blob: ac6ab3b1b2a79171733b8e9ff050a06bb7e7fd2a [file] [log] [blame]
/* ====================================================================
* Licensed to the Apache Software Foundation (ASF) under one
* or more contributor license agreements. See the NOTICE file
* distributed with this work for additional information
* regarding copyright ownership. The ASF licenses this file
* to you under the Apache License, Version 2.0 (the
* "License"); you may not use this file except in compliance
* with the License. You may obtain a copy of the License at
*
* http://www.apache.org/licenses/LICENSE-2.0
*
* Unless required by applicable law or agreed to in writing,
* software distributed under the License is distributed on an
* "AS IS" BASIS, WITHOUT WARRANTIES OR CONDITIONS OF ANY
* KIND, either express or implied. See the License for the
* specific language governing permissions and limitations
* under the License.
* ====================================================================
*/
#ifndef _SERF_PRIVATE_H_
#define _SERF_PRIVATE_H_
/* ### what the hell? why does the APR interface have a "size" ??
### the implication is that, if we bust this limit, we'd need to
### stop, rebuild a pollset, and repopulate it. what suckage. */
#define MAX_CONN 16
/* Windows does not define IOV_MAX, so we need to ensure it is defined. */
#ifndef IOV_MAX
/* There is no limit for iovec count on Windows, but apr_socket_sendv
allocates WSABUF structures on stack if vecs_count <= 50. */
#define IOV_MAX 50
#endif
/* Older versions of APR do not have this macro. */
#ifdef APR_SIZE_MAX
#define REQUESTED_MAX APR_SIZE_MAX
#else
#define REQUESTED_MAX (~((apr_size_t)0))
#endif
#ifndef APR_VERSION_AT_LEAST /* Introduced in APR 1.3.0 */
#define APR_VERSION_AT_LEAST(major,minor,patch) \
(((major) < APR_MAJOR_VERSION) \
|| ((major) == APR_MAJOR_VERSION && (minor) < APR_MINOR_VERSION) \
|| ((major) == APR_MAJOR_VERSION && (minor) == APR_MINOR_VERSION && \
(patch) <= APR_PATCH_VERSION))
#endif /* APR_VERSION_AT_LEAST */
#define SERF_IO_CLIENT (1)
#define SERF_IO_CONN (2)
#define SERF_IO_LISTENER (3)
/*** Logging facilities ***/
/* Check for the SERF_DISABLE_LOGGING define, as set by scons. */
#ifndef SERF_DISABLE_LOGGING
#define SERF_LOGGING_ENABLED
#endif
/* Slightly shorter names for internal use. */
#define LOGLVL_ERROR SERF_LOG_ERROR
#define LOGLVL_WARNING SERF_LOG_WARNING
#define LOGLVL_INFO SERF_LOG_INFO
#define LOGLVL_DEBUG SERF_LOG_DEBUG
#define LOGLVL_NONE SERF_LOG_NONE
/* List of components, used as a mask. */
#define LOGCOMP_ALL_MSG SERF_LOGCOMP_ALL_MSG
#define LOGCOMP_ALL SERF_LOGCOMP_ALL
#define LOGCOMP_SSL SERF_LOGCOMP_SSL
#define LOGCOMP_AUTHN SERF_LOGCOMP_AUTHN
#define LOGCOMP_CONN SERF_LOGCOMP_CONN
#define LOGCOMP_COMPR SERF_LOGCOMP_COMPR
#define LOGCOMP_RAWMSG SERF_LOGCOMP_RAWMSG
#define LOGCOMP_SSLMSG SERF_LOGCOMP_SSLMSG
#define LOGCOMP_NONE SERF_LOGCOMP_NONE
/* TODO: remove before next serf release, FOR TESTING ONLY */
#define ACTIVE_LOGLEVEL SERF_LOG_NONE
#define ACTIVE_LOGCOMPS SERF_LOGCOMP_NONE
/* Older versions of APR do not have the APR_VERSION_AT_LEAST macro. Those
implementations are safe.
If the macro *is* defined, and we're on WIN32, and APR is version 1.4.0+,
then we have a broken WSAPoll() implementation.
See serf_context_create_ex() below. */
#if defined(APR_VERSION_AT_LEAST) && defined(WIN32)
#if APR_VERSION_AT_LEAST(1,4,0)
#define BROKEN_WSAPOLL
#endif
#endif
typedef struct serf__authn_scheme_t serf__authn_scheme_t;
typedef struct serf_io_baton_t {
int type;
union {
serf_incoming_t *client;
serf_connection_t *conn;
serf_listener_t *listener;
} u;
} serf_io_baton_t;
/* Holds all the information corresponding to a request/response pair. */
struct serf_request_t {
serf_connection_t *conn;
apr_pool_t *respool;
serf_bucket_alloc_t *allocator;
/* The bucket corresponding to the request. Will be NULL once the
* bucket has been emptied (for delivery into the socket).
*/
serf_bucket_t *req_bkt;
serf_request_setup_t setup;
void *setup_baton;
serf_response_acceptor_t acceptor;
void *acceptor_baton;
serf_response_handler_t handler;
void *handler_baton;
serf_bucket_t *resp_bkt;
int writing_started;
int priority;
/* 1 if this is a request to setup a SSL tunnel, 0 for normal requests. */
int ssltunnel;
/* This baton is currently only used for digest authentication, which
needs access to the uri of the request in the response handler.
If serf_request_t is replaced by a serf_http_request_t in the future,
which knows about uri and method and such, this baton won't be needed
anymore. */
void *auth_baton;
struct serf_request_t *next;
};
typedef struct serf_pollset_t {
/* the set of connections to poll */
apr_pollset_t *pollset;
} serf_pollset_t;
typedef struct serf__authn_info_t {
const serf__authn_scheme_t *scheme;
void *baton;
int failed_authn_types;
} serf__authn_info_t;
/*** Configuration store declarations ***/
typedef struct serf__config_hdr_t serf__config_hdr_t;
struct serf_config_t {
/* Pool for per-connection configuration values */
apr_pool_t *conn_pool;
/* Pool for per-host and per-context configuration values */
apr_pool_t *ctx_pool;
/* Configuration key/value pairs per context */
serf__config_hdr_t *per_context;
/* Configuration key/value pairs per host */
serf__config_hdr_t *per_host;
/* Configuration key/value pairs per connection */
serf__config_hdr_t *per_conn;
};
typedef struct serf__config_store_t {
apr_pool_t *pool;
/* Configuration key/value pairs per context */
serf__config_hdr_t *global_per_context;
/* Configuration per host, dual-layered:
Key: hostname:port
Value: hash table of per host key/value pairs
*/
apr_hash_t *global_per_host;
/* Configuration per connection, dual-layered:
Key: string(connection ptr) (?)
Value: hash table of per host key/value pairs
*/
apr_hash_t *global_per_conn;
} serf__config_store_t;
/* Initializes the data structures used by the configuration store */
apr_status_t serf__config_store_init(serf_context_t *ctx);
/* Returns a config object, which is a read/write view on the configuration
store. This view is limited to:
- all per context configuration
- per host configuration (host as defined in CONN)
- per connection configuration
If CONN is NULL, only the per context configuration will be available.
The host and connection entries will be created in the configuration store
when not existing already.
The config object will be allocated in OUT_POOL. The config object's
lifecycle cannot extend beyond that of the serf context!
*/
apr_status_t serf__config_store_get_config(serf_context_t *ctx,
serf_connection_t *conn,
serf_config_t **config,
apr_pool_t *out_pool);
/* Cleans up all connection specific configuration values */
apr_status_t
serf__config_store_remove_connection(serf__config_store_t config_store,
serf_connection_t *conn);
/* Cleans up all host specific configuration values */
apr_status_t
serf__config_store_remove_host(serf__config_store_t config_store,
const char *hostname_port);
struct serf_context_t {
/* the pool used for self and for other allocations */
apr_pool_t *pool;
serf__config_store_t config_store;
void *pollset_baton;
serf_socket_add_t pollset_add;
serf_socket_remove_t pollset_rm;
/* one of our connections has a dirty pollset state. */
int dirty_pollset;
/* the list of active connections */
apr_array_header_t *conns;
#define GET_CONN(ctx, i) (((serf_connection_t **)(ctx)->conns->elts)[i])
/* Proxy server address */
apr_sockaddr_t *proxy_address;
/* Progress callback */
serf_progress_t progress_func;
void *progress_baton;
apr_off_t progress_read;
apr_off_t progress_written;
/* authentication info for the servers used in this context. Shared by all
connections to the same server.
Structure of the hashtable: key: host url, e.g. https://localhost:80
value: serf__authn_info_t *
*/
apr_hash_t *server_authn_info;
/* authentication info for the proxy configured in this context, shared by
all connections. */
serf__authn_info_t proxy_authn_info;
/* List of authn types supported by the client.*/
int authn_types;
/* Callback function used to get credentials for a realm. */
serf_credentials_callback_t cred_cb;
serf_config_t *config;
};
struct serf_listener_t {
serf_context_t *ctx;
serf_io_baton_t baton;
apr_socket_t *skt;
apr_pool_t *pool;
apr_pollfd_t desc;
void *accept_baton;
serf_accept_client_t accept_func;
};
struct serf_incoming_t {
serf_context_t *ctx;
serf_io_baton_t baton;
void *request_baton;
serf_incoming_request_cb_t request;
apr_socket_t *skt;
apr_pollfd_t desc;
};
/* States for the different stages in the lifecyle of a connection. */
typedef enum {
SERF_CONN_INIT, /* no socket created yet */
SERF_CONN_SETUP_SSLTUNNEL, /* ssl tunnel being setup, no requests sent */
SERF_CONN_CONNECTED, /* conn is ready to send requests */
SERF_CONN_CLOSING /* conn is closing, no more requests,
start a new socket */
} serf__connection_state_t;
struct serf_connection_t {
serf_context_t *ctx;
apr_status_t status;
serf_io_baton_t baton;
apr_pool_t *pool;
serf_bucket_alloc_t *allocator;
apr_sockaddr_t *address;
apr_socket_t *skt;
apr_pool_t *skt_pool;
/* the last reqevents we gave to pollset_add */
apr_int16_t reqevents;
/* the events we've seen for this connection in our returned pollset */
apr_int16_t seen_in_pollset;
/* are we a dirty connection that needs its poll status updated? */
int dirty_conn;
/* number of completed requests we've sent */
unsigned int completed_requests;
/* number of completed responses we've got */
unsigned int completed_responses;
/* keepalive */
unsigned int probable_keepalive_limit;
/* Current state of the connection (whether or not it is connected). */
serf__connection_state_t state;
/* This connection may have responses without a request! */
int async_responses;
serf_bucket_t *current_async_response;
serf_response_acceptor_t async_acceptor;
void *async_acceptor_baton;
serf_response_handler_t async_handler;
void *async_handler_baton;
/* A bucket wrapped around our socket (for reading responses). */
serf_bucket_t *stream;
/* A reference to the aggregate bucket that provides the boundary between
* request level buckets and connection level buckets.
*/
serf_bucket_t *ostream_head;
serf_bucket_t *ostream_tail;
/* Aggregate bucket used to send the CONNECT request. */
serf_bucket_t *ssltunnel_ostream;
/* The list of requests that are written but no response has been received
yet. */
serf_request_t *written_reqs;
serf_request_t *written_reqs_tail;
unsigned int nr_of_written_reqs;
/* The list of requests that hasn't been written */
serf_request_t *unwritten_reqs;
serf_request_t *unwritten_reqs_tail;
unsigned int nr_of_unwritten_reqs;
struct iovec vec[IOV_MAX];
int vec_len;
serf_connection_setup_t setup;
void *setup_baton;
serf_connection_closed_t closed;
void *closed_baton;
/* Max. number of outstanding requests. */
unsigned int max_outstanding_requests;
/* Flag to enable or disable HTTP pipelining. This flag is used internally
only. */
int pipelining;
int hit_eof;
/* Host url, path ommitted, syntax: https://svn.apache.org . */
const char *host_url;
/* Exploded host url, path ommitted. Only scheme, hostinfo, hostname &
port values are filled in. */
apr_uri_t host_info;
/* authentication info for this connection. */
serf__authn_info_t authn_info;
/* Time marker when connection begins. */
apr_time_t connect_time;
/* Calculated connection latency. Negative value if latency is unknown. */
apr_interval_time_t latency;
/* Needs to read first before we can write again. */
int stop_writing;
/* Configuration shared with buckets and authn plugins */
serf_config_t *config;
};
/*** Internal bucket functions ***/
/** Transform a response_bucket in-place into an aggregate bucket. Restore the
status line and all headers, not just the body.
This can only be used when we haven't started reading the body of the
response yet.
Keep internal for now, probably only useful within serf.
*/
apr_status_t serf_response_full_become_aggregate(serf_bucket_t *bucket);
/**
* Replace the response body's EOF status with an error status. This can be used
* to signal an error to the application (see handle_response in outgoing.c).
*/
void serf__bucket_response_set_error_on_eof(serf_bucket_t *bucket,
apr_status_t error);
/**
* Remove the header from the list, do nothing if the header wasn't added.
*/
void serf__bucket_headers_remove(serf_bucket_t *headers_bucket,
const char *header);
/*** Authentication handler declarations ***/
typedef enum { PROXY, HOST } peer_t;
/* Perform authentication related initialization of connection CONN. */
apr_status_t serf__auth_setup_connection(peer_t peer,
serf_connection_t *conn);
/* Perform authentication related initialization of request REQUEST. */
apr_status_t serf__auth_setup_request(peer_t peer,
serf_request_t *request,
const char *method,
const char *uri,
serf_bucket_t *hdrs_bkt);
/**
* Handles a 401 or 407 response, tries the different available authentication
* handlers.
*/
apr_status_t serf__handle_auth_response(int *consumed_response,
serf_request_t *request,
serf_bucket_t *response,
apr_pool_t *pool);
/* Get the cached serf__authn_info_t object for the target server, or create one
when this is the first connection to the server.
TODO: The serf__authn_info_t objects are allocated in the context pool, so
a context that's used to connect to many different servers using Basic or
Digest authencation will hold on to many objects indefinitely. We should be
able to cleanup stale objects from time to time. */
serf__authn_info_t *serf__get_authn_info_for_server(serf_connection_t *conn);
/* fromt context.c */
void serf__context_progress_delta(void *progress_baton, apr_off_t read,
apr_off_t written);
/* from incoming.c */
apr_status_t serf__process_client(serf_incoming_t *l, apr_int16_t events);
apr_status_t serf__process_listener(serf_listener_t *l);
/* from outgoing.c */
apr_status_t serf__open_connections(serf_context_t *ctx);
apr_status_t serf__process_connection(serf_connection_t *conn,
apr_int16_t events);
apr_status_t serf__conn_update_pollset(serf_connection_t *conn);
serf_request_t *serf__ssltunnel_request_create(serf_connection_t *conn,
serf_request_setup_t setup,
void *setup_baton);
void serf__connection_set_pipelining(serf_connection_t *conn, int enabled);
apr_status_t serf__provide_credentials(serf_context_t *ctx,
char **username,
char **password,
serf_request_t *request,
int code, const char *authn_type,
const char *realm,
apr_pool_t *pool);
/* Requeue a request (at the front). */
serf_request_t *serf__request_requeue(const serf_request_t *request);
/* from ssltunnel.c */
apr_status_t serf__ssltunnel_connect(serf_connection_t *conn);
/* Creates a bucket that logs all data returned by one of the read functions
of the wrapped bucket. The new bucket will replace the wrapped bucket, so
the wrapped ptr will be invalid when this function returns. */
serf_bucket_t *serf__bucket_log_wrapper_create(serf_bucket_t *wrapped,
const char *prefix,
serf_bucket_alloc_t *allocator);
/** Logging functions. **/
/* Initialize the logging subsystem. This will store a log baton in the
context's configuration store. */
apr_status_t serf__log_init(serf_context_t *ctx);
/* Logs a standard event, but without prefix. This is useful to build up
log lines in parts. */
void serf__log_nopref(apr_uint32_t level, apr_uint32_t comp,
serf_config_t *config, const char *fmt, ...);
/* Logs an event, uses CONFIG to find out socket related info. */
void serf__log(apr_uint32_t level, apr_uint32_t comp, const char *filename,
serf_config_t *config, const char *fmt, ...);
#endif