diff options
Diffstat (limited to 'data/lighttpd/lighttpd-1.4.53/src/response.c')
-rw-r--r-- | data/lighttpd/lighttpd-1.4.53/src/response.c | 702 |
1 files changed, 702 insertions, 0 deletions
diff --git a/data/lighttpd/lighttpd-1.4.53/src/response.c b/data/lighttpd/lighttpd-1.4.53/src/response.c new file mode 100644 index 000000000..09ab8d23b --- /dev/null +++ b/data/lighttpd/lighttpd-1.4.53/src/response.c @@ -0,0 +1,702 @@ +#include "first.h" + +#include "response.h" +#include "base.h" +#include "burl.h" +#include "fdevent.h" +#include "http_header.h" +#include "http_kv.h" +#include "log.h" +#include "stat_cache.h" +#include "chunk.h" + +#include "configfile.h" + +#include "plugin.h" + +#include <sys/types.h> +#include <sys/stat.h> + +#include <limits.h> +#include <errno.h> +#include <stdlib.h> +#include <string.h> +#include <time.h> + +int http_response_write_header(server *srv, connection *con) { + buffer * const b = chunkqueue_prepend_buffer_open(con->write_queue); + + if (con->request.http_version == HTTP_VERSION_1_1) { + buffer_copy_string_len(b, CONST_STR_LEN("HTTP/1.1 ")); + } else { + buffer_copy_string_len(b, CONST_STR_LEN("HTTP/1.0 ")); + } + http_status_append(b, con->http_status); + + /* disable keep-alive if requested */ + if (con->request_count > con->conf.max_keep_alive_requests || 0 == con->conf.max_keep_alive_idle) { + con->keep_alive = 0; + } else if (0 != con->request.content_length + && con->request.content_length != con->request_content_queue->bytes_in + && (con->mode == DIRECT || 0 == con->conf.stream_request_body)) { + con->keep_alive = 0; + } else { + con->keep_alive_idle = con->conf.max_keep_alive_idle; + } + + if ((con->response.htags & HTTP_HEADER_UPGRADE) && con->request.http_version == HTTP_VERSION_1_1) { + http_header_response_set(con, HTTP_HEADER_CONNECTION, CONST_STR_LEN("Connection"), CONST_STR_LEN("upgrade")); + } else if (0 == con->keep_alive) { + http_header_response_set(con, HTTP_HEADER_CONNECTION, CONST_STR_LEN("Connection"), CONST_STR_LEN("close")); + } else if (con->request.http_version == HTTP_VERSION_1_0) {/*(&& con->keep_alive != 0)*/ + http_header_response_set(con, HTTP_HEADER_CONNECTION, CONST_STR_LEN("Connection"), CONST_STR_LEN("keep-alive")); + } + + if (304 == con->http_status && (con->response.htags & HTTP_HEADER_CONTENT_ENCODING)) { + http_header_response_unset(con, HTTP_HEADER_CONTENT_ENCODING, CONST_STR_LEN("Content-Encoding")); + } + + /* add all headers */ + for (size_t i = 0; i < con->response.headers->used; ++i) { + const data_string * const ds = (data_string *)con->response.headers->data[i]; + + if (buffer_string_is_empty(ds->value) || buffer_string_is_empty(ds->key)) continue; + if ((ds->key->ptr[0] & 0xdf) == 'X') { + if (0 == strncasecmp(ds->key->ptr, CONST_STR_LEN("X-Sendfile"))) continue; + if (0 == strncasecmp(ds->key->ptr, CONST_STR_LEN("X-LIGHTTPD-"))) { + if (0 == strncasecmp(ds->key->ptr+sizeof("X-LIGHTTPD-")-1, CONST_STR_LEN("KBytes-per-second"))) { + /* "X-LIGHTTPD-KBytes-per-second" */ + long limit = strtol(ds->value->ptr, NULL, 10); + if (limit > 0 + && (limit < con->conf.kbytes_per_second + || 0 == con->conf.kbytes_per_second)) { + if (limit > USHRT_MAX) limit= USHRT_MAX; + con->conf.kbytes_per_second = limit; + } + } + continue; + } + } + + buffer_append_string_len(b, CONST_STR_LEN("\r\n")); + buffer_append_string_buffer(b, ds->key); + buffer_append_string_len(b, CONST_STR_LEN(": ")); + buffer_append_string_buffer(b, ds->value); + } + + if (!(con->response.htags & HTTP_HEADER_DATE)) { + /* HTTP/1.1 requires a Date: header */ + buffer_append_string_len(b, CONST_STR_LEN("\r\nDate: ")); + + /* cache the generated timestamp */ + if (srv->cur_ts != srv->last_generated_date_ts) { + buffer_clear(srv->ts_date_str); + buffer_append_strftime(srv->ts_date_str, "%a, %d %b %Y %H:%M:%S GMT", gmtime(&(srv->cur_ts))); + srv->last_generated_date_ts = srv->cur_ts; + } + + buffer_append_string_buffer(b, srv->ts_date_str); + } + + if (!(con->response.htags & HTTP_HEADER_SERVER)) { + if (!buffer_string_is_empty(con->conf.server_tag)) { + buffer_append_string_len(b, CONST_STR_LEN("\r\nServer: ")); + buffer_append_string_len(b, CONST_BUF_LEN(con->conf.server_tag)); + } + } + + buffer_append_string_len(b, CONST_STR_LEN("\r\n\r\n")); + + con->bytes_header = buffer_string_length(b); + + if (con->conf.log_response_header) { + log_error_write(srv, __FILE__, __LINE__, "sSb", "Response-Header:", "\n", b); + } + + chunkqueue_prepend_buffer_commit(con->write_queue); + return 0; +} + +static handler_t http_response_physical_path_check(server *srv, connection *con) { + stat_cache_entry *sce = NULL; + + if (HANDLER_ERROR != stat_cache_get_entry(srv, con, con->physical.path, &sce)) { + /* file exists */ + } else { + char *pathinfo = NULL; + switch (errno) { + case EACCES: + con->http_status = 403; + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- access denied"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + + buffer_reset(con->physical.path); + return HANDLER_FINISHED; + case ENAMETOOLONG: + /* file name to be read was too long. return 404 */ + case ENOENT: + con->http_status = 404; + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- file not found"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + + buffer_reset(con->physical.path); + return HANDLER_FINISHED; + case ENOTDIR: + /* PATH_INFO ! :) */ + break; + default: + /* we have no idea what happend. let's tell the user so. */ + con->http_status = 500; + buffer_reset(con->physical.path); + + log_error_write(srv, __FILE__, __LINE__, "ssbsb", + "file not found ... or so: ", strerror(errno), + con->uri.path, + "->", con->physical.path); + + return HANDLER_FINISHED; + } + + /* not found, perhaps PATHINFO */ + + { + /*(might check at startup that s->document_root does not end in '/')*/ + size_t len = buffer_string_length(con->physical.basedir); + if (len > 0 && '/' == con->physical.basedir->ptr[len-1]) --len; + pathinfo = con->physical.path->ptr + len; + if ('/' != *pathinfo) { + pathinfo = NULL; + } + else if (pathinfo == con->physical.path->ptr) { /*(basedir is "/")*/ + pathinfo = strchr(pathinfo+1, '/'); + } + } + + for (char *pprev = pathinfo; pathinfo; pprev = pathinfo, pathinfo = strchr(pathinfo+1, '/')) { + stat_cache_entry *nsce = NULL; + buffer_copy_string_len(srv->tmp_buf, con->physical.path->ptr, pathinfo - con->physical.path->ptr); + if (HANDLER_ERROR == stat_cache_get_entry(srv, con, srv->tmp_buf, &nsce)) { + pathinfo = pathinfo != pprev ? pprev : NULL; + break; + } + sce = nsce; + if (!S_ISDIR(sce->st.st_mode)) break; + } + + if (NULL == pathinfo || !S_ISREG(sce->st.st_mode)) { + /* no it really doesn't exists */ + con->http_status = 404; + + if (con->conf.log_file_not_found) { + log_error_write(srv, __FILE__, __LINE__, "sbsb", + "file not found:", con->uri.path, + "->", con->physical.path); + } + + buffer_reset(con->physical.path); + + return HANDLER_FINISHED; + } + + /* we have a PATHINFO */ + if (pathinfo) { + size_t len = strlen(pathinfo), reqlen; + if (con->conf.force_lowercase_filenames + && len <= (reqlen = buffer_string_length(con->request.uri)) + && 0 == strncasecmp(con->request.uri->ptr + reqlen - len, pathinfo, len)) { + /* attempt to preserve case-insensitive PATH_INFO + * (works in common case where mod_alias, mod_magnet, and other modules + * have not modified the PATH_INFO portion of request URI, or did so + * with exactly the PATH_INFO desired) */ + buffer_copy_string_len(con->request.pathinfo, con->request.uri->ptr + reqlen - len, len); + } else { + buffer_copy_string_len(con->request.pathinfo, pathinfo, len); + } + + /* + * shorten uri.path + */ + + buffer_string_set_length(con->uri.path, buffer_string_length(con->uri.path) - len); + buffer_string_set_length(con->physical.path, (size_t)(pathinfo - con->physical.path->ptr)); + } + } + +#ifdef HAVE_LSTAT + if ((sce->is_symlink != 0) && !con->conf.follow_symlink) { + con->http_status = 403; + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- access denied due symlink restriction"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + + buffer_reset(con->physical.path); + return HANDLER_FINISHED; + }; +#endif + if (S_ISDIR(sce->st.st_mode)) { + if (con->uri.path->ptr[buffer_string_length(con->uri.path) - 1] != '/') { + /* redirect to .../ */ + + http_response_redirect_to_directory(srv, con); + + return HANDLER_FINISHED; + } +#ifdef HAVE_LSTAT + } else if (!S_ISREG(sce->st.st_mode) && !sce->is_symlink) { +#else + } else if (!S_ISREG(sce->st.st_mode)) { +#endif + /* any special handling of non-reg files ?*/ + } + + return HANDLER_GO_ON; +} + +handler_t http_response_prepare(server *srv, connection *con) { + handler_t r; + + /* looks like someone has already done a decision */ + if (con->mode == DIRECT && + (con->http_status != 0 && con->http_status != 200)) { + /* remove a packets in the queue */ + if (con->file_finished == 0) { + http_response_body_clear(con, 0); + } + + return HANDLER_FINISHED; + } + + /* no decision yet, build conf->filename */ + if (con->mode == DIRECT && buffer_is_empty(con->physical.path)) { + + /* we only come here when we have the parse the full request again + * + * a HANDLER_COMEBACK from mod_rewrite and mod_fastcgi might be a + * problem here as mod_setenv might get called multiple times + * + * fastcgi-auth might lead to a COMEBACK too + * fastcgi again dead server too + * + * mod_compress might add headers twice too + * + * */ + + if (!con->async_callback) { + + config_cond_cache_reset(srv, con); + config_setup_connection(srv, con); /* Perhaps this could be removed at other places. */ + + if (con->conf.log_condition_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "run condition"); + } + + /** + * prepare strings + * + * - uri.path_raw + * - uri.path + * - uri.query + * + */ + + /** + * Name according to RFC 2396 + * + * - scheme + * - authority + * - path + * - query + * + * (scheme)://(authority)(path)?(query)#fragment + * + * + */ + + /* take initial scheme value from connection-level state + * (request con->uri.scheme can be overwritten for later, + * for example by mod_extforward or mod_magnet) */ + buffer_copy_buffer(con->uri.scheme, con->proto); + buffer_copy_buffer(con->uri.authority, con->request.http_host); + buffer_to_lower(con->uri.authority); + + if (con->request.http_method == HTTP_METHOD_CONNECT + || (con->request.http_method == HTTP_METHOD_OPTIONS + && con->request.uri->ptr[0] == '*' + && con->request.uri->ptr[1] == '\0')) { + /* CONNECT ... (or) OPTIONS * ... */ + buffer_copy_buffer(con->uri.path_raw, con->request.uri); + buffer_copy_buffer(con->uri.path, con->uri.path_raw); + buffer_reset(con->uri.query); + } else { + char *qstr; + if (con->conf.http_parseopts & HTTP_PARSEOPT_URL_NORMALIZE) { + /*size_t len = buffer_string_length(con->request.uri);*/ + int qs = burl_normalize(con->request.uri, srv->tmp_buf, con->conf.http_parseopts); + if (-2 == qs) { + log_error_write(srv, __FILE__, __LINE__, "sb", + "invalid character in URI -> 400", + con->request.uri); + con->keep_alive = 0; + con->http_status = 400; /* Bad Request */ + con->file_finished = 1; + return HANDLER_FINISHED; + } + qstr = (-1 == qs) ? NULL : con->request.uri->ptr+qs; + #if 0 /* future: might enable here, or below for all requests */ + /* (Note: total header size not recalculated on HANDLER_COMEBACK + * even if other request headers changed during processing) + * (If (0 != con->loops_per_request), then the generated request + * is too large. Should a different error be returned?) */ + con->header_len -= len; + len = buffer_string_length(con->request.uri); + con->header_len += len; + if (len > MAX_HTTP_REQUEST_URI) { + con->keep_alive = 0; + con->http_status = 414; /* Request-URI Too Long */ + con->file_finished = 1; + return HANDLER_FINISHED; + } + if (con->header_len > MAX_HTTP_REQUEST_HEADER) { + log_error_write(srv, __FILE__, __LINE__, "sds", + "request header fields too large:", con->header_len, "-> 431"); + con->keep_alive = 0; + con->http_status = 431; /* Request Header Fields Too Large */ + con->file_finished = 1; + return HANDLER_FINISHED; + } + #endif + } else { + qstr = strchr(con->request.uri->ptr, '#');/* discard fragment */ + if (qstr) buffer_string_set_length(con->request.uri, qstr - con->request.uri->ptr); + qstr = strchr(con->request.uri->ptr, '?'); + } + + /** extract query string from request.uri */ + if (NULL != qstr) { + const char * const pstr = con->request.uri->ptr; + const size_t plen = (size_t)(qstr - pstr); + const size_t rlen = buffer_string_length(con->request.uri); + buffer_copy_string_len(con->uri.query, qstr + 1, rlen - plen - 1); + buffer_copy_string_len(con->uri.path_raw, pstr, plen); + } else { + buffer_reset(con->uri.query); + buffer_copy_buffer(con->uri.path_raw, con->request.uri); + } + + /* decode url to path + * + * - decode url-encodings (e.g. %20 -> ' ') + * - remove path-modifiers (e.g. /../) + */ + + buffer_copy_buffer(con->uri.path, con->uri.path_raw); + buffer_urldecode_path(con->uri.path); + buffer_path_simplify(con->uri.path, con->uri.path); + if (buffer_string_is_empty(con->uri.path) || con->uri.path->ptr[0] != '/') { + log_error_write(srv, __FILE__, __LINE__, "sbs", + "uri-path does not begin with '/':", con->uri.path, "-> 400"); + con->keep_alive = 0; + con->http_status = 400; + con->file_finished = 1; + return HANDLER_FINISHED; + } + } + + con->conditional_is_valid[COMP_SERVER_SOCKET] = 1; /* SERVERsocket */ + con->conditional_is_valid[COMP_HTTP_SCHEME] = 1; /* Scheme: */ + con->conditional_is_valid[COMP_HTTP_HOST] = 1; /* Host: */ + con->conditional_is_valid[COMP_HTTP_REMOTE_IP] = 1; /* Client-IP */ + con->conditional_is_valid[COMP_HTTP_REQUEST_METHOD] = 1; /* REQUEST_METHOD */ + con->conditional_is_valid[COMP_HTTP_URL] = 1; /* HTTPurl */ + con->conditional_is_valid[COMP_HTTP_QUERY_STRING] = 1; /* HTTPqs */ + con->conditional_is_valid[COMP_HTTP_REQUEST_HEADER] = 1; /* HTTP request header */ + config_patch_connection(srv, con); + + /* do we have to downgrade to 1.0 ? */ + if (!con->conf.allow_http11) { + con->request.http_version = HTTP_VERSION_1_0; + } + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- splitting Request-URI"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Request-URI : ", con->request.uri); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI-scheme : ", con->uri.scheme); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI-authority : ", con->uri.authority); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI-path (raw) : ", con->uri.path_raw); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI-path (clean): ", con->uri.path); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI-query : ", con->uri.query); + } + + /* con->conf.max_request_size is in kBytes */ + if (0 != con->conf.max_request_size && + (off_t)con->request.content_length > ((off_t)con->conf.max_request_size << 10)) { + log_error_write(srv, __FILE__, __LINE__, "sos", + "request-size too long:", (off_t) con->request.content_length, "-> 413"); + con->keep_alive = 0; + con->http_status = 413; + con->file_finished = 1; + + return HANDLER_FINISHED; + } + + + } + con->async_callback = 0; /* reset */ + + + /** + * + * call plugins + * + * - based on the raw URL + * + */ + + switch(r = plugins_call_handle_uri_raw(srv, con)) { + case HANDLER_GO_ON: + break; + case HANDLER_FINISHED: + case HANDLER_COMEBACK: + case HANDLER_WAIT_FOR_EVENT: + case HANDLER_ERROR: + return r; + default: + log_error_write(srv, __FILE__, __LINE__, "sd", "handle_uri_raw: unknown return value", r); + break; + } + + /** + * + * call plugins + * + * - based on the clean URL + * + */ + + switch(r = plugins_call_handle_uri_clean(srv, con)) { + case HANDLER_GO_ON: + break; + case HANDLER_FINISHED: + case HANDLER_COMEBACK: + case HANDLER_WAIT_FOR_EVENT: + case HANDLER_ERROR: + return r; + default: + log_error_write(srv, __FILE__, __LINE__, ""); + break; + } + + if (con->request.http_method == HTTP_METHOD_OPTIONS && + con->uri.path->ptr[0] == '*' && con->uri.path->ptr[1] == '\0') { + /* option requests are handled directly without checking of the path */ + + http_header_response_append(con, HTTP_HEADER_OTHER, CONST_STR_LEN("Allow"), CONST_STR_LEN("OPTIONS, GET, HEAD, POST")); + + con->http_status = 200; + con->file_finished = 1; + + return HANDLER_FINISHED; + } + + if (con->request.http_method == HTTP_METHOD_CONNECT && con->mode == DIRECT) { + con->keep_alive = 0; + con->http_status = 405; /* Method Not Allowed */ + con->file_finished = 1; + return HANDLER_FINISHED; + } + + /*** + * + * border + * + * logical filename (URI) becomes a physical filename here + * + * + * + */ + + + + + /* 1. stat() + * ... ISREG() -> ok, go on + * ... ISDIR() -> index-file -> redirect + * + * 2. pathinfo() + * ... ISREG() + * + * 3. -> 404 + * + */ + + /* + * SEARCH DOCUMENT ROOT + */ + + /* set a default */ + + buffer_copy_buffer(con->physical.doc_root, con->conf.document_root); + buffer_copy_buffer(con->physical.rel_path, con->uri.path); + +#if defined(__WIN32) || defined(__CYGWIN__) + /* strip dots from the end and spaces + * + * windows/dos handle those filenames as the same file + * + * foo == foo. == foo..... == "foo... " == "foo.. ./" + * + * This will affect in some cases PATHINFO + * + * on native windows we could prepend the filename with \\?\ to circumvent + * this behaviour. I have no idea how to push this through cygwin + * + * */ + + if (con->physical.rel_path->used > 1) { + buffer *b = con->physical.rel_path; + size_t len = buffer_string_length(b); + + /* strip trailing " /" or "./" once */ + if (len > 1 && + b->ptr[len - 1] == '/' && + (b->ptr[len - 2] == ' ' || b->ptr[len - 2] == '.')) { + len -= 2; + } + /* strip all trailing " " and "." */ + while (len > 0 && ( ' ' == b->ptr[len-1] || '.' == b->ptr[len-1] ) ) --len; + buffer_string_set_length(b, len); + } +#endif + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- before doc_root"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Doc-Root :", con->physical.doc_root); + log_error_write(srv, __FILE__, __LINE__, "sb", "Rel-Path :", con->physical.rel_path); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + /* the docroot plugin should set the doc_root and might also set the physical.path + * for us (all vhost-plugins are supposed to set the doc_root) + * */ + switch(r = plugins_call_handle_docroot(srv, con)) { + case HANDLER_GO_ON: + break; + case HANDLER_FINISHED: + case HANDLER_COMEBACK: + case HANDLER_WAIT_FOR_EVENT: + case HANDLER_ERROR: + return r; + default: + log_error_write(srv, __FILE__, __LINE__, ""); + break; + } + + /* MacOS X and Windows can't distiguish between upper and lower-case + * + * convert to lower-case + */ + if (con->conf.force_lowercase_filenames) { + buffer_to_lower(con->physical.rel_path); + } + + /* the docroot plugins might set the servername, if they don't we take http-host */ + if (buffer_string_is_empty(con->server_name)) { + buffer_copy_buffer(con->server_name, con->uri.authority); + } + + /** + * create physical filename + * -> physical.path = docroot + rel_path + * + */ + + buffer_copy_buffer(con->physical.basedir, con->physical.doc_root); + buffer_copy_buffer(con->physical.path, con->physical.doc_root); + buffer_append_path_len(con->physical.path, CONST_BUF_LEN(con->physical.rel_path)); + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- after doc_root"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Doc-Root :", con->physical.doc_root); + log_error_write(srv, __FILE__, __LINE__, "sb", "Rel-Path :", con->physical.rel_path); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + + if (con->request.http_method == HTTP_METHOD_CONNECT) { + /* do not permit CONNECT requests to hit filesystem hooks + * since the CONNECT URI bypassed path normalization */ + /* (This check is located here so that con->physical.path + * is filled in above to avoid repeating work next time + * http_response_prepare() is called while processing request) */ + } else + switch(r = plugins_call_handle_physical(srv, con)) { + case HANDLER_GO_ON: + break; + case HANDLER_FINISHED: + case HANDLER_COMEBACK: + case HANDLER_WAIT_FOR_EVENT: + case HANDLER_ERROR: + return r; + default: + log_error_write(srv, __FILE__, __LINE__, ""); + break; + } + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- logical -> physical"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Doc-Root :", con->physical.doc_root); + log_error_write(srv, __FILE__, __LINE__, "sb", "Basedir :", con->physical.basedir); + log_error_write(srv, __FILE__, __LINE__, "sb", "Rel-Path :", con->physical.rel_path); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + } + + /* + * Noone catched away the file from normal path of execution yet (like mod_access) + * + * Go on and check of the file exists at all + */ + + if (con->mode == DIRECT) { + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- handling physical path"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + } + + r = http_response_physical_path_check(srv, con); + if (HANDLER_GO_ON != r) return r; + + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- handling subrequest"); + log_error_write(srv, __FILE__, __LINE__, "sb", "Path :", con->physical.path); + log_error_write(srv, __FILE__, __LINE__, "sb", "URI :", con->uri.path); + log_error_write(srv, __FILE__, __LINE__, "sb", "Pathinfo :", con->request.pathinfo); + } + + /* call the handlers */ + r = plugins_call_handle_subrequest_start(srv, con); + if (HANDLER_GO_ON != r) { + if (con->conf.log_request_handling) { + log_error_write(srv, __FILE__, __LINE__, "s", "-- subrequest finished"); + } + return r; + } + + /* if we are still here, no one wanted the file, status 403 is ok I think */ + if (con->mode == DIRECT && con->http_status == 0) { + con->http_status = (con->request.http_method != HTTP_METHOD_OPTIONS) ? 403 : 200; + return HANDLER_FINISHED; + } + + } + + r = plugins_call_handle_subrequest(srv, con); + if (HANDLER_GO_ON == r) r = HANDLER_FINISHED; /* request was not handled, looks like we are done */ + return r; +} |