NEW ISSUES THAT WOULD BE NICE TO HAVE DONE IN 2.4 BUT ARE NOT BLOCKERS
- * The mod_session* modules need to be checked that their hooks respect
- the returning of int (HTTP status codes) and apr_status_t as appropriate,
- and any anomolies fixed.
- jim sez: from what I can see, mod_session* is no worse that other
- modules that mix these 2 types... clean up is
- forthcoming but should not be considered a blocker, imo
- pgollucci: +1 jim
- wrowe asks: what's the API change required?
- wrowe asks; why are we shipping this if it requires apr_ssl
-
* mod_ssl's proxy support only allows one proxy client certificate per
frontend virtual host. Lift this restriction.
jim sez: Why a blocker?, pgollucci +1 jim
* 20111130.0 (2.4.0-dev) c->remote_ip becomes c->peer_ip and r->client_ip,
* c->remote_addr becomes c->peer_addr and r->client_addr
* 20111201.0 (2.5.0-dev) Add invalidate_entity() to the cache provider.
+ * 20111202.0 (2.5.0-dev) Use apr_status_t across mod_session API.
*/
#define MODULE_MAGIC_COOKIE 0x41503234UL /* "AP24" */
#ifndef MODULE_MAGIC_NUMBER_MAJOR
-#define MODULE_MAGIC_NUMBER_MAJOR 20111201
+#define MODULE_MAGIC_NUMBER_MAJOR 20111202
#endif
#define MODULE_MAGIC_NUMBER_MINOR 0 /* 0...n */
* @param r The request
* @param z A pointer to where the session will be written.
*/
-/* ??? We return errors but we ignore them thru-out. ??? */
-static int ap_session_load(request_rec * r, session_rec ** z)
+static apr_status_t ap_session_load(request_rec * r, session_rec ** z)
{
session_dir_conf *dconf = ap_get_module_config(r->per_dir_config,
* @param r The request
* @param z A pointer to where the session will be written.
*/
-/* ??? We return errors but we ignore them thru-out. ??? */
-static int ap_session_save(request_rec * r, session_rec * z)
+static apr_status_t ap_session_save(request_rec * r, session_rec * z)
{
if (z) {
apr_time_t now = apr_time_now();
* @param key The key to get.
* @param value The buffer to write the value to.
*/
-static void ap_session_get(request_rec * r, session_rec * z, const char *key, const char **value)
+static apr_status_t ap_session_get(request_rec * r, session_rec * z,
+ const char *key, const char **value)
{
if (!z) {
- ap_session_load(r, &z); /* errors ignored?? */
+ apr_status_t rv;
+ rv = ap_session_load(r, &z);
+ if (APR_SUCCESS != rv) {
+ return rv;
+ }
}
if (z && z->entries) {
*value = apr_table_get(z->entries, key);
}
+
+ return OK;
}
/**
* @param key The key to set. The existing key value will be replaced.
* @param value The value to set.
*/
-static void ap_session_set(request_rec * r, session_rec * z,
- const char *key, const char *value)
+static apr_status_t ap_session_set(request_rec * r, session_rec * z,
+ const char *key, const char *value)
{
if (!z) {
- ap_session_load(r, &z); /* errors ignored?? */
+ apr_status_t rv;
+ rv = ap_session_load(r, &z);
+ if (APR_SUCCESS != rv) {
+ return rv;
+ }
}
if (z) {
if (value) {
}
z->dirty = 1;
}
+ return APR_SUCCESS;
}
static int identity_count(int *count, const char *key, const char *val)
* @param r The request pointer.
* @param z A pointer to where the session will be written.
*/
-static int session_identity_encode(request_rec * r, session_rec * z)
+static apr_status_t session_identity_encode(request_rec * r, session_rec * z)
{
char *buffer = NULL;
* @param r The request pointer.
* @param z A pointer to where the session will be written.
*/
-static int session_identity_decode(request_rec * r, session_rec * z)
+static apr_status_t session_identity_decode(request_rec * r, session_rec * z)
{
char *last = NULL;
* attempt to save the session will be called
*/
static apr_status_t session_output_filter(ap_filter_t * f,
- apr_bucket_brigade * in)
+ apr_bucket_brigade * in)
{
/* save all the sessions in all the requests */
&session_module);
/* load the session, or create one if necessary */
- ap_session_load(r, &z); /* errors ignored?? */
+ /* when unset or on error, z will be NULL */
+ ap_session_load(r, &z);
if (!z || z->written) {
r = r->next;
continue;
}
/* save away the session, and we're done */
- ap_session_save(r, z); /* errors ignored?? */
+ /* when unset or on error, we've complained to the log */
+ ap_session_save(r, z);
r = r->next;
}
&session_module);
session_rec *z = NULL;
- ap_session_load(r, &z); /* errors ignored?? */
- if (conf->env) {
+ /* if an error occurs or no session has been configured, we ignore
+ * the broken session and allow it to be recreated from scratch on save
+ * if necessary.
+ */
+ ap_session_load(r, &z);
+
+ if (z && conf->env) {
session_identity_encode(r, z);
if (z->encoded) {
apr_table_set(r->subprocess_env, HTTP_SESSION, z->encoded);
* @param r The request
* @param z A pointer to where the session will be written.
*/
-APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, int, session_load,
- (request_rec * r, session_rec ** z))
+APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, apr_status_t, session_load,
+ (request_rec * r, session_rec ** z))
/**
* Hook to save the session.
* @param r The request
* @param z A pointer to where the session will be written.
*/
-APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, int, session_save,
- (request_rec * r, session_rec * z))
+APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, apr_status_t, session_save,
+ (request_rec * r, session_rec * z))
/**
* Hook to encode the session.
* @param r The request
* @param z A pointer to where the session will be written.
*/
-APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, int, session_encode,
- (request_rec * r, session_rec * z))
+APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, apr_status_t, session_encode,
+ (request_rec * r, session_rec * z))
/**
* Hook to decode the session.
* @param r The request
* @param z A pointer to where the session will be written.
*/
-APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, int, session_decode,
- (request_rec * r, session_rec * z))
-
-APR_DECLARE_OPTIONAL_FN(void, ap_session_get, (request_rec * r, session_rec * z,
- const char *key, const char **value));
-APR_DECLARE_OPTIONAL_FN(void, ap_session_set, (request_rec * r, session_rec * z,
- const char *key, const char *value));
-APR_DECLARE_OPTIONAL_FN(int, ap_session_load, (request_rec *, session_rec **));
-APR_DECLARE_OPTIONAL_FN(int, ap_session_save, (request_rec *, session_rec *));
+APR_DECLARE_EXTERNAL_HOOK(ap, SESSION, apr_status_t, session_decode,
+ (request_rec * r, session_rec * z))
+
+APR_DECLARE_OPTIONAL_FN(
+ apr_status_t,
+ ap_session_get,
+ (request_rec * r, session_rec * z, const char *key, const char **value));
+APR_DECLARE_OPTIONAL_FN(apr_status_t, ap_session_set,
+ (request_rec * r, session_rec * z, const char *key, const char *value));
+APR_DECLARE_OPTIONAL_FN(apr_status_t, ap_session_load,
+ (request_rec *, session_rec **));
+APR_DECLARE_OPTIONAL_FN(apr_status_t, ap_session_save,
+ (request_rec *, session_rec *));
/**
* The name of the module.
* @param r The request pointer.
* @param z A pointer to where the session will be written.
*/
-static int session_cookie_save(request_rec * r, session_rec * z)
+static apr_status_t session_cookie_save(request_rec * r, session_rec * z)
{
session_cookie_dir_conf *conf = ap_get_module_config(r->per_dir_config,
*
* On success, this returns APR_SUCCESS.
*/
-static int session_cookie_load(request_rec * r, session_rec ** z)
+static apr_status_t session_cookie_load(request_rec * r, session_rec ** z)
{
session_cookie_dir_conf *conf = ap_get_module_config(r->per_dir_config,
int library_set;
} session_crypto_conf;
-AP_DECLARE(int) ap_session_crypto_encode(request_rec * r, session_rec * z);
-AP_DECLARE(int) ap_session_crypto_decode(request_rec * r, session_rec * z);
-AP_DECLARE(int) ap_session_crypto_init(apr_pool_t *p, apr_pool_t *plog,
- apr_pool_t *ptemp, server_rec *s);
-
/**
* Initialise the encryption as per the current config.
*
* @param r The request pointer.
* @param z A pointer to where the session will be written.
*/
-AP_DECLARE(int) ap_session_crypto_encode(request_rec * r, session_rec * z)
+static apr_status_t session_crypto_encode(request_rec * r, session_rec * z)
{
char *encoded = NULL;
* @param r The request pointer.
* @param z A pointer to where the session will be written.
*/
-AP_DECLARE(int) ap_session_crypto_decode(request_rec * r, session_rec * z)
+static apr_status_t session_crypto_decode(request_rec * r,
+ session_rec * z)
{
char *encoded = NULL;
/**
* Initialise the SSL in the post_config hook.
*/
-AP_DECLARE(int) ap_session_crypto_init(apr_pool_t *p, apr_pool_t *plog,
+static int session_crypto_init(apr_pool_t *p, apr_pool_t *plog,
apr_pool_t *ptemp, server_rec *s)
{
const apr_crypto_driver_t *driver = NULL;
static void register_hooks(apr_pool_t * p)
{
- ap_hook_session_encode(ap_session_crypto_encode, NULL, NULL, APR_HOOK_LAST);
- ap_hook_session_decode(ap_session_crypto_decode, NULL, NULL, APR_HOOK_FIRST);
- ap_hook_post_config(ap_session_crypto_init, NULL, NULL, APR_HOOK_LAST);
+ ap_hook_session_encode(session_crypto_encode, NULL, NULL, APR_HOOK_LAST);
+ ap_hook_session_decode(session_crypto_decode, NULL, NULL, APR_HOOK_FIRST);
+ ap_hook_post_config(session_crypto_init, NULL, NULL, APR_HOOK_LAST);
}
AP_DECLARE_MODULE(session_crypto) =