1 /* Licensed to the Apache Software Foundation (ASF) under one or more
2 * contributor license agreements. See the NOTICE file distributed with
3 * this work for additional information regarding copyright ownership.
4 * The ASF licenses this file to You under the Apache License, Version 2.0
5 * (the "License"); you may not use this file except in compliance with
6 * the License. You may obtain a copy of the License at
8 * http://www.apache.org/licenses/LICENSE-2.0
10 * Unless required by applicable law or agreed to in writing, software
11 * distributed under the License is distributed on an "AS IS" BASIS,
12 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
13 * See the License for the specific language governing permissions and
14 * limitations under the License.
19 * @brief functions to get and process requests
21 * @author Rob McCool 3/21/93
23 * Thoroughly revamped by rst for Apache. NB this file reads
24 * best from the bottom up.
28 #include "apr_strings.h"
29 #include "apr_file_io.h"
30 #include "apr_fnmatch.h"
32 #define APR_WANT_STRFUNC
35 #include "ap_config.h"
36 #include "ap_provider.h"
38 #include "http_config.h"
39 #include "http_request.h"
40 #include "http_core.h"
41 #include "http_protocol.h"
43 #include "http_main.h"
44 #include "util_filter.h"
45 #include "util_charset.h"
46 #include "util_script.h"
48 #include "mod_request.h"
57 APLOG_USE_MODULE(core);
60 APR_HOOK_LINK(translate_name)
61 APR_HOOK_LINK(map_to_storage)
62 APR_HOOK_LINK(check_user_id)
64 APR_HOOK_LINK(type_checker)
65 APR_HOOK_LINK(access_checker)
66 APR_HOOK_LINK(access_checker_ex)
67 APR_HOOK_LINK(auth_checker)
68 APR_HOOK_LINK(insert_filter)
69 APR_HOOK_LINK(create_request)
72 AP_IMPLEMENT_HOOK_RUN_FIRST(int,translate_name,
73 (request_rec *r), (r), DECLINED)
74 AP_IMPLEMENT_HOOK_RUN_FIRST(int,map_to_storage,
75 (request_rec *r), (r), DECLINED)
76 AP_IMPLEMENT_HOOK_RUN_FIRST(int,check_user_id,
77 (request_rec *r), (r), DECLINED)
78 AP_IMPLEMENT_HOOK_RUN_ALL(int,fixups,
79 (request_rec *r), (r), OK, DECLINED)
80 AP_IMPLEMENT_HOOK_RUN_FIRST(int,type_checker,
81 (request_rec *r), (r), DECLINED)
82 AP_IMPLEMENT_HOOK_RUN_ALL(int,access_checker,
83 (request_rec *r), (r), OK, DECLINED)
84 AP_IMPLEMENT_HOOK_RUN_FIRST(int,access_checker_ex,
85 (request_rec *r), (r), DECLINED)
86 AP_IMPLEMENT_HOOK_RUN_FIRST(int,auth_checker,
87 (request_rec *r), (r), DECLINED)
88 AP_IMPLEMENT_HOOK_VOID(insert_filter, (request_rec *r), (r))
89 AP_IMPLEMENT_HOOK_RUN_ALL(int, create_request,
90 (request_rec *r), (r), OK, DECLINED)
92 static int auth_internal_per_conf = 0;
93 static int auth_internal_per_conf_hooks = 0;
94 static int auth_internal_per_conf_providers = 0;
97 static int decl_die(int status, const char *phase, request_rec *r)
99 if (status == DECLINED) {
100 ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
101 "configuration error: couldn't %s: %s", phase, r->uri);
102 return HTTP_INTERNAL_SERVER_ERROR;
105 ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
106 "auth phase '%s' gave status %d: %s", phase,
112 /* This is the master logic for processing requests. Do NOT duplicate
113 * this logic elsewhere, or the security model will be broken by future
114 * API changes. Each phase must be individually optimized to pick up
115 * redundant/duplicate calls by subrequests, and redirects.
117 AP_DECLARE(int) ap_process_request_internal(request_rec *r)
119 int file_req = (r->main && r->filename);
123 /* Ignore embedded %2F's in path for proxy requests */
124 if (!r->proxyreq && r->parsed_uri.path) {
125 d = ap_get_module_config(r->per_dir_config, &core_module);
126 if (d->allow_encoded_slashes) {
127 access_status = ap_unescape_url_keep2f(r->parsed_uri.path);
130 access_status = ap_unescape_url(r->parsed_uri.path);
133 if (access_status == HTTP_NOT_FOUND) {
134 if (! d->allow_encoded_slashes) {
135 ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
136 "found %%2f (encoded '/') in URI "
137 "(decoded='%s'), returning 404",
141 return access_status;
145 ap_getparents(r->uri); /* OK --- shrinking transformations... */
147 /* All file subrequests are a huge pain... they cannot bubble through the
148 * next several steps. Only file subrequests are allowed an empty uri,
149 * otherwise let translate_name kill the request.
152 if ((access_status = ap_location_walk(r))) {
153 return access_status;
156 d = ap_get_module_config(r->per_dir_config, &core_module);
161 if ((access_status = ap_run_translate_name(r))) {
162 return decl_die(access_status, "translate", r);
166 /* Reset to the server default config prior to running map_to_storage
168 r->per_dir_config = r->server->lookup_defaults;
170 if ((access_status = ap_run_map_to_storage(r))) {
171 /* This request wasn't in storage (e.g. TRACE) */
172 return access_status;
175 /* Rerun the location walk, which overrides any map_to_storage config.
177 if ((access_status = ap_location_walk(r))) {
178 return access_status;
181 d = ap_get_module_config(r->per_dir_config, &core_module);
186 /* Only on the main request! */
187 if (r->main == NULL) {
188 if ((access_status = ap_run_header_parser(r))) {
189 return access_status;
193 /* Skip authn/authz if the parent or prior request passed the authn/authz,
194 * and that configuration didn't change (this requires optimized _walk()
195 * functions in map_to_storage that use the same merge results given
196 * identical input.) If the config changes, we must re-auth.
198 if (r->prev && (r->prev->per_dir_config == r->per_dir_config)) {
199 r->user = r->prev->user;
200 r->ap_auth_type = r->prev->ap_auth_type;
202 else if (r->main && (r->main->per_dir_config == r->per_dir_config)) {
203 r->user = r->main->user;
204 r->ap_auth_type = r->main->ap_auth_type;
207 switch (ap_satisfies(r)) {
210 if ((access_status = ap_run_access_checker(r)) != OK) {
211 return decl_die(access_status,
212 "check access (with Satisfy All)", r);
215 access_status = ap_run_access_checker_ex(r);
216 if (access_status == OK) {
217 ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
218 "request authorized without authentication by "
219 "access_checker_ex hook: %s", r->uri);
221 else if (access_status != DECLINED) {
222 return decl_die(access_status, "check access", r);
225 if ((access_status = ap_run_check_user_id(r)) != OK) {
226 return decl_die(access_status, "check user", r);
228 if (r->user == NULL) {
229 /* don't let buggy authn module crash us in authz */
230 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
231 "Buggy authn provider failed to set user for %s",
233 access_status = HTTP_INTERNAL_SERVER_ERROR;
234 return decl_die(access_status, "check user", r);
236 if ((access_status = ap_run_auth_checker(r)) != OK) {
237 return decl_die(access_status, "check authorization", r);
242 if ((access_status = ap_run_access_checker(r)) == OK) {
243 ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
244 "request authorized without authentication by "
245 "access_checker hook and 'Satisfy any': %s",
250 access_status = ap_run_access_checker_ex(r);
251 if (access_status == OK) {
252 ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
253 "request authorized without authentication by "
254 "access_checker_ex hook: %s", r->uri);
256 else if (access_status != DECLINED) {
257 return decl_die(access_status, "check access", r);
260 if ((access_status = ap_run_check_user_id(r)) != OK) {
261 return decl_die(access_status, "check user", r);
263 if (r->user == NULL) {
264 /* don't let buggy authn module crash us in authz */
265 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
266 "Buggy authn provider failed to set user for %s",
268 access_status = HTTP_INTERNAL_SERVER_ERROR;
269 return decl_die(access_status, "check user", r);
271 if ((access_status = ap_run_auth_checker(r)) != OK) {
272 return decl_die(access_status, "check authorization", r);
278 /* XXX Must make certain the ap_run_type_checker short circuits mime
279 * in mod-proxy for r->proxyreq && r->parsed_uri.scheme
280 * && !strcmp(r->parsed_uri.scheme, "http")
282 if ((access_status = ap_run_type_checker(r)) != OK) {
283 return decl_die(access_status, "find types", r);
286 if ((access_status = ap_run_fixups(r)) != OK) {
287 ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r, "fixups hook gave %d: %s",
288 access_status, r->uri);
289 return access_status;
296 /* Useful caching structures to repeat _walk/merge sequences as required
297 * when a subrequest or redirect reuses substantially the same config.
299 * Directive order in the httpd.conf file and its Includes significantly
300 * impact this optimization. Grouping common blocks at the front of the
301 * config that are less likely to change between a request and
302 * its subrequests, or between a request and its redirects reduced
303 * the work of these functions significantly.
306 typedef struct walk_walked_t {
307 ap_conf_vector_t *matched; /* A dir_conf sections we matched */
308 ap_conf_vector_t *merged; /* The dir_conf merged result */
311 typedef struct walk_cache_t {
312 const char *cached; /* The identifier we matched */
313 ap_conf_vector_t **dir_conf_tested; /* The sections we matched against */
314 ap_conf_vector_t *dir_conf_merged; /* Base per_dir_config */
315 ap_conf_vector_t *per_dir_result; /* per_dir_config += walked result */
316 apr_array_header_t *walked; /* The list of walk_walked_t results */
317 struct walk_cache_t *prev; /* Prev cache of same call in this (sub)req */
318 int count; /* Number of prev invocations of same call in this (sub)req */
321 static walk_cache_t *prep_walk_cache(apr_size_t t, request_rec *r)
323 void **note, **inherit_note;
324 walk_cache_t *cache, *prev_cache, *copy_cache;
327 /* Find the most relevant, recent walk cache to work from and provide
328 * a copy the caller is allowed to munge. In the case of a sub-request
329 * or internal redirect, this is the cache corresponding to the equivalent
330 * invocation of the same function call in the "parent" request, if such
331 * a cache exists. Otherwise it is the walk cache of the previous
332 * invocation of the same function call in the current request, if
333 * that exists; if not, then create a new walk cache.
335 note = ap_get_request_note(r, t);
340 copy_cache = prev_cache = *note;
341 count = prev_cache ? (prev_cache->count + 1) : 0;
344 && (inherit_note = ap_get_request_note(r->prev, t))
347 && (inherit_note = ap_get_request_note(r->main, t))
349 walk_cache_t *inherit_cache = *inherit_note;
351 while (inherit_cache->count > count) {
352 inherit_cache = inherit_cache->prev;
354 if (inherit_cache->count == count) {
355 copy_cache = inherit_cache;
360 cache = apr_pmemdup(r->pool, copy_cache, sizeof(*cache));
361 cache->walked = apr_array_copy(r->pool, cache->walked);
362 cache->prev = prev_cache;
363 cache->count = count;
366 cache = apr_pcalloc(r->pool, sizeof(*cache));
367 cache->walked = apr_array_make(r->pool, 4, sizeof(walk_walked_t));
375 /*****************************************************************
377 * Getting and checking directory configuration. Also checks the
378 * FollowSymlinks and FollowSymOwner stuff, since this is really the
379 * only place that can happen (barring a new mid_dir_walk callout).
381 * We can't do it as an access_checker module function which gets
382 * called with the final per_dir_config, since we could have a directory
383 * with FollowSymLinks disabled, which contains a symlink to another
384 * with a .htaccess file which turns FollowSymLinks back on --- and
385 * access in such a case must be denied. So, whatever it is that
386 * checks FollowSymLinks needs to know the state of the options as
387 * they change, all the way down.
392 * resolve_symlink must _always_ be called on an APR_LNK file type!
393 * It will resolve the actual target file type, modification date, etc,
394 * and provide any processing required for symlink evaluation.
395 * Path must already be cleaned, no trailing slash, no multi-slashes,
396 * and don't call this on the root!
398 * Simply, the number of times we deref a symlink are minimal compared
399 * to the number of times we had an extra lstat() since we 'weren't sure'.
401 * To optimize, we stat() anything when given (opts & OPT_SYM_LINKS), otherwise
402 * we start off with an lstat(). Every lstat() must be dereferenced in case
403 * it points at a 'nasty' - we must always rerun check_safe_file (or similar.)
405 static int resolve_symlink(char *d, apr_finfo_t *lfi, int opts, apr_pool_t *p)
408 const char *savename;
410 if (!(opts & (OPT_SYM_OWNER | OPT_SYM_LINKS))) {
411 return HTTP_FORBIDDEN;
414 /* Save the name from the valid bits. */
415 savename = (lfi->valid & APR_FINFO_NAME) ? lfi->name : NULL;
417 /* if OPT_SYM_OWNER is unset, we only need to check target accessible */
418 if (!(opts & OPT_SYM_OWNER)) {
419 if (apr_stat(&fi, d, lfi->valid & ~(APR_FINFO_NAME | APR_FINFO_LINK), p)
422 return HTTP_FORBIDDEN;
425 /* Give back the target */
426 memcpy(lfi, &fi, sizeof(fi));
428 lfi->name = savename;
429 lfi->valid |= APR_FINFO_NAME;
435 /* OPT_SYM_OWNER only works if we can get the owner of
436 * both the file and symlink. First fill in a missing
437 * owner of the symlink, then get the info of the target.
439 if (!(lfi->valid & APR_FINFO_OWNER)) {
440 if (apr_stat(lfi, d, lfi->valid | APR_FINFO_LINK | APR_FINFO_OWNER, p)
443 return HTTP_FORBIDDEN;
447 if (apr_stat(&fi, d, lfi->valid & ~(APR_FINFO_NAME), p) != APR_SUCCESS) {
448 return HTTP_FORBIDDEN;
451 if (apr_uid_compare(fi.user, lfi->user) != APR_SUCCESS) {
452 return HTTP_FORBIDDEN;
455 /* Give back the target */
456 memcpy(lfi, &fi, sizeof(fi));
458 lfi->name = savename;
459 lfi->valid |= APR_FINFO_NAME;
467 * As we walk the directory configuration, the merged config won't
468 * be 'rooted' to a specific vhost until the very end of the merge.
470 * We need a very fast mini-merge to a real, vhost-rooted merge
471 * of core.opts and core.override, the only options tested within
472 * directory_walk itself.
474 * See core.c::merge_core_dir_configs() for explanation.
477 typedef struct core_opts_t {
478 allow_options_t opts;
480 allow_options_t remove;
481 overrides_t override;
482 overrides_t override_opts;
485 static void core_opts_merge(const ap_conf_vector_t *sec, core_opts_t *opts)
487 core_dir_config *this_dir = ap_get_module_config(sec, &core_module);
493 if (this_dir->opts & OPT_UNSET) {
494 opts->add = (opts->add & ~this_dir->opts_remove)
495 | this_dir->opts_add;
496 opts->remove = (opts->remove & ~this_dir->opts_add)
497 | this_dir->opts_remove;
498 opts->opts = (opts->opts & ~opts->remove) | opts->add;
501 opts->opts = this_dir->opts;
502 opts->add = this_dir->opts_add;
503 opts->remove = this_dir->opts_remove;
506 if (!(this_dir->override & OR_UNSET)) {
507 opts->override = this_dir->override;
508 opts->override_opts = this_dir->override_opts;
513 /*****************************************************************
515 * Getting and checking directory configuration. Also checks the
516 * FollowSymlinks and FollowSymOwner stuff, since this is really the
517 * only place that can happen (barring a new mid_dir_walk callout).
519 * We can't do it as an access_checker module function which gets
520 * called with the final per_dir_config, since we could have a directory
521 * with FollowSymLinks disabled, which contains a symlink to another
522 * with a .htaccess file which turns FollowSymLinks back on --- and
523 * access in such a case must be denied. So, whatever it is that
524 * checks FollowSymLinks needs to know the state of the options as
525 * they change, all the way down.
528 AP_DECLARE(int) ap_directory_walk(request_rec *r)
530 ap_conf_vector_t *now_merged = NULL;
531 core_server_config *sconf = ap_get_module_config(r->server->module_config,
533 ap_conf_vector_t **sec_ent = (ap_conf_vector_t **) sconf->sec_dir->elts;
534 int num_sec = sconf->sec_dir->nelts;
540 /* XXX: Better (faster) tests needed!!!
542 * "OK" as a response to a real problem is not _OK_, but to allow broken
543 * modules to proceed, we will permit the not-a-path filename to pass the
544 * following two tests. This behavior may be revoked in future versions
545 * of Apache. We still must catch it later if it's heading for the core
546 * handler. Leave INFO notes here for module debugging.
548 if (r->filename == NULL) {
549 ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
550 "Module bug? Request filename is missing for URI %s",
555 /* Canonicalize the file path without resolving filename case or aliases
556 * so we can begin by checking the cache for a recent directory walk.
557 * This call will ensure we have an absolute path in the same pass.
559 if ((rv = apr_filepath_merge(&entry_dir, NULL, r->filename,
560 APR_FILEPATH_NOTRELATIVE, r->pool))
562 ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
563 "Module bug? Request filename path %s is invalid or "
564 "or not absolute for uri %s",
565 r->filename, r->uri);
569 /* XXX Notice that this forces path_info to be canonical. That might
570 * not be desired by all apps. However, some of those same apps likely
571 * have significant security holes.
573 r->filename = entry_dir;
575 cache = prep_walk_cache(AP_NOTE_DIRECTORY_WALK, r);
576 cached = (cache->cached != NULL);
578 /* If this is not a dirent subrequest with a preconstructed
579 * r->finfo value, then we can simply stat the filename to
580 * save burning mega-cycles with unneeded stats - if this is
581 * an exact file match. We don't care about failure... we
582 * will stat by component failing this meager attempt.
584 * It would be nice to distinguish APR_ENOENT from other
585 * types of failure, such as APR_ENOTDIR. We can do something
586 * with APR_ENOENT, knowing that the path is good.
588 if (r->finfo.filetype == APR_NOFILE || r->finfo.filetype == APR_LNK) {
589 rv = apr_stat(&r->finfo, r->filename, APR_FINFO_MIN, r->pool);
591 /* some OSs will return APR_SUCCESS/APR_REG if we stat
592 * a regular file but we have '/' at the end of the name;
594 * other OSs will return APR_ENOTDIR for that situation;
596 * handle it the same everywhere by simulating a failure
597 * if it looks like a directory but really isn't
599 * Also reset if the stat failed, just for safety.
601 if ((rv != APR_SUCCESS) ||
602 (r->finfo.filetype != APR_NOFILE &&
603 (r->finfo.filetype != APR_DIR) &&
604 (r->filename[strlen(r->filename) - 1] == '/'))) {
605 r->finfo.filetype = APR_NOFILE; /* forget what we learned */
609 if (r->finfo.filetype == APR_REG) {
610 entry_dir = ap_make_dirstr_parent(r->pool, entry_dir);
612 else if (r->filename[strlen(r->filename) - 1] != '/') {
613 entry_dir = apr_pstrcat(r->pool, r->filename, "/", NULL);
616 /* If we have a file already matches the path of r->filename,
617 * and the vhost's list of directory sections hasn't changed,
618 * we can skip rewalking the directory_walk entries.
621 && ((r->finfo.filetype == APR_REG)
622 || ((r->finfo.filetype == APR_DIR)
623 && (!r->path_info || !*r->path_info)))
624 && (cache->dir_conf_tested == sec_ent)
625 && (strcmp(entry_dir, cache->cached) == 0)) {
628 /* Well this looks really familiar! If our end-result (per_dir_result)
629 * didn't change, we have absolutely nothing to do :)
630 * Otherwise (as is the case with most dir_merged/file_merged requests)
631 * we must merge our dir_conf_merged onto this new r->per_dir_config.
633 if (r->per_dir_config == cache->per_dir_result) {
637 if (r->per_dir_config == cache->dir_conf_merged) {
638 r->per_dir_config = cache->per_dir_result;
643 apr_finfo_t thisinfo;
645 allow_options_t opts;
646 core_dir_config *this_dir;
648 this_dir = ap_get_module_config(r->per_dir_config, &core_module);
649 opts = this_dir->opts;
651 * If Symlinks are allowed in general we do not need the following
654 if (!(opts & OPT_SYM_LINKS)) {
655 rv = apr_stat(&thisinfo, r->filename,
656 APR_FINFO_MIN | APR_FINFO_NAME | APR_FINFO_LINK,
659 * APR_INCOMPLETE is as fine as result as APR_SUCCESS as we
660 * have added APR_FINFO_NAME to the wanted parameter of
661 * apr_stat above. On Unix platforms this means that apr_stat
662 * is always going to return APR_INCOMPLETE in the case that
663 * the call to the native stat / lstat did not fail.
665 if ((rv != APR_INCOMPLETE) && (rv != APR_SUCCESS)) {
667 * This should never happen, because we did a stat on the
668 * same file, resolving a possible symlink several lines
669 * above. Therefore do not make a detailed analysis of rv
670 * in this case for the reason of the failure, just bail out
671 * with a HTTP_FORBIDDEN in case we hit a race condition
674 ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
675 "access to %s failed; stat of '%s' failed.",
676 r->uri, r->filename);
677 return r->status = HTTP_FORBIDDEN;
679 if (thisinfo.filetype == APR_LNK) {
680 /* Is this a possibly acceptable symlink? */
681 if ((res = resolve_symlink(r->filename, &thisinfo,
682 opts, r->pool)) != OK) {
683 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
684 "Symbolic link not allowed "
685 "or link target not accessible: %s",
687 return r->status = res;
694 if (cache->walked->nelts) {
695 now_merged = ((walk_walked_t*)cache->walked->elts)
696 [cache->walked->nelts - 1].merged;
700 /* We start now_merged from NULL since we want to build
701 * a locations list that can be merged to any vhost.
704 int matches = cache->walked->nelts;
705 int cached_matches = matches;
706 walk_walked_t *last_walk = (walk_walked_t*)cache->walked->elts;
707 core_dir_config *this_dir;
709 apr_finfo_t thisinfo;
710 char *save_path_info;
713 unsigned int seg, startseg;
715 /* Invariant: from the first time filename_len is set until
716 * it goes out of scope, filename_len==strlen(r->filename)
718 apr_size_t filename_len;
719 #ifdef CASE_BLIND_FILESYSTEM
720 apr_size_t canonical_len;
723 cached &= auth_internal_per_conf;
726 * We must play our own mini-merge game here, for the few
727 * running dir_config values we care about within dir_walk.
728 * We didn't start the merge from r->per_dir_config, so we
729 * accumulate opts and override as we merge, from the globals.
731 this_dir = ap_get_module_config(r->per_dir_config, &core_module);
732 opts.opts = this_dir->opts;
733 opts.add = this_dir->opts_add;
734 opts.remove = this_dir->opts_remove;
735 opts.override = this_dir->override;
736 opts.override_opts = this_dir->override_opts;
738 /* Set aside path_info to merge back onto path_info later.
739 * If r->filename is a directory, we must remerge the path_info,
740 * before we continue! [Directories cannot, by defintion, have
741 * path info. Either the next segment is not-found, or a file.]
743 * r->path_info tracks the unconsumed source path.
744 * r->filename tracks the path as we process it
746 if ((r->finfo.filetype == APR_DIR) && r->path_info && *r->path_info)
748 if ((rv = apr_filepath_merge(&r->path_info, r->filename,
750 APR_FILEPATH_NOTABOVEROOT, r->pool))
752 ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
753 "dir_walk error, path_info %s is not relative "
754 "to the filename path %s for uri %s",
755 r->path_info, r->filename, r->uri);
756 return HTTP_INTERNAL_SERVER_ERROR;
759 save_path_info = NULL;
762 save_path_info = r->path_info;
763 r->path_info = r->filename;
766 #ifdef CASE_BLIND_FILESYSTEM
769 while (r->canonical_filename && r->canonical_filename[canonical_len]
770 && (r->canonical_filename[canonical_len]
771 == r->path_info[canonical_len])) {
776 && ((r->canonical_filename[canonical_len - 1] != '/'
777 && r->canonical_filename[canonical_len - 1])
778 || (r->path_info[canonical_len - 1] != '/'
779 && r->path_info[canonical_len - 1]))) {
784 * Now build r->filename component by component, starting
785 * with the root (on Unix, simply "/"). We will make a huge
786 * assumption here for efficiency, that any canonical path
787 * already given included a canonical root.
789 rv = apr_filepath_root((const char **)&r->filename,
790 (const char **)&r->path_info,
791 canonical_len ? 0 : APR_FILEPATH_TRUENAME,
793 filename_len = strlen(r->filename);
796 * Bad assumption above? If the root's length is longer
797 * than the canonical length, then it cannot be trusted as
798 * a truename. So try again, this time more seriously.
800 if ((rv == APR_SUCCESS) && canonical_len
801 && (filename_len > canonical_len)) {
802 rv = apr_filepath_root((const char **)&r->filename,
803 (const char **)&r->path_info,
804 APR_FILEPATH_TRUENAME, r->pool);
805 filename_len = strlen(r->filename);
809 #else /* ndef CASE_BLIND_FILESYSTEM, really this simple for Unix today; */
811 rv = apr_filepath_root((const char **)&r->filename,
812 (const char **)&r->path_info,
814 filename_len = strlen(r->filename);
818 if (rv != APR_SUCCESS) {
819 ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
820 "dir_walk error, could not determine the root "
821 "path of filename %s%s for uri %s",
822 r->filename, r->path_info, r->uri);
823 return HTTP_INTERNAL_SERVER_ERROR;
826 /* Working space for terminating null and an extra / is required.
828 buflen = filename_len + strlen(r->path_info) + 2;
829 buf = apr_palloc(r->pool, buflen);
830 memcpy(buf, r->filename, filename_len + 1);
832 thisinfo.valid = APR_FINFO_TYPE;
833 thisinfo.filetype = APR_DIR; /* It's the root, of course it's a dir */
836 * seg keeps track of which segment we've copied.
837 * sec_idx keeps track of which section we're on, since sections are
838 * ordered by number of segments. See core_reorder_directories
839 * startseg tells us how many segments describe the root path
840 * e.g. the complete path "//host/foo/" to a UNC share (4)
842 startseg = seg = ap_count_dirs(r->filename);
846 * Go down the directory hierarchy. Where we have to check for
847 * symlinks, do so. Where a .htaccess file has permission to
848 * override anything, try to find one.
856 /* We have no trailing slash, but we sure would appreciate one.
857 * However, we don't want to append a / our first time through.
859 if ((seg > startseg) && r->filename[filename_len-1] != '/') {
860 r->filename[filename_len++] = '/';
861 r->filename[filename_len] = 0;
865 /* Begin *this* level by looking for matching <Directory> sections
866 * from the server config.
868 for (; sec_idx < num_sec; ++sec_idx) {
870 ap_conf_vector_t *entry_config = sec_ent[sec_idx];
871 core_dir_config *entry_core;
872 entry_core = ap_get_module_config(entry_config, &core_module);
874 /* No more possible matches for this many segments?
875 * We are done when we find relative/regex/longer components.
877 if (entry_core->r || entry_core->d_components > seg) {
881 /* We will never skip '0' element components, e.g. plain old
882 * <Directory >, and <Directory "/"> are classified as zero
883 * so that Win32/Netware/OS2 etc all pick them up.
884 * Otherwise, skip over the mismatches.
886 if (entry_core->d_components
887 && ((entry_core->d_components < seg)
888 || (entry_core->d_is_fnmatch
889 ? (apr_fnmatch(entry_core->d, r->filename,
890 APR_FNM_PATHNAME) != APR_SUCCESS)
891 : (strcmp(r->filename, entry_core->d) != 0)))) {
895 /* If we haven't continue'd above, we have a match.
897 * Calculate our full-context core opts & override.
899 core_opts_merge(sec_ent[sec_idx], &opts);
901 /* If we merged this same section last time, reuse it
904 if (last_walk->matched == sec_ent[sec_idx]) {
905 now_merged = last_walk->merged;
911 /* We fell out of sync. This is our own copy of walked,
912 * so truncate the remaining matches and reset remaining.
914 cache->walked->nelts -= matches;
920 now_merged = ap_merge_per_dir_configs(r->pool,
925 now_merged = sec_ent[sec_idx];
928 last_walk = (walk_walked_t*)apr_array_push(cache->walked);
929 last_walk->matched = sec_ent[sec_idx];
930 last_walk->merged = now_merged;
933 /* If .htaccess files are enabled, check for one, provided we
934 * have reached a real path.
936 do { /* Not really a loop, just a break'able code block */
938 ap_conf_vector_t *htaccess_conf = NULL;
940 /* No htaccess in an incomplete root path,
941 * nor if it's disabled
943 if (seg < startseg || !opts.override) {
947 res = ap_parse_htaccess(&htaccess_conf, r, opts.override,
949 apr_pstrdup(r->pool, r->filename),
955 if (!htaccess_conf) {
959 /* If we are still here, we found our htaccess.
961 * Calculate our full-context core opts & override.
963 core_opts_merge(htaccess_conf, &opts);
965 /* If we merged this same htaccess last time, reuse it...
966 * this wouldn't work except that we cache the htaccess
967 * sections for the lifetime of the request, so we match
968 * the same conf. Good planning (no, pure luck ;)
971 if (last_walk->matched == htaccess_conf) {
972 now_merged = last_walk->merged;
978 /* We fell out of sync. This is our own copy of walked,
979 * so truncate the remaining matches and reset
982 cache->walked->nelts -= matches;
988 now_merged = ap_merge_per_dir_configs(r->pool,
993 now_merged = htaccess_conf;
996 last_walk = (walk_walked_t*)apr_array_push(cache->walked);
997 last_walk->matched = htaccess_conf;
998 last_walk->merged = now_merged;
1000 } while (0); /* Only one htaccess, not a real loop */
1002 /* That temporary trailing slash was useful, now drop it.
1005 r->filename[--filename_len] = '\0';
1008 /* Time for all good things to come to an end?
1010 if (!r->path_info || !*r->path_info) {
1014 /* Now it's time for the next segment...
1015 * We will assume the next element is an end node, and fix it up
1016 * below as necessary...
1019 seg_name = r->filename + filename_len;
1020 delim = strchr(r->path_info + (*r->path_info == '/' ? 1 : 0), '/');
1022 size_t path_info_len = delim - r->path_info;
1024 memcpy(seg_name, r->path_info, path_info_len + 1);
1025 filename_len += path_info_len;
1026 r->path_info = delim;
1030 size_t path_info_len = strlen(r->path_info);
1031 memcpy(seg_name, r->path_info, path_info_len + 1);
1032 filename_len += path_info_len;
1033 r->path_info += path_info_len;
1035 if (*seg_name == '/')
1038 /* If nothing remained but a '/' string, we are finished
1039 * XXX: NO WE ARE NOT!!! Now process this puppy!!! */
1044 /* First optimization;
1045 * If...we knew r->filename was a file, and
1046 * if...we have strict (case-sensitive) filenames, or
1047 * we know the canonical_filename matches to _this_ name, and
1048 * if...we have allowed symlinks
1049 * skip the lstat and dummy up an APR_DIR value for thisinfo.
1051 if (r->finfo.filetype != APR_NOFILE
1052 #ifdef CASE_BLIND_FILESYSTEM
1053 && (filename_len <= canonical_len)
1055 && ((opts.opts & (OPT_SYM_OWNER | OPT_SYM_LINKS)) == OPT_SYM_LINKS))
1058 thisinfo.filetype = APR_DIR;
1063 /* We choose apr_stat with flag APR_FINFO_LINK here, rather that
1064 * plain apr_stat, so that we capture this path object rather than
1065 * its target. We will replace the info with our target's info
1066 * below. We especially want the name of this 'link' object, not
1067 * the name of its target, if we are fixing the filename
1068 * case/resolving aliases.
1070 rv = apr_stat(&thisinfo, r->filename,
1071 APR_FINFO_MIN | APR_FINFO_NAME | APR_FINFO_LINK,
1074 if (APR_STATUS_IS_ENOENT(rv)) {
1075 /* Nothing? That could be nice. But our directory
1078 thisinfo.filetype = APR_NOFILE;
1081 else if (APR_STATUS_IS_EACCES(rv)) {
1082 ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
1083 "access to %s denied", r->uri);
1084 return r->status = HTTP_FORBIDDEN;
1086 else if ((rv != APR_SUCCESS && rv != APR_INCOMPLETE)
1087 || !(thisinfo.valid & APR_FINFO_TYPE)) {
1088 /* If we hit ENOTDIR, we must have over-optimized, deny
1089 * rather than assume not found.
1091 ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
1092 "access to %s failed", r->uri);
1093 return r->status = HTTP_FORBIDDEN;
1096 /* Fix up the path now if we have a name, and they don't agree
1098 if ((thisinfo.valid & APR_FINFO_NAME)
1099 && strcmp(seg_name, thisinfo.name)) {
1100 /* TODO: provide users an option that an internal/external
1101 * redirect is required here? We need to walk the URI and
1102 * filename in tandem to properly correlate these.
1104 strcpy(seg_name, thisinfo.name);
1105 filename_len = strlen(r->filename);
1108 if (thisinfo.filetype == APR_LNK) {
1109 /* Is this a possibly acceptable symlink?
1111 if ((res = resolve_symlink(r->filename, &thisinfo,
1112 opts.opts, r->pool)) != OK) {
1113 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
1114 "Symbolic link not allowed "
1115 "or link target not accessible: %s",
1117 return r->status = res;
1121 /* Ok, we are done with the link's info, test the real target
1123 if (thisinfo.filetype == APR_REG ||
1124 thisinfo.filetype == APR_NOFILE) {
1125 /* That was fun, nothing left for us here
1129 else if (thisinfo.filetype != APR_DIR) {
1130 ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
1131 "Forbidden: %s doesn't point to "
1132 "a file or directory",
1134 return r->status = HTTP_FORBIDDEN;
1138 } while (thisinfo.filetype == APR_DIR);
1140 /* If we have _not_ optimized, this is the time to recover
1141 * the final stat result.
1143 if (r->finfo.filetype == APR_NOFILE || r->finfo.filetype == APR_LNK) {
1144 r->finfo = thisinfo;
1147 /* Now splice the saved path_info back onto any new path_info
1149 if (save_path_info) {
1150 if (r->path_info && *r->path_info) {
1151 r->path_info = ap_make_full_path(r->pool, r->path_info,
1155 r->path_info = save_path_info;
1160 * Now we'll deal with the regexes, note we pick up sec_idx
1161 * where we left off (we gave up after we hit entry_core->r)
1163 for (; sec_idx < num_sec; ++sec_idx) {
1165 core_dir_config *entry_core;
1166 entry_core = ap_get_module_config(sec_ent[sec_idx], &core_module);
1168 if (!entry_core->r) {
1172 if (ap_regexec(entry_core->r, r->filename, 0, NULL, 0)) {
1176 /* If we haven't already continue'd above, we have a match.
1178 * Calculate our full-context core opts & override.
1180 core_opts_merge(sec_ent[sec_idx], &opts);
1182 /* If we merged this same section last time, reuse it
1185 if (last_walk->matched == sec_ent[sec_idx]) {
1186 now_merged = last_walk->merged;
1192 /* We fell out of sync. This is our own copy of walked,
1193 * so truncate the remaining matches and reset remaining.
1195 cache->walked->nelts -= matches;
1201 now_merged = ap_merge_per_dir_configs(r->pool,
1206 now_merged = sec_ent[sec_idx];
1209 last_walk = (walk_walked_t*)apr_array_push(cache->walked);
1210 last_walk->matched = sec_ent[sec_idx];
1211 last_walk->merged = now_merged;
1214 /* Whoops - everything matched in sequence, but either the original
1215 * walk found some additional matches (which we need to truncate), or
1216 * this walk found some additional matches.
1219 cache->walked->nelts -= matches;
1222 else if (cache->walked->nelts > cached_matches) {
1227 /* It seems this shouldn't be needed anymore. We translated the
1228 x symlink above into a real resource, and should have died up there.
1229 x Even if we keep this, it needs more thought (maybe an r->file_is_symlink)
1230 x perhaps it should actually happen in file_walk, so we catch more
1231 x obscure cases in autoindex subrequests, etc.
1233 x * Symlink permissions are determined by the parent. If the request is
1234 x * for a directory then applying the symlink test here would use the
1235 x * permissions of the directory as opposed to its parent. Consider a
1236 x * symlink pointing to a dir with a .htaccess disallowing symlinks. If
1237 x * you access /symlink (or /symlink/) you would get a 403 without this
1238 x * APR_DIR test. But if you accessed /symlink/index.html, for example,
1239 x * you would *not* get the 403.
1241 x if (r->finfo.filetype != APR_DIR
1242 x && (res = resolve_symlink(r->filename, r->info, ap_allow_options(r),
1244 x ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
1245 x "Symbolic link not allowed: %s", r->filename);
1250 /* Save future sub-requestors much angst in processing
1251 * this subrequest. If dir_walk couldn't canonicalize
1252 * the file path, nothing can.
1254 r->canonical_filename = r->filename;
1256 if (r->finfo.filetype == APR_DIR) {
1257 cache->cached = r->filename;
1260 cache->cached = ap_make_dirstr_parent(r->pool, r->filename);
1264 && r->per_dir_config == cache->dir_conf_merged) {
1265 r->per_dir_config = cache->per_dir_result;
1269 cache->dir_conf_tested = sec_ent;
1270 cache->dir_conf_merged = r->per_dir_config;
1272 /* Merge our cache->dir_conf_merged construct with the r->per_dir_configs,
1273 * and note the end result to (potentially) skip this step next time.
1276 r->per_dir_config = ap_merge_per_dir_configs(r->pool,
1280 cache->per_dir_result = r->per_dir_config;
1286 AP_DECLARE(int) ap_location_walk(request_rec *r)
1288 ap_conf_vector_t *now_merged = NULL;
1289 core_server_config *sconf = ap_get_module_config(r->server->module_config,
1291 ap_conf_vector_t **sec_ent = (ap_conf_vector_t **)sconf->sec_url->elts;
1292 int num_sec = sconf->sec_url->nelts;
1293 walk_cache_t *cache;
1294 const char *entry_uri;
1297 /* No tricks here, there are no <Locations > to parse in this vhost.
1298 * We won't destroy the cache, just in case _this_ redirect is later
1299 * redirected again to a vhost with <Location > blocks to optimize.
1305 cache = prep_walk_cache(AP_NOTE_LOCATION_WALK, r);
1306 cached = (cache->cached != NULL);
1308 /* Location and LocationMatch differ on their behaviour w.r.t. multiple
1309 * slashes. Location matches multiple slashes with a single slash,
1310 * LocationMatch doesn't. An exception, for backwards brokenness is
1311 * absoluteURIs... in which case neither match multiple slashes.
1313 if (r->uri[0] != '/') {
1317 char *uri = apr_pstrdup(r->pool, r->uri);
1322 /* If we have an cache->cached location that matches r->uri,
1323 * and the vhost's list of locations hasn't changed, we can skip
1324 * rewalking the location_walk entries.
1327 && (cache->dir_conf_tested == sec_ent)
1328 && (strcmp(entry_uri, cache->cached) == 0)) {
1329 /* Well this looks really familiar! If our end-result (per_dir_result)
1330 * didn't change, we have absolutely nothing to do :)
1331 * Otherwise (as is the case with most dir_merged/file_merged requests)
1332 * we must merge our dir_conf_merged onto this new r->per_dir_config.
1334 if (r->per_dir_config == cache->per_dir_result) {
1338 if (cache->walked->nelts) {
1339 now_merged = ((walk_walked_t*)cache->walked->elts)
1340 [cache->walked->nelts - 1].merged;
1344 /* We start now_merged from NULL since we want to build
1345 * a locations list that can be merged to any vhost.
1348 int matches = cache->walked->nelts;
1349 int cached_matches = matches;
1350 walk_walked_t *last_walk = (walk_walked_t*)cache->walked->elts;
1352 cached &= auth_internal_per_conf;
1353 cache->cached = entry_uri;
1355 /* Go through the location entries, and check for matches.
1356 * We apply the directive sections in given order, we should
1357 * really try them with the most general first.
1359 for (sec_idx = 0; sec_idx < num_sec; ++sec_idx) {
1361 core_dir_config *entry_core;
1362 entry_core = ap_get_module_config(sec_ent[sec_idx], &core_module);
1364 /* ### const strlen can be optimized in location config parsing */
1365 len = strlen(entry_core->d);
1367 /* Test the regex, fnmatch or string as appropriate.
1368 * If it's a strcmp, and the <Location > pattern was
1369 * not slash terminated, then this uri must be slash
1370 * terminated (or at the end of the string) to match.
1373 ? ap_regexec(entry_core->r, r->uri, 0, NULL, 0)
1374 : (entry_core->d_is_fnmatch
1375 ? apr_fnmatch(entry_core->d, cache->cached, APR_FNM_PATHNAME)
1376 : (strncmp(entry_core->d, cache->cached, len)
1378 && entry_core->d[len - 1] != '/'
1379 && cache->cached[len] != '/'
1380 && cache->cached[len] != '\0')))) {
1384 /* If we merged this same section last time, reuse it
1387 if (last_walk->matched == sec_ent[sec_idx]) {
1388 now_merged = last_walk->merged;
1394 /* We fell out of sync. This is our own copy of walked,
1395 * so truncate the remaining matches and reset remaining.
1397 cache->walked->nelts -= matches;
1403 now_merged = ap_merge_per_dir_configs(r->pool,
1408 now_merged = sec_ent[sec_idx];
1411 last_walk = (walk_walked_t*)apr_array_push(cache->walked);
1412 last_walk->matched = sec_ent[sec_idx];
1413 last_walk->merged = now_merged;
1416 /* Whoops - everything matched in sequence, but either the original
1417 * walk found some additional matches (which we need to truncate), or
1418 * this walk found some additional matches.
1421 cache->walked->nelts -= matches;
1424 else if (cache->walked->nelts > cached_matches) {
1430 && r->per_dir_config == cache->dir_conf_merged) {
1431 r->per_dir_config = cache->per_dir_result;
1435 cache->dir_conf_tested = sec_ent;
1436 cache->dir_conf_merged = r->per_dir_config;
1438 /* Merge our cache->dir_conf_merged construct with the r->per_dir_configs,
1439 * and note the end result to (potentially) skip this step next time.
1442 r->per_dir_config = ap_merge_per_dir_configs(r->pool,
1446 cache->per_dir_result = r->per_dir_config;
1451 AP_DECLARE(int) ap_file_walk(request_rec *r)
1453 ap_conf_vector_t *now_merged = NULL;
1454 core_dir_config *dconf = ap_get_module_config(r->per_dir_config,
1456 ap_conf_vector_t **sec_ent = (ap_conf_vector_t **)dconf->sec_file->elts;
1457 int num_sec = dconf->sec_file->nelts;
1458 walk_cache_t *cache;
1459 const char *test_file;
1462 /* To allow broken modules to proceed, we allow missing filenames to pass.
1463 * We will catch it later if it's heading for the core handler.
1464 * directory_walk already posted an INFO note for module debugging.
1466 if (r->filename == NULL) {
1470 cache = prep_walk_cache(AP_NOTE_FILE_WALK, r);
1471 cached = (cache->cached != NULL);
1473 /* No tricks here, there are just no <Files > to parse in this context.
1474 * We won't destroy the cache, just in case _this_ redirect is later
1475 * redirected again to a context containing the same or similar <Files >.
1481 /* Get the basename .. and copy for the cache just
1482 * in case r->filename is munged by another module
1484 test_file = strrchr(r->filename, '/');
1485 if (test_file == NULL) {
1486 test_file = apr_pstrdup(r->pool, r->filename);
1489 test_file = apr_pstrdup(r->pool, ++test_file);
1492 /* If we have an cache->cached file name that matches test_file,
1493 * and the directory's list of file sections hasn't changed, we
1494 * can skip rewalking the file_walk entries.
1497 && (cache->dir_conf_tested == sec_ent)
1498 && (strcmp(test_file, cache->cached) == 0)) {
1499 /* Well this looks really familiar! If our end-result (per_dir_result)
1500 * didn't change, we have absolutely nothing to do :)
1501 * Otherwise (as is the case with most dir_merged requests)
1502 * we must merge our dir_conf_merged onto this new r->per_dir_config.
1504 if (r->per_dir_config == cache->per_dir_result) {
1508 if (cache->walked->nelts) {
1509 now_merged = ((walk_walked_t*)cache->walked->elts)
1510 [cache->walked->nelts - 1].merged;
1514 /* We start now_merged from NULL since we want to build
1515 * a file section list that can be merged to any dir_walk.
1518 int matches = cache->walked->nelts;
1519 int cached_matches = matches;
1520 walk_walked_t *last_walk = (walk_walked_t*)cache->walked->elts;
1522 cached &= auth_internal_per_conf;
1523 cache->cached = test_file;
1525 /* Go through the location entries, and check for matches.
1526 * We apply the directive sections in given order, we should
1527 * really try them with the most general first.
1529 for (sec_idx = 0; sec_idx < num_sec; ++sec_idx) {
1531 core_dir_config *entry_core;
1532 entry_core = ap_get_module_config(sec_ent[sec_idx], &core_module);
1534 if (entry_core->condition) {
1535 if (!ap_expr_eval(r, entry_core->condition, &err, NULL,
1536 ap_expr_string, NULL)) {
1542 ? ap_regexec(entry_core->r, cache->cached , 0, NULL, 0)
1543 : (entry_core->d_is_fnmatch
1544 ? apr_fnmatch(entry_core->d, cache->cached, APR_FNM_PATHNAME)
1545 : strcmp(entry_core->d, cache->cached))) {
1550 /* If we merged this same section last time, reuse it
1553 if (last_walk->matched == sec_ent[sec_idx]) {
1554 now_merged = last_walk->merged;
1560 /* We fell out of sync. This is our own copy of walked,
1561 * so truncate the remaining matches and reset remaining.
1563 cache->walked->nelts -= matches;
1569 now_merged = ap_merge_per_dir_configs(r->pool,
1574 now_merged = sec_ent[sec_idx];
1577 last_walk = (walk_walked_t*)apr_array_push(cache->walked);
1578 last_walk->matched = sec_ent[sec_idx];
1579 last_walk->merged = now_merged;
1582 /* Whoops - everything matched in sequence, but either the original
1583 * walk found some additional matches (which we need to truncate), or
1584 * this walk found some additional matches.
1587 cache->walked->nelts -= matches;
1590 else if (cache->walked->nelts > cached_matches) {
1596 && r->per_dir_config == cache->dir_conf_merged) {
1597 r->per_dir_config = cache->per_dir_result;
1601 cache->dir_conf_tested = sec_ent;
1602 cache->dir_conf_merged = r->per_dir_config;
1604 /* Merge our cache->dir_conf_merged construct with the r->per_dir_configs,
1605 * and note the end result to (potentially) skip this step next time.
1608 r->per_dir_config = ap_merge_per_dir_configs(r->pool,
1612 cache->per_dir_result = r->per_dir_config;
1617 /*****************************************************************
1619 * The sub_request mechanism.
1621 * Fns to look up a relative URI from, e.g., a map file or SSI document.
1622 * These do all access checks, etc., but don't actually run the transaction
1623 * ... use run_sub_req below for that. Also, be sure to use destroy_sub_req
1624 * as appropriate if you're likely to be creating more than a few of these.
1625 * (An early Apache version didn't destroy the sub_reqs used in directory
1626 * indexing. The result, when indexing a directory with 800-odd files in
1627 * it, was massively excessive storage allocation).
1629 * Note more manipulation of protocol-specific vars in the request
1633 static request_rec *make_sub_request(const request_rec *r,
1634 ap_filter_t *next_filter)
1639 apr_pool_create(&rrp, r->pool);
1640 apr_pool_tag(rrp, "subrequest");
1641 rnew = apr_pcalloc(rrp, sizeof(request_rec));
1644 rnew->hostname = r->hostname;
1645 rnew->request_time = r->request_time;
1646 rnew->connection = r->connection;
1647 rnew->server = r->server;
1650 rnew->request_config = ap_create_request_config(rnew->pool);
1652 /* Start a clean config from this subrequest's vhost. Optimization in
1653 * Location/File/Dir walks from the parent request assure that if the
1654 * config blocks of the subrequest match the parent request, no merges
1655 * will actually occur (and generally a minimal number of merges are
1656 * required, even if the parent and subrequest aren't quite identical.)
1658 rnew->per_dir_config = r->server->lookup_defaults;
1660 rnew->htaccess = r->htaccess;
1661 rnew->allowed_methods = ap_make_method_list(rnew->pool, 2);
1663 /* make a copy of the allowed-methods list */
1664 ap_copy_method_list(rnew->allowed_methods, r->allowed_methods);
1666 /* start with the same set of output filters */
1668 /* while there are no input filters for a subrequest, we will
1669 * try to insert some, so if we don't have valid data, the code
1672 rnew->input_filters = r->input_filters;
1673 rnew->proto_input_filters = r->proto_input_filters;
1674 rnew->output_filters = next_filter;
1675 rnew->proto_output_filters = r->proto_output_filters;
1676 ap_add_output_filter_handle(ap_subreq_core_filter_handle,
1677 NULL, rnew, rnew->connection);
1680 /* If NULL - we are expecting to be internal_fast_redirect'ed
1681 * to this subrequest - or this request will never be invoked.
1682 * Ignore the original request filter stack entirely, and
1683 * drill the input and output stacks back to the connection.
1685 rnew->proto_input_filters = r->proto_input_filters;
1686 rnew->proto_output_filters = r->proto_output_filters;
1688 rnew->input_filters = r->proto_input_filters;
1689 rnew->output_filters = r->proto_output_filters;
1692 /* no input filters for a subrequest */
1694 ap_set_sub_req_protocol(rnew, r);
1696 /* We have to run this after we fill in sub req vars,
1697 * or the r->main pointer won't be setup
1699 ap_run_create_request(rnew);
1701 /* Begin by presuming any module can make its own path_info assumptions,
1702 * until some module interjects and changes the value.
1704 rnew->used_path_info = AP_REQ_DEFAULT_PATH_INFO;
1706 /* Pass on the kept body (if any) into the new request. */
1707 rnew->kept_body = r->kept_body;
1712 AP_CORE_DECLARE_NONSTD(apr_status_t) ap_sub_req_output_filter(ap_filter_t *f,
1713 apr_bucket_brigade *bb)
1715 apr_bucket *e = APR_BRIGADE_LAST(bb);
1717 if (APR_BUCKET_IS_EOS(e)) {
1718 apr_bucket_delete(e);
1721 if (!APR_BRIGADE_EMPTY(bb)) {
1722 return ap_pass_brigade(f->next, bb);
1728 extern APR_OPTIONAL_FN_TYPE(authz_some_auth_required) *ap__authz_ap_some_auth_required;
1730 AP_DECLARE(int) ap_some_auth_required(request_rec *r)
1732 /* Is there a require line configured for the type of *this* req? */
1733 if (ap__authz_ap_some_auth_required) {
1734 return ap__authz_ap_some_auth_required(r);
1740 AP_DECLARE(void) ap_clear_auth_internal(void)
1742 auth_internal_per_conf_hooks = 0;
1743 auth_internal_per_conf_providers = 0;
1746 AP_DECLARE(void) ap_setup_auth_internal(apr_pool_t *ptemp)
1748 int total_auth_hooks = 0;
1749 int total_auth_providers = 0;
1751 auth_internal_per_conf = 0;
1753 if (_hooks.link_access_checker) {
1754 total_auth_hooks += _hooks.link_access_checker->nelts;
1756 if (_hooks.link_access_checker_ex) {
1757 total_auth_hooks += _hooks.link_access_checker_ex->nelts;
1759 if (_hooks.link_check_user_id) {
1760 total_auth_hooks += _hooks.link_check_user_id->nelts;
1762 if (_hooks.link_auth_checker) {
1763 total_auth_hooks += _hooks.link_auth_checker->nelts;
1766 if (total_auth_hooks > auth_internal_per_conf_hooks) {
1770 total_auth_providers +=
1771 ap_list_provider_names(ptemp, AUTHN_PROVIDER_GROUP,
1772 AUTHN_PROVIDER_VERSION)->nelts;
1773 total_auth_providers +=
1774 ap_list_provider_names(ptemp, AUTHZ_PROVIDER_GROUP,
1775 AUTHZ_PROVIDER_VERSION)->nelts;
1777 if (total_auth_providers > auth_internal_per_conf_providers) {
1781 auth_internal_per_conf = 1;
1784 AP_DECLARE(apr_status_t) ap_register_auth_provider(apr_pool_t *pool,
1785 const char *provider_group,
1786 const char *provider_name,
1787 const char *provider_version,
1788 const void *provider,
1791 if ((type & AP_AUTH_INTERNAL_MASK) == AP_AUTH_INTERNAL_PER_CONF) {
1792 ++auth_internal_per_conf_providers;
1795 return ap_register_provider(pool, provider_group, provider_name,
1796 provider_version, provider);
1799 AP_DECLARE(void) ap_hook_check_access(ap_HOOK_access_checker_t *pf,
1800 const char * const *aszPre,
1801 const char * const *aszSucc,
1802 int nOrder, int type)
1804 if ((type & AP_AUTH_INTERNAL_MASK) == AP_AUTH_INTERNAL_PER_CONF) {
1805 ++auth_internal_per_conf_hooks;
1808 ap_hook_access_checker(pf, aszPre, aszSucc, nOrder);
1811 AP_DECLARE(void) ap_hook_check_access_ex(ap_HOOK_access_checker_ex_t *pf,
1812 const char * const *aszPre,
1813 const char * const *aszSucc,
1814 int nOrder, int type)
1816 if ((type & AP_AUTH_INTERNAL_MASK) == AP_AUTH_INTERNAL_PER_CONF) {
1817 ++auth_internal_per_conf_hooks;
1820 ap_hook_access_checker_ex(pf, aszPre, aszSucc, nOrder);
1823 AP_DECLARE(void) ap_hook_check_authn(ap_HOOK_check_user_id_t *pf,
1824 const char * const *aszPre,
1825 const char * const *aszSucc,
1826 int nOrder, int type)
1828 if ((type & AP_AUTH_INTERNAL_MASK) == AP_AUTH_INTERNAL_PER_CONF) {
1829 ++auth_internal_per_conf_hooks;
1832 ap_hook_check_user_id(pf, aszPre, aszSucc, nOrder);
1835 AP_DECLARE(void) ap_hook_check_authz(ap_HOOK_auth_checker_t *pf,
1836 const char * const *aszPre,
1837 const char * const *aszSucc,
1838 int nOrder, int type)
1840 if ((type & AP_AUTH_INTERNAL_MASK) == AP_AUTH_INTERNAL_PER_CONF) {
1841 ++auth_internal_per_conf_hooks;
1844 ap_hook_auth_checker(pf, aszPre, aszSucc, nOrder);
1847 AP_DECLARE(request_rec *) ap_sub_req_method_uri(const char *method,
1848 const char *new_uri,
1849 const request_rec *r,
1850 ap_filter_t *next_filter)
1853 /* Initialise res, to avoid a gcc warning */
1854 int res = HTTP_INTERNAL_SERVER_ERROR;
1857 rnew = make_sub_request(r, next_filter);
1859 /* would be nicer to pass "method" to ap_set_sub_req_protocol */
1860 rnew->method = method;
1861 rnew->method_number = ap_method_number_of(method);
1863 if (new_uri[0] == '/') {
1864 ap_parse_uri(rnew, new_uri);
1867 udir = ap_make_dirstr_parent(rnew->pool, r->uri);
1868 udir = ap_escape_uri(rnew->pool, udir); /* re-escape it */
1869 ap_parse_uri(rnew, ap_make_full_path(rnew->pool, udir, new_uri));
1872 /* We cannot return NULL without violating the API. So just turn this
1873 * subrequest into a 500 to indicate the failure. */
1874 if (ap_is_recursion_limit_exceeded(r)) {
1875 rnew->status = HTTP_INTERNAL_SERVER_ERROR;
1880 * If the content can be served by the quick_handler, we can
1881 * safely bypass request_internal processing.
1883 * If next_filter is NULL we are expecting to be
1884 * internal_fast_redirect'ed to the subrequest, or the subrequest will
1885 * never be invoked. We need to make sure that the quickhandler is not
1886 * invoked by any lookups. Since an internal_fast_redirect will always
1887 * occur too late for the quickhandler to handle the request.
1890 res = ap_run_quick_handler(rnew, 1);
1893 if (next_filter == NULL || res != OK) {
1894 if ((res = ap_process_request_internal(rnew))) {
1902 AP_DECLARE(request_rec *) ap_sub_req_lookup_uri(const char *new_uri,
1903 const request_rec *r,
1904 ap_filter_t *next_filter)
1906 return ap_sub_req_method_uri("GET", new_uri, r, next_filter);
1909 AP_DECLARE(request_rec *) ap_sub_req_lookup_dirent(const apr_finfo_t *dirent,
1910 const request_rec *r,
1912 ap_filter_t *next_filter)
1919 rnew = make_sub_request(r, next_filter);
1921 /* Special case: we are looking at a relative lookup in the same directory.
1922 * This is 100% safe, since dirent->name just came from the filesystem.
1924 if (r->path_info && *r->path_info) {
1925 /* strip path_info off the end of the uri to keep it in sync
1926 * with r->filename, which has already been stripped by directory_walk,
1927 * merge the dirent->name, and then, if the caller wants us to remerge
1928 * the original path info, do so. Note we never fix the path_info back
1929 * to r->filename, since dir_walk would do so (but we don't expect it
1930 * to happen in the usual cases)
1932 udir = apr_pstrdup(rnew->pool, r->uri);
1933 udir[ap_find_path_info(udir, r->path_info)] = '\0';
1934 udir = ap_make_dirstr_parent(rnew->pool, udir);
1936 rnew->uri = ap_make_full_path(rnew->pool, udir, dirent->name);
1937 if (subtype == AP_SUBREQ_MERGE_ARGS) {
1938 rnew->uri = ap_make_full_path(rnew->pool, rnew->uri, r->path_info + 1);
1939 rnew->path_info = apr_pstrdup(rnew->pool, r->path_info);
1941 rnew->uri = ap_escape_uri(rnew->pool, rnew->uri);
1944 udir = ap_make_dirstr_parent(rnew->pool, r->uri);
1945 rnew->uri = ap_escape_uri(rnew->pool, ap_make_full_path(rnew->pool,
1950 fdir = ap_make_dirstr_parent(rnew->pool, r->filename);
1951 rnew->filename = ap_make_full_path(rnew->pool, fdir, dirent->name);
1952 if (r->canonical_filename == r->filename) {
1953 rnew->canonical_filename = rnew->filename;
1956 /* XXX This is now less relevant; we will do a full location walk
1957 * these days for this case. Preserve the apr_stat results, and
1958 * perhaps we also tag that symlinks were tested and/or found for
1961 rnew->per_dir_config = r->server->lookup_defaults;
1963 if ((dirent->valid & APR_FINFO_MIN) != APR_FINFO_MIN) {
1965 * apr_dir_read isn't very complete on this platform, so
1966 * we need another apr_stat (with or without APR_FINFO_LINK
1967 * depending on whether we allow all symlinks here.) If this
1968 * is an APR_LNK that resolves to an APR_DIR, then we will rerun
1969 * everything anyways... this should be safe.
1972 if (ap_allow_options(rnew) & OPT_SYM_LINKS) {
1973 if (((rv = apr_stat(&rnew->finfo, rnew->filename,
1974 APR_FINFO_MIN, rnew->pool)) != APR_SUCCESS)
1975 && (rv != APR_INCOMPLETE)) {
1976 rnew->finfo.filetype = APR_NOFILE;
1980 if (((rv = apr_stat(&rnew->finfo, rnew->filename,
1981 APR_FINFO_LINK | APR_FINFO_MIN,
1982 rnew->pool)) != APR_SUCCESS)
1983 && (rv != APR_INCOMPLETE)) {
1984 rnew->finfo.filetype = APR_NOFILE;
1989 memcpy(&rnew->finfo, dirent, sizeof(apr_finfo_t));
1992 if (rnew->finfo.filetype == APR_LNK) {
1994 * Resolve this symlink. We should tie this back to dir_walk's cache
1996 if ((res = resolve_symlink(rnew->filename, &rnew->finfo,
1997 ap_allow_options(rnew), rnew->pool))
2004 if (rnew->finfo.filetype == APR_DIR) {
2005 /* ap_make_full_path overallocated the buffers
2006 * by one character to help us out here.
2008 strcat(rnew->filename, "/");
2009 if (!rnew->path_info || !*rnew->path_info) {
2010 strcat(rnew->uri, "/");
2014 /* fill in parsed_uri values
2016 if (r->args && *r->args && (subtype == AP_SUBREQ_MERGE_ARGS)) {
2017 ap_parse_uri(rnew, apr_pstrcat(r->pool, rnew->uri, "?",
2021 ap_parse_uri(rnew, rnew->uri);
2024 /* We cannot return NULL without violating the API. So just turn this
2025 * subrequest into a 500. */
2026 if (ap_is_recursion_limit_exceeded(r)) {
2027 rnew->status = HTTP_INTERNAL_SERVER_ERROR;
2031 if ((res = ap_process_request_internal(rnew))) {
2038 AP_DECLARE(request_rec *) ap_sub_req_lookup_file(const char *new_file,
2039 const request_rec *r,
2040 ap_filter_t *next_filter)
2047 rnew = make_sub_request(r, next_filter);
2049 fdir = ap_make_dirstr_parent(rnew->pool, r->filename);
2050 fdirlen = strlen(fdir);
2052 /* Translate r->filename, if it was canonical, it stays canonical
2054 if (r->canonical_filename == r->filename) {
2055 rnew->canonical_filename = (char*)(1);
2058 if (apr_filepath_merge(&rnew->filename, fdir, new_file,
2059 APR_FILEPATH_TRUENAME, rnew->pool) != APR_SUCCESS) {
2060 rnew->status = HTTP_FORBIDDEN;
2064 if (rnew->canonical_filename) {
2065 rnew->canonical_filename = rnew->filename;
2069 * Check for a special case... if there are no '/' characters in new_file
2070 * at all, and the path was the same, then we are looking at a relative
2071 * lookup in the same directory. Fixup the URI to match.
2074 if (strncmp(rnew->filename, fdir, fdirlen) == 0
2075 && rnew->filename[fdirlen]
2076 && ap_strchr_c(rnew->filename + fdirlen, '/') == NULL) {
2078 if (ap_allow_options(rnew) & OPT_SYM_LINKS) {
2079 if (((rv = apr_stat(&rnew->finfo, rnew->filename,
2080 APR_FINFO_MIN, rnew->pool)) != APR_SUCCESS)
2081 && (rv != APR_INCOMPLETE)) {
2082 rnew->finfo.filetype = APR_NOFILE;
2086 if (((rv = apr_stat(&rnew->finfo, rnew->filename,
2087 APR_FINFO_LINK | APR_FINFO_MIN,
2088 rnew->pool)) != APR_SUCCESS)
2089 && (rv != APR_INCOMPLETE)) {
2090 rnew->finfo.filetype = APR_NOFILE;
2094 if (r->uri && *r->uri) {
2095 char *udir = ap_make_dirstr_parent(rnew->pool, r->uri);
2096 rnew->uri = ap_make_full_path(rnew->pool, udir,
2097 rnew->filename + fdirlen);
2098 ap_parse_uri(rnew, rnew->uri); /* fill in parsed_uri values */
2101 ap_parse_uri(rnew, new_file); /* fill in parsed_uri values */
2102 rnew->uri = apr_pstrdup(rnew->pool, "");
2106 /* XXX: @@@: What should be done with the parsed_uri values?
2107 * We would be better off stripping down to the 'common' elements
2108 * of the path, then reassembling the URI as best as we can.
2110 ap_parse_uri(rnew, new_file); /* fill in parsed_uri values */
2112 * XXX: this should be set properly like it is in the same-dir case
2113 * but it's actually sometimes to impossible to do it... because the
2114 * file may not have a uri associated with it -djg
2116 rnew->uri = apr_pstrdup(rnew->pool, "");
2119 /* We cannot return NULL without violating the API. So just turn this
2120 * subrequest into a 500. */
2121 if (ap_is_recursion_limit_exceeded(r)) {
2122 rnew->status = HTTP_INTERNAL_SERVER_ERROR;
2126 if ((res = ap_process_request_internal(rnew))) {
2133 AP_DECLARE(int) ap_run_sub_req(request_rec *r)
2135 int retval = DECLINED;
2136 /* Run the quick handler if the subrequest is not a dirent or file
2139 if (!(r->filename && r->finfo.filetype != APR_NOFILE)) {
2140 retval = ap_run_quick_handler(r, 0);
2143 retval = ap_invoke_handler(r);
2144 if (retval == DONE) {
2148 ap_finalize_sub_req_protocol(r);
2152 AP_DECLARE(void) ap_destroy_sub_req(request_rec *r)
2154 /* Reclaim the space */
2155 apr_pool_destroy(r->pool);
2159 * Function to set the r->mtime field to the specified value if it's later
2160 * than what's already there.
2162 AP_DECLARE(void) ap_update_mtime(request_rec *r, apr_time_t dependency_mtime)
2164 if (r->mtime < dependency_mtime) {
2165 r->mtime = dependency_mtime;
2170 * Is it the initial main request, which we only get *once* per HTTP request?
2172 AP_DECLARE(int) ap_is_initial_req(request_rec *r)
2174 return (r->main == NULL) /* otherwise, this is a sub-request */
2175 && (r->prev == NULL); /* otherwise, this is an internal redirect */