, sizeof(beginRecord.body), 0); + beginRecord.body.roleB0 = hctx->gw_mode; + beginRecord.body.roleB1 = 0; + beginRecord.body.flags = 0; + memset(beginRecord.body.reserved, 0, sizeof(beginRecord.body.reserved)); + + buffer_copy_string_len(b, (const char *)&beginRecord, sizeof(beginRecord)); + fcgi_header(&header, FCGI_PARAMS, request_id, 0, 0); /*(set aside space to fill in later)*/ + buffer_append_string_len(b, (const char *)&header, sizeof(header)); + + /* send FCGI_PARAMS */ + + if (0 != http_cgi_headers(srv, con, &opts, fcgi_env_add, b)) { + con->http_status = 400; + con->mode = DIRECT; + buffer_clear(b); + chunkqueue_remove_finished_chunks(hctx->wb); + return HANDLER_FINISHED; + } else { + fcgi_header(&(header), FCGI_PARAMS, request_id, + buffer_string_length(b) - sizeof(FCGI_BeginRequestRecord) - sizeof(FCGI_Header), 0); + memcpy(b->ptr+sizeof(FCGI_BeginRequestRecord), (const char *)&header, sizeof(header)); + + fcgi_header(&(header), FCGI_PARAMS, request_id, 0, 0); + buffer_append_string_len(b, (const char *)&header, sizeof(header)); + + hctx->wb_reqlen = buffer_string_length(b); + chunkqueue_prepend_buffer_commit(hctx->wb); + } + + if (con->request.content_length) { + /*chunkqueue_append_chunkqueue(hctx->wb, con->request_content_queue);*/ + if (con->request.content_length > 0) + hctx->wb_reqlen += con->request.content_length;/* (eventual) (minimal) total request size, not necessarily including all fcgi_headers around content length yet */ + else /* as-yet-unknown total request size (Transfer-Encoding: chunked)*/ + hctx->wb_reqlen = -hctx->wb_reqlen; + } + fcgi_stdin_append(srv, hctx); + + status_counter_inc(srv, CONST_STR_LEN("fastcgi.requests")); + return HANDLER_GO_ON; +} + +typedef struct { + unsigned int len; + int type; + int padding; + int request_id; +} fastcgi_response_packet; + +static int fastcgi_get_packet(server *srv, handler_ctx *hctx, fastcgi_response_packet *packet) { + FCGI_Header header; + size_t toread = sizeof(FCGI_Header), flen = 0; + off_t rblen = chunkqueue_length(hctx->rb); + if (rblen < (off_t)sizeof(FCGI_Header)) { + /* no header */ + if (hctx->conf.debug && 0 != rblen) { + log_error_write(srv, __FILE__, __LINE__, "sosds", "FastCGI: header too small:", rblen, "bytes <", sizeof(FCGI_Header), "bytes, waiting for more data"); + } + return -1; + } + + /* get at least the FastCGI header */ + for (chunk *c = hctx->rb->first; c; c = c->next) { + size_t weHave = buffer_string_length(c->mem) - c->offset; + if (weHave >= toread) { + memcpy((char *)&header + flen, c->mem->ptr + c->offset, toread); + break; + } + + memcpy((char *)&header + flen, c->mem->ptr + c->offset, weHave); + flen += weHave; + toread -= weHave; + } + + /* we have at least a header, now check how much we have to fetch */ + packet->len = (header.contentLengthB0 | (header.contentLengthB1 << 8)) + header.paddingLength; + packet->request_id = (header.requestIdB0 | (header.requestIdB1 << 8)); + packet->type = header.type; + packet->padding = header.paddingLength; + + if (packet->len > (unsigned int)rblen-sizeof(FCGI_Header)) { + return -1; /* we didn't get the full packet */ + } + + chunkqueue_mark_written(hctx->rb, sizeof(FCGI_Header)); + return 0; +} + +static void fastcgi_get_packet_body(buffer *b, handler_ctx *hctx, fastcgi_response_packet *packet) { + /* copy content; hctx->rb must contain at least packet->len content */ + size_t toread = packet->len - packet->padding; + buffer_string_prepare_append(b, toread); + for (chunk *c = hctx->rb->first; c; c = c->next) { + size_t weHave = buffer_string_length(c->mem) - c->offset; + if (weHave >= toread) { + buffer_append_string_len(b, c->mem->ptr + c->offset, toread); + break; + } + + buffer_append_string_len(b, c->mem->ptr + c->offset, weHave); + toread -= weHave; + } + chunkqueue_mark_written(hctx->rb, packet->len); +} + +static handler_t fcgi_recv_parse(server *srv, connection *con, struct http_response_opts_t *opts, buffer *b, size_t n) { + handler_ctx *hctx = (handler_ctx *)opts->pdata; + int fin = 0; + + if (0 == n) { + if (-1 == hctx->request_id) return HANDLER_FINISHED; /*(flag request ended)*/ + if (!(fdevent_event_get_interest(srv->ev, hctx->fd) & FDEVENT_IN) + && !(con->conf.stream_response_body & FDEVENT_STREAM_RESPONSE_POLLRDHUP)) + return HANDLER_GO_ON; + log_error_write(srv, __FILE__, __LINE__, "ssdsb", + "unexpected end-of-file (perhaps the fastcgi process died):", + "pid:", hctx->proc->pid, + "socket:", hctx->proc->connection_name); + + return HANDLER_ERROR; + } + + chunkqueue_append_buffer(hctx->rb, b); + + /* + * parse the fastcgi packets and forward the content to the write-queue + * + */ + while (fin == 0) { + fastcgi_response_packet packet; + + /* check if we have at least one packet */ + if (0 != fastcgi_get_packet(srv, hctx, &packet)) { + /* no full packet */ + break; + } + + switch(packet.type) { + case FCGI_STDOUT: + if (packet.len == 0) break; + + /* is the header already finished */ + if (0 == con->file_started) { + /* split header from body */ + buffer *hdrs = hctx->response; + if (NULL == hdrs) { + hdrs = srv->tmp_buf; + buffer_clear(srv->tmp_buf); + } + fastcgi_get_packet_body(hdrs, hctx, &packet); + if (HANDLER_GO_ON != http_response_parse_headers(srv, con, &hctx->opts, hdrs)) { + hctx->send_content_body = 0; + fin = 1; + break; + } + if (0 == con->file_started) { + if (!hctx->response) { + hctx->response = chunk_buffer_acquire(); + buffer_copy_buffer(hctx->response, hdrs); + } + } + else if (hctx->gw_mode == GW_AUTHORIZER && + (con->http_status == 0 || con->http_status == 200)) { + /* authorizer approved request; ignore the content here */ + hctx->send_content_body = 0; + } + } else if (hctx->send_content_body) { + if (0 != http_chunk_transfer_cqlen(srv, con, hctx->rb, packet.len - packet.padding)) { + /* error writing to tempfile; + * truncate response or send 500 if nothing sent yet */ + fin = 1; + } + if (packet.padding) chunkqueue_mark_written(hctx->rb, packet.padding); + } else { + chunkqueue_mark_written(hctx->rb, packet.len); + } + break; + case FCGI_STDERR: + if (packet.len == 0) break; + + buffer_clear(srv->tmp_buf); + fastcgi_get_packet_body(srv->tmp_buf, hctx, &packet); + log_error_write_multiline_buffer(srv, __FILE__, __LINE__, srv->tmp_buf, "s", + "FastCGI-stderr:"); + + break; + case FCGI_END_REQUEST: + hctx->request_id = -1; /*(flag request ended)*/ + fin = 1; + break; + default: + log_error_write(srv, __FILE__, __LINE__, "sd", + "FastCGI: header.type not handled: ", packet.type); + chunkqueue_mark_written(hctx->rb, packet.len); + break; + } + } + + return 0 == fin ? HANDLER_GO_ON : HANDLER_FINISHED; +} + +#define PATCH(x) \ + p->conf.x = s->x; +static int fcgi_patch_connection(server *srv, connection *con, plugin_data *p) { + size_t i, j; + plugin_config *s = p->config_storage[0]; + + PATCH(exts); + PATCH(exts_auth); + PATCH(exts_resp); + PATCH(debug); + PATCH(balance); + PATCH(ext_mapping); + + /* skip the first, the global context */ + for (i = 1; i < srv->config_context->used; i++) { + data_config *dc = (data_config *)srv->config_context->data[i]; + s = p->config_storage[i]; + + /* condition didn't match */ + if (!config_check_cond(srv, con, dc)) continue; + + /* merge config */ + for (j = 0; j < dc->value->used; j++) { + data_unset *du = dc->value->data[j]; + + if (buffer_is_equal_string(du->key, CONST_STR_LEN("fastcgi.server"))) { + PATCH(exts); + PATCH(exts_auth); + PATCH(exts_resp); + } else if (buffer_is_equal_string(du->key, CONST_STR_LEN("fastcgi.debug"))) { + PATCH(debug); + } else if (buffer_is_equal_string(du->key, CONST_STR_LEN("fastcgi.balance"))) { + PATCH(balance); + } else if (buffer_is_equal_string(du->key, CONST_STR_LEN("fastcgi.map-extensions"))) { + PATCH(ext_mapping); + } + } + } + + return 0; +} +#undef PATCH + +static handler_t fcgi_check_extension(server *srv, connection *con, void *p_d, int uri_path_handler) { + plugin_data *p = p_d; + handler_t rc; + + if (con->mode != DIRECT) return HANDLER_GO_ON; + + fcgi_patch_connection(srv, con, p); + if (NULL == p->conf.exts) return HANDLER_GO_ON; + + rc = gw_check_extension(srv, con, p, uri_path_handler, 0); + if (HANDLER_GO_ON != rc) return rc; + + if (con->mode == p->id) { + handler_ctx *hctx = con->plugin_ctx[p->id]; + hctx->opts.backend = BACKEND_FASTCGI; + hctx->opts.parse = fcgi_recv_parse; + hctx->opts.pdata = hctx; + hctx->stdin_append = fcgi_stdin_append; + hctx->create_env = fcgi_create_env; + if (!hctx->rb) { + hctx->rb = chunkqueue_init(); + } + else { + chunkqueue_reset(hctx->rb); + } + } + + return HANDLER_GO_ON; +} + +/* uri-path handler */ +static handler_t fcgi_check_extension_1(server *srv, connection *con, void *p_d) { + return fcgi_check_extension(srv, con, p_d, 1); +} + +/* start request handler */ +static handler_t fcgi_check_extension_2(server *srv, connection *con, void *p_d) { + return fcgi_check_extension(srv, con, p_d, 0); +} + + +int mod_fastcgi_plugin_init(plugin *p); +int mod_fastcgi_plugin_init(plugin *p) { + p->version = LIGHTTPD_VERSION_ID; + p->name = buffer_init_string("fastcgi"); + + p->init = gw_init; + p->cleanup = gw_free; + p->set_defaults = mod_fastcgi_set_defaults; + p->connection_reset = gw_connection_reset; + p->handle_uri_clean = fcgi_check_extension_1; + p->handle_subrequest_start = fcgi_check_extension_2; + p->handle_subrequest = gw_handle_subrequest; + p->handle_trigger = gw_handle_trigger; + p->handle_waitpid = gw_handle_waitpid_cb; + + p->data = NULL; + + return 0; +} |