blob: c44de0dafab434a77d4c8c7713c55119a3452f23 [file] [log] [blame]
/* ====================================================================
* Copyright (c) 1996-1999 The Apache Group. All rights reserved.
*
* Redistribution and use in source and binary forms, with or without
* modification, are permitted provided that the following conditions
* are met:
*
* 1. Redistributions of source code must retain the above copyright
* notice, this list of conditions and the following disclaimer.
*
* 2. Redistributions in binary form must reproduce the above copyright
* notice, this list of conditions and the following disclaimer in
* the documentation and/or other materials provided with the
* distribution.
*
* 3. All advertising materials mentioning features or use of this
* software must display the following acknowledgment:
* "This product includes software developed by the Apache Group
* for use in the Apache HTTP server project (http://www.apache.org/)."
*
* 4. The names "Apache Server" and "Apache Group" must not be used to
* endorse or promote products derived from this software without
* prior written permission. For written permission, please contact
* apache@apache.org.
*
* 5. Products derived from this software may not be called "Apache"
* nor may "Apache" appear in their names without prior written
* permission of the Apache Group.
*
* 6. Redistributions of any form whatsoever must retain the following
* acknowledgment:
* "This product includes software developed by the Apache Group
* for use in the Apache HTTP server project (http://www.apache.org/)."
*
* THIS SOFTWARE IS PROVIDED BY THE APACHE GROUP ``AS IS'' AND ANY
* EXPRESSED OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO, THE
* IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
* PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE APACHE GROUP OR
* ITS CONTRIBUTORS BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL,
* SPECIAL, EXEMPLARY, OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT
* NOT LIMITED TO, PROCUREMENT OF SUBSTITUTE GOODS OR SERVICES;
* LOSS OF USE, DATA, OR PROFITS; OR BUSINESS INTERRUPTION)
* HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY, WHETHER IN CONTRACT,
* STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE OR OTHERWISE)
* ARISING IN ANY WAY OUT OF THE USE OF THIS SOFTWARE, EVEN IF ADVISED
* OF THE POSSIBILITY OF SUCH DAMAGE.
* ====================================================================
*
* This software consists of voluntary contributions made by many
* individuals on behalf of the Apache Group and was originally based
* on public domain software written at the National Center for
* Supercomputing Applications, University of Illinois, Urbana-Champaign.
* For more information on the Apache Group and the Apache HTTP server
* project, please see <http://www.apache.org/>.
*
*/
/* _ _ _
** _ __ ___ ___ __| | _ __ _____ ___ __(_) |_ ___
** | '_ ` _ \ / _ \ / _` | | '__/ _ \ \ /\ / / '__| | __/ _ \
** | | | | | | (_) | (_| | | | | __/\ V V /| | | | || __/
** |_| |_| |_|\___/ \__,_|___|_| \___| \_/\_/ |_| |_|\__\___|
** |_____|
**
** URL Rewriting Module
**
** This module uses a rule-based rewriting engine (based on a
** regular-expression parser) to rewrite requested URLs on the fly.
**
** It supports an unlimited number of additional rule conditions (which can
** operate on a lot of variables, even on HTTP headers) for granular
** matching and even external database lookups (either via plain text
** tables, DBM hash files or even external processes) for advanced URL
** substitution.
**
** It operates on the full URLs (including the PATH_INFO part) both in
** per-server context (httpd.conf) and per-dir context (.htaccess) and even
** can generate QUERY_STRING parts on result. The rewriting result finally
** can lead to internal subprocessing, external request redirection or even
** to internal proxy throughput.
**
** This module was originally written in April 1996 and
** gifted exclusively to the The Apache Group in July 1997 by
**
** Ralf S. Engelschall
** rse@engelschall.com
** www.engelschall.com
*/
#include "mod_rewrite.h"
#ifndef NO_WRITEV
#include <sys/types.h>
#include <sys/uio.h>
#endif
/*
** +-------------------------------------------------------+
** | |
** | static module configuration
** | |
** +-------------------------------------------------------+
*/
/*
** Our interface to the Apache server kernel:
**
** o Runtime logic of a request is as following:
** while(request or subrequest)
** foreach(stage #0...#9)
** foreach(module) (**)
** try to run hook
**
** o the order of modules at (**) is the inverted order as
** given in the "Configuration" file, i.e. the last module
** specified is the first one called for each hook!
** The core module is always the last!
**
** o there are two different types of result checking and
** continue processing:
** for hook #0,#1,#4,#5,#6,#8:
** hook run loop stops on first modules which gives
** back a result != DECLINED, i.e. it usually returns OK
** which says "OK, module has handled this _stage_" and for #1
** this have not to mean "Ok, the filename is now valid".
** for hook #2,#3,#7,#9:
** all hooks are run, independend of result
**
** o at the last stage, the core module always
** - says "BAD_REQUEST" if r->filename does not begin with "/"
** - prefix URL with document_root or replaced server_root
** with document_root and sets r->filename
** - always return a "OK" independed if the file really exists
** or not!
*/
/* The section for the Configure script:
* MODULE-DEFINITION-START
* Name: rewrite_module
* ConfigStart
. ./helpers/find-dbm-lib
if [ "x$found_dbm" = "x1" ]; then
echo " enabling DBM support for mod_rewrite"
else
echo " disabling DBM support for mod_rewrite"
echo " (perhaps you need to add -ldbm, -lndbm or -lgdbm to EXTRA_LIBS)"
CFLAGS="$CFLAGS -DNO_DBM_REWRITEMAP"
fi
* ConfigEnd
* MODULE-DEFINITION-END
*/
/* the table of commands we provide */
static const command_rec command_table[] = {
{ "RewriteEngine", cmd_rewriteengine, NULL, OR_FILEINFO, FLAG,
"On or Off to enable or disable (default) the whole rewriting engine" },
{ "RewriteOptions", cmd_rewriteoptions, NULL, OR_FILEINFO, ITERATE,
"List of option strings to set" },
{ "RewriteBase", cmd_rewritebase, NULL, OR_FILEINFO, TAKE1,
"the base URL of the per-directory context" },
{ "RewriteCond", cmd_rewritecond, NULL, OR_FILEINFO, RAW_ARGS,
"an input string and a to be applied regexp-pattern" },
{ "RewriteRule", cmd_rewriterule, NULL, OR_FILEINFO, RAW_ARGS,
"an URL-applied regexp-pattern and a substitution URL" },
{ "RewriteMap", cmd_rewritemap, NULL, RSRC_CONF, TAKE2,
"a mapname and a filename" },
{ "RewriteLock", cmd_rewritelock, NULL, RSRC_CONF, TAKE1,
"the filename of a lockfile used for inter-process synchronization"},
{ "RewriteLog", cmd_rewritelog, NULL, RSRC_CONF, TAKE1,
"the filename of the rewriting logfile" },
{ "RewriteLogLevel", cmd_rewriteloglevel, NULL, RSRC_CONF, TAKE1,
"the level of the rewriting logfile verbosity "
"(0=none, 1=std, .., 9=max)" },
{ NULL }
};
/* the table of content handlers we provide */
static const handler_rec handler_table[] = {
{ "redirect-handler", handler_redirect },
{ NULL }
};
/* the main config structure */
module MODULE_VAR_EXPORT rewrite_module = {
STANDARD_MODULE_STUFF,
init_module, /* module initializer */
config_perdir_create, /* create per-dir config structures */
config_perdir_merge, /* merge per-dir config structures */
config_server_create, /* create per-server config structures */
config_server_merge, /* merge per-server config structures */
command_table, /* table of config file commands */
handler_table, /* [#8] MIME-typed-dispatched handlers */
hook_uri2file, /* [#1] URI to filename translation */
NULL, /* [#4] validate user id from request */
NULL, /* [#5] check if the user is ok _here_ */
NULL, /* [#3] check access by host address */
hook_mimetype, /* [#6] determine MIME type */
hook_fixup, /* [#7] pre-run fixups */
NULL, /* [#9] log a transaction */
NULL, /* [#2] header parser */
init_child, /* child_init */
NULL, /* child_exit */
NULL /* [#0] post read-request */
};
/* the cache */
static cache *cachep;
/* whether proxy module is available or not */
static int proxy_available;
static char *lockname;
static int lockfd = -1;
/*
** +-------------------------------------------------------+
** | |
** | configuration directive handling
** | |
** +-------------------------------------------------------+
*/
/*
**
** per-server configuration structure handling
**
*/
static void *config_server_create(pool *p, server_rec *s)
{
rewrite_server_conf *a;
a = (rewrite_server_conf *)ap_pcalloc(p, sizeof(rewrite_server_conf));
a->state = ENGINE_DISABLED;
a->options = OPTION_NONE;
a->rewritelogfile = NULL;
a->rewritelogfp = -1;
a->rewriteloglevel = 0;
a->rewritemaps = ap_make_array(p, 2, sizeof(rewritemap_entry));
a->rewriteconds = ap_make_array(p, 2, sizeof(rewritecond_entry));
a->rewriterules = ap_make_array(p, 2, sizeof(rewriterule_entry));
a->server = s;
return (void *)a;
}
static void *config_server_merge(pool *p, void *basev, void *overridesv)
{
rewrite_server_conf *a, *base, *overrides;
a = (rewrite_server_conf *)ap_pcalloc(p, sizeof(rewrite_server_conf));
base = (rewrite_server_conf *)basev;
overrides = (rewrite_server_conf *)overridesv;
a->state = overrides->state;
a->options = overrides->options;
a->server = overrides->server;
if (a->options & OPTION_INHERIT) {
/*
* local directives override
* and anything else is inherited
*/
a->rewriteloglevel = overrides->rewriteloglevel != 0
? overrides->rewriteloglevel
: base->rewriteloglevel;
a->rewritelogfile = overrides->rewritelogfile != NULL
? overrides->rewritelogfile
: base->rewritelogfile;
a->rewritelogfp = overrides->rewritelogfp != -1
? overrides->rewritelogfp
: base->rewritelogfp;
a->rewritemaps = ap_append_arrays(p, overrides->rewritemaps,
base->rewritemaps);
a->rewriteconds = ap_append_arrays(p, overrides->rewriteconds,
base->rewriteconds);
a->rewriterules = ap_append_arrays(p, overrides->rewriterules,
base->rewriterules);
}
else {
/*
* local directives override
* and anything else gets defaults
*/
a->rewriteloglevel = overrides->rewriteloglevel;
a->rewritelogfile = overrides->rewritelogfile;
a->rewritelogfp = overrides->rewritelogfp;
a->rewritemaps = overrides->rewritemaps;
a->rewriteconds = overrides->rewriteconds;
a->rewriterules = overrides->rewriterules;
}
return (void *)a;
}
/*
**
** per-directory configuration structure handling
**
*/
static void *config_perdir_create(pool *p, char *path)
{
rewrite_perdir_conf *a;
a = (rewrite_perdir_conf *)ap_pcalloc(p, sizeof(rewrite_perdir_conf));
a->state = ENGINE_DISABLED;
a->options = OPTION_NONE;
a->baseurl = NULL;
a->rewriteconds = ap_make_array(p, 2, sizeof(rewritecond_entry));
a->rewriterules = ap_make_array(p, 2, sizeof(rewriterule_entry));
if (path == NULL) {
a->directory = NULL;
}
else {
/* make sure it has a trailing slash */
if (path[strlen(path)-1] == '/') {
a->directory = ap_pstrdup(p, path);
}
else {
a->directory = ap_pstrcat(p, path, "/", NULL);
}
}
return (void *)a;
}
static void *config_perdir_merge(pool *p, void *basev, void *overridesv)
{
rewrite_perdir_conf *a, *base, *overrides;
a = (rewrite_perdir_conf *)ap_pcalloc(p,
sizeof(rewrite_perdir_conf));
base = (rewrite_perdir_conf *)basev;
overrides = (rewrite_perdir_conf *)overridesv;
a->state = overrides->state;
a->options = overrides->options;
a->directory = overrides->directory;
a->baseurl = overrides->baseurl;
if (a->options & OPTION_INHERIT) {
a->rewriteconds = ap_append_arrays(p, overrides->rewriteconds,
base->rewriteconds);
a->rewriterules = ap_append_arrays(p, overrides->rewriterules,
base->rewriterules);
}
else {
a->rewriteconds = overrides->rewriteconds;
a->rewriterules = overrides->rewriterules;
}
return (void *)a;
}
/*
**
** the configuration commands
**
*/
static const char *cmd_rewriteengine(cmd_parms *cmd,
rewrite_perdir_conf *dconf, int flag)
{
rewrite_server_conf *sconf;
sconf =
(rewrite_server_conf *)ap_get_module_config(cmd->server->module_config,
&rewrite_module);
if (cmd->path == NULL) { /* is server command */
sconf->state = (flag ? ENGINE_ENABLED : ENGINE_DISABLED);
}
else /* is per-directory command */ {
dconf->state = (flag ? ENGINE_ENABLED : ENGINE_DISABLED);
}
return NULL;
}
static const char *cmd_rewriteoptions(cmd_parms *cmd,
rewrite_perdir_conf *dconf, char *option)
{
rewrite_server_conf *sconf;
const char *err;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
if (cmd->path == NULL) { /* is server command */
err = cmd_rewriteoptions_setoption(cmd->pool,
&(sconf->options), option);
}
else { /* is per-directory command */
err = cmd_rewriteoptions_setoption(cmd->pool,
&(dconf->options), option);
}
return err;
}
static const char *cmd_rewriteoptions_setoption(pool *p, int *options,
char *name)
{
if (strcasecmp(name, "inherit") == 0) {
*options |= OPTION_INHERIT;
}
else {
return ap_pstrcat(p, "RewriteOptions: unknown option '",
name, "'\n", NULL);
}
return NULL;
}
static const char *cmd_rewritelog(cmd_parms *cmd, void *dconf, char *a1)
{
rewrite_server_conf *sconf;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
sconf->rewritelogfile = a1;
return NULL;
}
static const char *cmd_rewriteloglevel(cmd_parms *cmd, void *dconf, char *a1)
{
rewrite_server_conf *sconf;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
sconf->rewriteloglevel = atoi(a1);
return NULL;
}
static const char *cmd_rewritemap(cmd_parms *cmd, void *dconf, char *a1,
char *a2)
{
rewrite_server_conf *sconf;
rewritemap_entry *new;
struct stat st;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
new = ap_push_array(sconf->rewritemaps);
new->name = a1;
new->func = NULL;
if (strncmp(a2, "txt:", 4) == 0) {
new->type = MAPTYPE_TXT;
new->datafile = a2+4;
new->checkfile = a2+4;
}
else if (strncmp(a2, "rnd:", 4) == 0) {
new->type = MAPTYPE_RND;
new->datafile = a2+4;
new->checkfile = a2+4;
}
else if (strncmp(a2, "dbm:", 4) == 0) {
#ifndef NO_DBM_REWRITEMAP
new->type = MAPTYPE_DBM;
new->datafile = a2+4;
new->checkfile = ap_pstrcat(cmd->pool, a2+4, NDBM_FILE_SUFFIX, NULL);
#else
return ap_pstrdup(cmd->pool, "RewriteMap: cannot use NDBM mapfile, "
"because no NDBM support is compiled in");
#endif
}
else if (strncmp(a2, "prg:", 4) == 0) {
new->type = MAPTYPE_PRG;
new->datafile = a2+4;
new->checkfile = a2+4;
}
else if (strncmp(a2, "int:", 4) == 0) {
new->type = MAPTYPE_INT;
new->datafile = NULL;
new->checkfile = NULL;
if (strcmp(a2+4, "tolower") == 0) {
new->func = rewrite_mapfunc_tolower;
}
else if (strcmp(a2+4, "toupper") == 0) {
new->func = rewrite_mapfunc_toupper;
}
else if (strcmp(a2+4, "escape") == 0) {
new->func = rewrite_mapfunc_escape;
}
else if (strcmp(a2+4, "unescape") == 0) {
new->func = rewrite_mapfunc_unescape;
}
else if (sconf->state == ENGINE_ENABLED) {
return ap_pstrcat(cmd->pool, "RewriteMap: internal map not found:",
a2+4, NULL);
}
}
else {
new->type = MAPTYPE_TXT;
new->datafile = a2;
new->checkfile = a2;
}
new->fpin = -1;
new->fpout = -1;
if (new->checkfile && (sconf->state == ENGINE_ENABLED)
&& (stat(new->checkfile, &st) == -1)) {
return ap_pstrcat(cmd->pool,
"RewriteMap: map file or program not found:",
new->checkfile, NULL);
}
return NULL;
}
static const char *cmd_rewritelock(cmd_parms *cmd, void *dconf, char *a1)
{
const char *error;
if ((error = ap_check_cmd_context(cmd, GLOBAL_ONLY)) != NULL)
return error;
lockname = a1;
return NULL;
}
static const char *cmd_rewritebase(cmd_parms *cmd, rewrite_perdir_conf *dconf,
char *a1)
{
if (cmd->path == NULL || dconf == NULL) {
return "RewriteBase: only valid in per-directory config files";
}
if (a1[0] == '\0') {
return "RewriteBase: empty URL not allowed";
}
if (a1[0] != '/') {
return "RewriteBase: argument is not a valid URL";
}
dconf->baseurl = a1;
return NULL;
}
static const char *cmd_rewritecond(cmd_parms *cmd, rewrite_perdir_conf *dconf,
char *str)
{
rewrite_server_conf *sconf;
rewritecond_entry *new;
regex_t *regexp;
char *a1;
char *a2;
char *a3;
char *cp;
const char *err;
int rc;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
/* make a new entry in the internal temporary rewrite rule list */
if (cmd->path == NULL) { /* is server command */
new = ap_push_array(sconf->rewriteconds);
}
else { /* is per-directory command */
new = ap_push_array(dconf->rewriteconds);
}
/* parse the argument line ourself */
if (parseargline(str, &a1, &a2, &a3)) {
return ap_pstrcat(cmd->pool, "RewriteCond: bad argument line '", str,
"'\n", NULL);
}
/* arg1: the input string */
new->input = ap_pstrdup(cmd->pool, a1);
/* arg3: optional flags field
(this have to be first parsed, because we need to
know if the regex should be compiled with ICASE!) */
new->flags = CONDFLAG_NONE;
if (a3 != NULL) {
if ((err = cmd_rewritecond_parseflagfield(cmd->pool, new,
a3)) != NULL) {
return err;
}
}
/* arg2: the pattern
try to compile the regexp to test if is ok */
cp = a2;
if (cp[0] == '!') {
new->flags |= CONDFLAG_NOTMATCH;
cp++;
}
/* now be careful: Under the POSIX regex library
we can compile the pattern for case-insensitive matching,
under the old V8 library we have to do it self via a hack */
if (new->flags & CONDFLAG_NOCASE) {
rc = ((regexp = ap_pregcomp(cmd->pool, cp, REG_EXTENDED|REG_ICASE))
== NULL);
}
else {
rc = ((regexp = ap_pregcomp(cmd->pool, cp, REG_EXTENDED)) == NULL);
}
if (rc) {
return ap_pstrcat(cmd->pool,
"RewriteCond: cannot compile regular expression '",
a2, "'\n", NULL);
}
new->pattern = ap_pstrdup(cmd->pool, cp);
new->regexp = regexp;
return NULL;
}
static const char *cmd_rewritecond_parseflagfield(pool *p,
rewritecond_entry *cfg,
char *str)
{
char *cp;
char *cp1;
char *cp2;
char *cp3;
char *key;
char *val;
const char *err;
if (str[0] != '[' || str[strlen(str)-1] != ']') {
return "RewriteCond: bad flag delimiters";
}
cp = str+1;
str[strlen(str)-1] = ','; /* for simpler parsing */
for ( ; *cp != '\0'; ) {
/* skip whitespaces */
for ( ; (*cp == ' ' || *cp == '\t') && *cp != '\0'; cp++)
;
if (*cp == '\0') {
break;
}
cp1 = cp;
if ((cp2 = strchr(cp, ',')) != NULL) {
cp = cp2+1;
for ( ; (*(cp2-1) == ' ' || *(cp2-1) == '\t'); cp2--)
;
*cp2 = '\0';
if ((cp3 = strchr(cp1, '=')) != NULL) {
*cp3 = '\0';
key = cp1;
val = cp3+1;
}
else {
key = cp1;
val = "";
}
if ((err = cmd_rewritecond_setflag(p, cfg, key, val)) != NULL) {
return err;
}
}
else {
break;
}
}
return NULL;
}
static const char *cmd_rewritecond_setflag(pool *p, rewritecond_entry *cfg,
char *key, char *val)
{
if ( strcasecmp(key, "nocase") == 0
|| strcasecmp(key, "NC") == 0 ) {
cfg->flags |= CONDFLAG_NOCASE;
}
else if ( strcasecmp(key, "ornext") == 0
|| strcasecmp(key, "OR") == 0 ) {
cfg->flags |= CONDFLAG_ORNEXT;
}
else {
return ap_pstrcat(p, "RewriteCond: unknown flag '", key, "'\n", NULL);
}
return NULL;
}
static const char *cmd_rewriterule(cmd_parms *cmd, rewrite_perdir_conf *dconf,
char *str)
{
rewrite_server_conf *sconf;
rewriterule_entry *new;
regex_t *regexp;
char *a1;
char *a2;
char *a3;
char *cp;
const char *err;
int mode;
sconf = (rewrite_server_conf *)
ap_get_module_config(cmd->server->module_config, &rewrite_module);
/* make a new entry in the internal rewrite rule list */
if (cmd->path == NULL) { /* is server command */
new = ap_push_array(sconf->rewriterules);
}
else { /* is per-directory command */
new = ap_push_array(dconf->rewriterules);
}
/* parse the argument line ourself */
if (parseargline(str, &a1, &a2, &a3)) {
return ap_pstrcat(cmd->pool, "RewriteRule: bad argument line '", str,
"'\n", NULL);
}
/* arg3: optional flags field */
new->forced_mimetype = NULL;
new->forced_responsecode = HTTP_MOVED_TEMPORARILY;
new->flags = RULEFLAG_NONE;
new->env[0] = NULL;
new->skip = 0;
if (a3 != NULL) {
if ((err = cmd_rewriterule_parseflagfield(cmd->pool, new,
a3)) != NULL) {
return err;
}
}
/* arg1: the pattern
* try to compile the regexp to test if is ok
*/
cp = a1;
if (cp[0] == '!') {
new->flags |= RULEFLAG_NOTMATCH;
cp++;
}
mode = REG_EXTENDED;
if (new->flags & RULEFLAG_NOCASE) {
mode |= REG_ICASE;
}
if ((regexp = ap_pregcomp(cmd->pool, cp, mode)) == NULL) {
return ap_pstrcat(cmd->pool,
"RewriteRule: cannot compile regular expression '",
a1, "'\n", NULL);
}
new->pattern = ap_pstrdup(cmd->pool, cp);
new->regexp = regexp;
/* arg2: the output string
* replace the $<N> by \<n> which is needed by the currently
* used Regular Expression library
*/
new->output = ap_pstrdup(cmd->pool, a2);
/* now, if the server or per-dir config holds an
* array of RewriteCond entries, we take it for us
* and clear the array
*/
if (cmd->path == NULL) { /* is server command */
new->rewriteconds = sconf->rewriteconds;
sconf->rewriteconds = ap_make_array(cmd->pool, 2,
sizeof(rewritecond_entry));
}
else { /* is per-directory command */
new->rewriteconds = dconf->rewriteconds;
dconf->rewriteconds = ap_make_array(cmd->pool, 2,
sizeof(rewritecond_entry));
}
return NULL;
}
static const char *cmd_rewriterule_parseflagfield(pool *p,
rewriterule_entry *cfg,
char *str)
{
char *cp;
char *cp1;
char *cp2;
char *cp3;
char *key;
char *val;
const char *err;
if (str[0] != '[' || str[strlen(str)-1] != ']') {
return "RewriteRule: bad flag delimiters";
}
cp = str+1;
str[strlen(str)-1] = ','; /* for simpler parsing */
for ( ; *cp != '\0'; ) {
/* skip whitespaces */
for ( ; (*cp == ' ' || *cp == '\t') && *cp != '\0'; cp++)
;
if (*cp == '\0') {
break;
}
cp1 = cp;
if ((cp2 = strchr(cp, ',')) != NULL) {
cp = cp2+1;
for ( ; (*(cp2-1) == ' ' || *(cp2-1) == '\t'); cp2--)
;
*cp2 = '\0';
if ((cp3 = strchr(cp1, '=')) != NULL) {
*cp3 = '\0';
key = cp1;
val = cp3+1;
}
else {
key = cp1;
val = "";
}
if ((err = cmd_rewriterule_setflag(p, cfg, key, val)) != NULL) {
return err;
}
}
else {
break;
}
}
return NULL;
}
static const char *cmd_rewriterule_setflag(pool *p, rewriterule_entry *cfg,
char *key, char *val)
{
int status = 0;
int i;
if ( strcasecmp(key, "redirect") == 0
|| strcasecmp(key, "R") == 0 ) {
cfg->flags |= RULEFLAG_FORCEREDIRECT;
if (strlen(val) > 0) {
if (strcasecmp(val, "permanent") == 0) {
status = HTTP_MOVED_PERMANENTLY;
}
else if (strcasecmp(val, "temp") == 0) {
status = HTTP_MOVED_TEMPORARILY;
}
else if (strcasecmp(val, "seeother") == 0) {
status = HTTP_SEE_OTHER;
}
else if (ap_isdigit(*val)) {
status = atoi(val);
}
if (!ap_is_HTTP_REDIRECT(status)) {
return "RewriteRule: invalid HTTP response code "
"for flag 'R'";
}
cfg->forced_responsecode = status;
}
}
else if ( strcasecmp(key, "last") == 0
|| strcasecmp(key, "L") == 0 ) {
cfg->flags |= RULEFLAG_LASTRULE;
}
else if ( strcasecmp(key, "next") == 0
|| strcasecmp(key, "N") == 0 ) {
cfg->flags |= RULEFLAG_NEWROUND;
}
else if ( strcasecmp(key, "chain") == 0
|| strcasecmp(key, "C") == 0 ) {
cfg->flags |= RULEFLAG_CHAIN;
}
else if ( strcasecmp(key, "type") == 0
|| strcasecmp(key, "T") == 0 ) {
cfg->forced_mimetype = ap_pstrdup(p, val);
ap_str_tolower(cfg->forced_mimetype);
}
else if ( strcasecmp(key, "env") == 0
|| strcasecmp(key, "E") == 0 ) {
for (i = 0; (cfg->env[i] != NULL) && (i < MAX_ENV_FLAGS); i++)
;
if (i < MAX_ENV_FLAGS) {
cfg->env[i] = ap_pstrdup(p, val);
cfg->env[i+1] = NULL;
}
else {
return "RewriteRule: too many environment flags 'E'";
}
}
else if ( strcasecmp(key, "nosubreq") == 0
|| strcasecmp(key, "NS") == 0 ) {
cfg->flags |= RULEFLAG_IGNOREONSUBREQ;
}
else if ( strcasecmp(key, "proxy") == 0
|| strcasecmp(key, "P") == 0 ) {
cfg->flags |= RULEFLAG_PROXY;
}
else if ( strcasecmp(key, "passthrough") == 0
|| strcasecmp(key, "PT") == 0 ) {
cfg->flags |= RULEFLAG_PASSTHROUGH;
}
else if ( strcasecmp(key, "skip") == 0
|| strcasecmp(key, "S") == 0 ) {
cfg->skip = atoi(val);
}
else if ( strcasecmp(key, "forbidden") == 0
|| strcasecmp(key, "F") == 0 ) {
cfg->flags |= RULEFLAG_FORBIDDEN;
}
else if ( strcasecmp(key, "gone") == 0
|| strcasecmp(key, "G") == 0 ) {
cfg->flags |= RULEFLAG_GONE;
}
else if ( strcasecmp(key, "qsappend") == 0
|| strcasecmp(key, "QSA") == 0 ) {
cfg->flags |= RULEFLAG_QSAPPEND;
}
else if ( strcasecmp(key, "nocase") == 0
|| strcasecmp(key, "NC") == 0 ) {
cfg->flags |= RULEFLAG_NOCASE;
}
else {
return ap_pstrcat(p, "RewriteRule: unknown flag '", key, "'\n", NULL);
}
return NULL;
}
/*
**
** Global Module Initialization
** [called from read_config() after all
** config commands were already called]
**
*/
static void init_module(server_rec *s, pool *p)
{
/* check if proxy module is available */
proxy_available = (ap_find_linked_module("mod_proxy.c") != NULL);
/* create the rewriting lockfile in the parent */
rewritelock_create(s, p);
ap_register_cleanup(p, (void *)s, rewritelock_remove, ap_null_cleanup);
/* step through the servers and
* - open each rewriting logfile
* - open the RewriteMap prg:xxx programs
*/
for (; s; s = s->next) {
open_rewritelog(s, p);
run_rewritemap_programs(s, p);
}
}
/*
**
** Per-Child Module Initialization
** [called after a child process is spawned]
**
*/
static void init_child(server_rec *s, pool *p)
{
/* open the rewriting lockfile */
rewritelock_open(s, p);
/* create the lookup cache */
cachep = init_cache(p);
}
/*
** +-------------------------------------------------------+
** | |
** | runtime hooks
** | |
** +-------------------------------------------------------+
*/
/*
**
** URI-to-filename hook
**
** [used for the rewriting engine triggered by
** the per-server 'RewriteRule' directives]
**
*/
static int hook_uri2file(request_rec *r)
{
void *sconf;
rewrite_server_conf *conf;
const char *var;
const char *thisserver;
char *thisport;
const char *thisurl;
char buf[512];
char docroot[512];
char *cp, *cp2;
const char *ccp;
struct stat finfo;
unsigned int port;
int n;
int l;
/*
* retrieve the config structures
*/
sconf = r->server->module_config;
conf = (rewrite_server_conf *)ap_get_module_config(sconf,
&rewrite_module);
/*
* only do something under runtime if the engine is really enabled,
* else return immediately!
*/
if (conf->state == ENGINE_DISABLED) {
return DECLINED;
}
/*
* check for the ugly API case of a virtual host section where no
* mod_rewrite directives exists. In this situation we became no chance
* by the API to setup our default per-server config so we have to
* on-the-fly assume we have the default config. But because the default
* config has a disabled rewriting engine we are lucky because can
* just stop operating now.
*/
if (conf->server != r->server) {
return DECLINED;
}
/*
* add the SCRIPT_URL variable to the env. this is a bit complicated
* due to the fact that apache uses subrequests and internal redirects
*/
if (r->main == NULL) {
var = ap_pstrcat(r->pool, "REDIRECT_", ENVVAR_SCRIPT_URL, NULL);
var = ap_table_get(r->subprocess_env, var);
if (var == NULL) {
ap_table_setn(r->subprocess_env, ENVVAR_SCRIPT_URL, r->uri);
}
else {
ap_table_setn(r->subprocess_env, ENVVAR_SCRIPT_URL, var);
}
}
else {
var = ap_table_get(r->main->subprocess_env, ENVVAR_SCRIPT_URL);
ap_table_setn(r->subprocess_env, ENVVAR_SCRIPT_URL, var);
}
/*
* create the SCRIPT_URI variable for the env
*/
/* add the canonical URI of this URL */
thisserver = ap_get_server_name(r);
port = ap_get_server_port(r);
if (ap_is_default_port(port, r)) {
thisport = "";
}
else {
ap_snprintf(buf, sizeof(buf), ":%u", port);
thisport = buf;
}
thisurl = ap_table_get(r->subprocess_env, ENVVAR_SCRIPT_URL);
/* set the variable */
var = ap_pstrcat(r->pool, ap_http_method(r), "://", thisserver, thisport,
thisurl, NULL);
ap_table_setn(r->subprocess_env, ENVVAR_SCRIPT_URI, var);
/* if filename was not initially set,
* we start with the requested URI
*/
if (r->filename == NULL) {
r->filename = ap_pstrdup(r->pool, r->uri);
rewritelog(r, 2, "init rewrite engine with requested uri %s",
r->filename);
}
/*
* now apply the rules ...
*/
if (apply_rewrite_list(r, conf->rewriterules, NULL)) {
if (strlen(r->filename) > 6 &&
strncmp(r->filename, "proxy:", 6) == 0) {
/* it should be go on as an internal proxy request */
/* check if the proxy module is enabled, so
* we can actually use it!
*/
if (!proxy_available) {
ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
"attempt to make remote request from mod_rewrite "
"without proxy enabled: %s", r->filename);
return FORBIDDEN;
}
/* make sure the QUERY_STRING and
* PATH_INFO parts get incorporated
*/
if (r->path_info != NULL) {
r->filename = ap_pstrcat(r->pool, r->filename,
r->path_info, NULL);
}
if (r->args != NULL &&
r->uri == r->unparsed_uri) {
/* see proxy_http:proxy_http_canon() */
r->filename = ap_pstrcat(r->pool, r->filename,
"?", r->args, NULL);
}
/* now make sure the request gets handled by the proxy handler */
r->proxyreq = 1;
r->handler = "proxy-server";
rewritelog(r, 1, "go-ahead with proxy request %s [OK]",
r->filename);
return OK;
}
else if ( (strlen(r->filename) > 7 &&
strncasecmp(r->filename, "http://", 7) == 0)
|| (strlen(r->filename) > 8 &&
strncasecmp(r->filename, "https://", 8) == 0)
|| (strlen(r->filename) > 9 &&
strncasecmp(r->filename, "gopher://", 9) == 0)
|| (strlen(r->filename) > 6 &&
strncasecmp(r->filename, "ftp://", 6) == 0) ) {
/* it was finally rewritten to a remote URL */
/* skip 'scheme:' */
for (cp = r->filename; *cp != ':' && *cp != '\0'; cp++)
;
/* skip '://' */
cp += 3;
/* skip host part */
for ( ; *cp != '/' && *cp != '\0'; cp++)
;
if (*cp != '\0') {
rewritelog(r, 1, "escaping %s for redirect", r->filename);
cp2 = ap_escape_uri(r->pool, cp);
*cp = '\0';
r->filename = ap_pstrcat(r->pool, r->filename, cp2, NULL);
}
/* append the QUERY_STRING part */
if (r->args != NULL) {
r->filename = ap_pstrcat(r->pool, r->filename,
"?", r->args, NULL);
}
/* determine HTTP redirect response code */
if (ap_is_HTTP_REDIRECT(r->status)) {
n = r->status;
r->status = HTTP_OK; /* make Apache kernel happy */
}
else {
n = REDIRECT;
}
/* now do the redirection */
ap_table_setn(r->headers_out, "Location", r->filename);
rewritelog(r, 1, "redirect to %s [REDIRECT/%d]", r->filename, n);
return n;
}
else if (strlen(r->filename) > 10 &&
strncmp(r->filename, "forbidden:", 10) == 0) {
/* This URLs is forced to be forbidden for the requester */
return FORBIDDEN;
}
else if (strlen(r->filename) > 5 &&
strncmp(r->filename, "gone:", 5) == 0) {
/* This URLs is forced to be gone */
return HTTP_GONE;
}
else if (strlen(r->filename) > 12 &&
strncmp(r->filename, "passthrough:", 12) == 0) {
/*
* Hack because of underpowered API: passing the current
* rewritten filename through to other URL-to-filename handlers
* just as it were the requested URL. This is to enable
* post-processing by mod_alias, etc. which always act on
* r->uri! The difference here is: We do not try to
* add the document root
*/
r->uri = ap_pstrdup(r->pool, r->filename+12);
return DECLINED;
}
else {
/* it was finally rewritten to a local path */
/* expand "/~user" prefix */
#ifndef WIN32
r->filename = expand_tildepaths(r, r->filename);
#endif
rewritelog(r, 2, "local path result: %s", r->filename);
/* the filename has to start with a slash! */
if (r->filename[0] != '/') {
return BAD_REQUEST;
}
/* if there is no valid prefix, we have
* to emulate the translator from the core and
* prefix the filename with document_root
*
* NOTICE:
* We cannot leave out the prefix_stat because
* - when we always prefix with document_root
* then no absolute path can be created, e.g. via
* emulating a ScriptAlias directive, etc.
* - when we always NOT prefix with document_root
* then the files under document_root have to
* be references directly and document_root
* gets never used and will be a dummy parameter -
* this is also bad
*
* BUT:
* Under real Unix systems this is no problem,
* because we only do stat() on the first directory
* and this gets cached by the kernel for along time!
*/
n = prefix_stat(r->filename, &finfo);
if (n == 0) {
if ((ccp = ap_document_root(r)) != NULL) {
l = ap_cpystrn(docroot, ccp, sizeof(docroot)) - docroot;
/* always NOT have a trailing slash */
if (docroot[l-1] == '/') {
docroot[l-1] = '\0';
}
if (r->server->path
&& !strncmp(r->filename, r->server->path,
r->server->pathlen)) {
r->filename = ap_pstrcat(r->pool, docroot,
(r->filename +
r->server->pathlen), NULL);
}
else {
r->filename = ap_pstrcat(r->pool, docroot,
r->filename, NULL);
}
rewritelog(r, 2, "prefixed with document_root to %s",
r->filename);
}
}
rewritelog(r, 1, "go-ahead with %s [OK]", r->filename);
return OK;
}
}
else {
rewritelog(r, 1, "pass through %s", r->filename);
return DECLINED;
}
}
/*
**
** MIME-type hook
**
** [used to support the forced-MIME-type feature]
**
*/
static int hook_mimetype(request_rec *r)
{
const char *t;
/* now check if we have to force a MIME-type */
t = ap_table_get(r->notes, REWRITE_FORCED_MIMETYPE_NOTEVAR);
if (t == NULL) {
return DECLINED;
}
else {
rewritelog(r, 1, "force filename %s to have MIME-type '%s'",
r->filename, t);
r->content_type = t;
return OK;
}
}
/*
**
** Fixup hook
**
** [used for the rewriting engine triggered by
** the per-directory 'RewriteRule' directives]
**
*/
static int hook_fixup(request_rec *r)
{
rewrite_perdir_conf *dconf;
char *cp;
char *cp2;
const char *ccp;
char *prefix;
int l;
int n;
char *ofilename;
dconf = (rewrite_perdir_conf *)ap_get_module_config(r->per_dir_config,
&rewrite_module);
/* if there is no per-dir config we return immediately */
if (dconf == NULL) {
return DECLINED;
}
/* we shouldn't do anything in subrequests */
if (r->main != NULL) {
return DECLINED;
}
/* if there are no real (i.e. no RewriteRule directives!)
per-dir config of us, we return also immediately */
if (dconf->directory == NULL) {
return DECLINED;
}
/*
* only do something under runtime if the engine is really enabled,
* for this directory, else return immediately!
*/
if (!(ap_allow_options(r) & (OPT_SYM_LINKS | OPT_SYM_OWNER))) {
/* FollowSymLinks is mandatory! */
ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r,
"Options FollowSymLinks or SymLinksIfOwnerMatch is off "
"which implies that RewriteRule directive is forbidden: "
"%s", r->filename);
return FORBIDDEN;
}
else {
/* FollowSymLinks is given, but the user can
* still turn off the rewriting engine
*/
if (dconf->state == ENGINE_DISABLED) {
return DECLINED;
}
}
/*
* remember the current filename before rewriting for later check
* to prevent deadlooping because of internal redirects
* on final URL/filename which can be equal to the inital one.
*/
ofilename = r->filename;
/*
* now apply the rules ...
*/
if (apply_rewrite_list(r, dconf->rewriterules, dconf->directory)) {
if (strlen(r->filename) > 6 &&
strncmp(r->filename, "proxy:", 6) == 0) {
/* it should go on as an internal proxy request */
/* make sure the QUERY_STRING and
* PATH_INFO parts get incorporated
* (r->path_info was already appended by the
* rewriting engine because of the per-dir context!)
*/
if (r->args != NULL
&& r->uri == r->unparsed_uri) {
/* see proxy_http:proxy_http_canon() */
r->filename = ap_pstrcat(r->pool, r->filename,
"?", r->args, NULL);
}
/* now make sure the request gets handled by the proxy handler */
r->proxyreq = 1;
r->handler = "proxy-server";
rewritelog(r, 1, "[per-dir %s] go-ahead with proxy request "
"%s [OK]", dconf->directory, r->filename);
return OK;
}
else if ( (strlen(r->filename) > 7 &&
strncmp(r->filename, "http://", 7) == 0)
|| (strlen(r->filename) > 8 &&
strncmp(r->filename, "https://", 8) == 0)
|| (strlen(r->filename) > 9 &&
strncmp(r->filename, "gopher://", 9) == 0)
|| (strlen(r->filename) > 6 &&
strncmp(r->filename, "ftp://", 6) == 0) ) {
/* it was finally rewritten to a remote URL */
/* because we are in a per-dir context
* first try to replace the directory with its base-URL
* if there is a base-URL available
*/
if (dconf->baseurl != NULL) {
/* skip 'scheme:' */
for (cp = r->filename; *cp != ':' && *cp != '\0'; cp++)
;
/* skip '://' */
cp += 3;
if ((cp = strchr(cp, '/')) != NULL) {
rewritelog(r, 2,
"[per-dir %s] trying to replace "
"prefix %s with %s",
dconf->directory, dconf->directory,
dconf->baseurl);
cp2 = subst_prefix_path(r, cp, dconf->directory,
dconf->baseurl);
if (strcmp(cp2, cp) != 0) {
*cp = '\0';
r->filename = ap_pstrcat(r->pool, r->filename,
cp2, NULL);
}
}
}
/* now prepare the redirect... */
/* skip 'scheme:' */
for (cp = r->filename; *cp != ':' && *cp != '\0'; cp++)
;
/* skip '://' */
cp += 3;
/* skip host part */
for ( ; *cp != '/' && *cp != '\0'; cp++)
;
if (*cp != '\0') {
rewritelog(r, 1, "[per-dir %s] escaping %s for redirect",
dconf->directory, r->filename);
cp2 = ap_escape_uri(r->pool, cp);
*cp = '\0';
r->filename = ap_pstrcat(r->pool, r->filename, cp2, NULL);
}
/* append the QUERY_STRING part */
if (r->args != NULL) {
r->filename = ap_pstrcat(r->pool, r->filename,
"?", r->args, NULL);
}
/* determine HTTP redirect response code */
if (ap_is_HTTP_REDIRECT(r->status)) {
n = r->status;
r->status = HTTP_OK; /* make Apache kernel happy */
}
else {
n = REDIRECT;
}
/* now do the redirection */
ap_table_setn(r->headers_out, "Location", r->filename);
rewritelog(r, 1, "[per-dir %s] redirect to %s [REDIRECT/%d]",
dconf->directory, r->filename, n);
return n;
}
else if (strlen(r->filename) > 10 &&
strncmp(r->filename, "forbidden:", 10) == 0) {
/* This URL is forced to be forbidden for the requester */
return FORBIDDEN;
}
else if (strlen(r->filename) > 5 &&
strncmp(r->filename, "gone:", 5) == 0) {
/* This URL is forced to be gone */
return HTTP_GONE;
}
else {
/* it was finally rewritten to a local path */
/* if someone used the PASSTHROUGH flag in per-dir
* context we just ignore it. It is only useful
* in per-server context
*/
if (strlen(r->filename) > 12 &&
strncmp(r->filename, "passthrough:", 12) == 0) {
r->filename = ap_pstrdup(r->pool, r->filename+12);
}
/* the filename has to start with a slash! */
if (r->filename[0] != '/') {
return BAD_REQUEST;
}
/* Check for deadlooping:
* At this point we KNOW that at least one rewriting
* rule was applied, but when the resulting URL is
* the same as the initial URL, we are not allowed to
* use the following internal redirection stuff because
* this would lead to a deadloop.
*/
if (strcmp(r->filename, ofilename) == 0) {
rewritelog(r, 1, "[per-dir %s] initial URL equal rewritten "
"URL: %s [IGNORING REWRITE]",
dconf->directory, r->filename);
return OK;
}
/* if there is a valid base-URL then substitute
* the per-dir prefix with this base-URL if the
* current filename still is inside this per-dir
* context. If not then treat the result as a
* plain URL
*/
if (dconf->baseurl != NULL) {
rewritelog(r, 2,
"[per-dir %s] trying to replace prefix %s with %s",
dconf->directory, dconf->directory, dconf->baseurl);
r->filename = subst_prefix_path(r, r->filename,
dconf->directory,
dconf->baseurl);
}
else {
/* if no explicit base-URL exists we assume
* that the directory prefix is also a valid URL
* for this webserver and only try to remove the
* document_root if it is prefix
*/
if ((ccp = ap_document_root(r)) != NULL) {
prefix = ap_pstrdup(r->pool, ccp);
/* always NOT have a trailing slash */
l = strlen(prefix);
if (prefix[l-1] == '/') {
prefix[l-1] = '\0';
l--;
}
if (strncmp(r->filename, prefix, l) == 0) {
rewritelog(r, 2,
"[per-dir %s] strip document_root "
"prefix: %s -> %s",
dconf->directory, r->filename,
r->filename+l);
r->filename = ap_pstrdup(r->pool, r->filename+l);
}
}
}
/* now initiate the internal redirect */
rewritelog(r, 1, "[per-dir %s] internal redirect with %s "
"[INTERNAL REDIRECT]", dconf->directory, r->filename);
r->filename = ap_pstrcat(r->pool, "redirect:", r->filename, NULL);
r->handler = "redirect-handler";
return OK;
}
}
else {
rewritelog(r, 1, "[per-dir %s] pass through %s",
dconf->directory, r->filename);
return DECLINED;
}
}
/*
**
** Content-Handlers
**
** [used for redirect support]
**
*/
static int handler_redirect(request_rec *r)
{
/* just make sure that we are really meant! */
if (strncmp(r->filename, "redirect:", 9) != 0) {
return DECLINED;
}
/* now do the internal redirect */
ap_internal_redirect(ap_pstrcat(r->pool, r->filename+9,
r->args ? "?" : NULL, r->args, NULL), r);
/* and return gracefully */
return OK;
}
/*
** +-------------------------------------------------------+
** | |
** | the rewriting engine
** | |
** +-------------------------------------------------------+
*/
/*
* Apply a complete rule set,
* i.e. a list of rewrite rules
*/
static int apply_rewrite_list(request_rec *r, array_header *rewriterules,
char *perdir)
{
rewriterule_entry *entries;
rewriterule_entry *p;
int i;
int changed;
int rc;
int s;
/*
* Iterate over all existing rules
*/
entries = (rewriterule_entry *)rewriterules->elts;
changed = 0;
loop:
for (i = 0; i < rewriterules->nelts; i++) {
p = &entries[i];
/*
* Ignore this rule on subrequests if we are explicitly
* asked to do so or this is a proxy-throughput or a
* forced redirect rule.
*/
if (r->main != NULL &&
(p->flags & RULEFLAG_IGNOREONSUBREQ ||
p->flags & RULEFLAG_PROXY ||
p->flags & RULEFLAG_FORCEREDIRECT )) {
continue;
}
/*
* Apply the current rule.
*/
rc = apply_rewrite_rule(r, p, perdir);
if (rc) {
/*
* Indicate a change if this was not a match-only rule.
*/
if (rc != 2) {
changed = 1;
}
/*
* Pass-Through Feature (`RewriteRule .. .. [PT]'):
* Because the Apache 1.x API is very limited we
* need this hack to pass the rewritten URL to other
* modules like mod_alias, mod_userdir, etc.
*/
if (p->flags & RULEFLAG_PASSTHROUGH) {
rewritelog(r, 2, "forcing '%s' to get passed through "
"to next API URI-to-filename handler", r->filename);
r->filename = ap_pstrcat(r->pool, "passthrough:",
r->filename, NULL);
changed = 1;
break;
}
/*
* Rule has the "forbidden" flag set which means that
* we stop processing and indicate this to the caller.
*/
if (p->flags & RULEFLAG_FORBIDDEN) {
rewritelog(r, 2, "forcing '%s' to be forbidden", r->filename);
r->filename = ap_pstrcat(r->pool, "forbidden:",
r->filename, NULL);
changed = 1;
break;
}
/*
* Rule has the "gone" flag set which means that
* we stop processing and indicate this to the caller.
*/
if (p->flags & RULEFLAG_GONE) {
rewritelog(r, 2, "forcing '%s' to be gone", r->filename);
r->filename = ap_pstrcat(r->pool, "gone:", r->filename, NULL);
changed = 1;
break;
}
/*
* Stop processing also on proxy pass-through and
* last-rule and new-round flags.
*/
if (p->flags & RULEFLAG_PROXY) {
break;
}
if (p->flags & RULEFLAG_LASTRULE) {
break;
}
/*
* On "new-round" flag we just start from the top of
* the rewriting ruleset again.
*/
if (p->flags & RULEFLAG_NEWROUND) {
goto loop;
}
/*
* If we are forced to skip N next rules, do it now.
*/
if (p->skip > 0) {
s = p->skip;
while ( i < rewriterules->nelts
&& s > 0) {
i++;
p = &entries[i];
s--;
}
}
}
else {
/*
* If current rule is chained with next rule(s),
* skip all this next rule(s)
*/
while ( i < rewriterules->nelts
&& p->flags & RULEFLAG_CHAIN) {
i++;
p = &entries[i];
}
}
}
return changed;
}
/*
* Apply a single(!) rewrite rule
*/
static int apply_rewrite_rule(request_rec *r, rewriterule_entry *p,
char *perdir)
{
char *uri;
char *output;
const char *vary;
char newuri[MAX_STRING_LEN];
char env[MAX_STRING_LEN];
regex_t *regexp;
regmatch_t regmatch[MAX_NMATCH];
backrefinfo *briRR = NULL;
backrefinfo *briRC = NULL;
int prefixstrip;
int failed;
array_header *rewriteconds;
rewritecond_entry *conds;
rewritecond_entry *c;
int i;
int rc;
/*
* Initialisation
*/
uri = r->filename;
regexp = p->regexp;
output = p->output;
/*
* Add (perhaps splitted away) PATH_INFO postfix to URL to
* make sure we really match against the complete URL.
*/
if (perdir != NULL && r->path_info != NULL && r->path_info[0] != '\0') {
rewritelog(r, 3, "[per-dir %s] add path-info postfix: %s -> %s%s",
perdir, uri, uri, r->path_info);
uri = ap_pstrcat(r->pool, uri, r->path_info, NULL);
}
/*
* On per-directory context (.htaccess) strip the location
* prefix from the URL to make sure patterns apply only to
* the local part. Additionally indicate this special
* threatment in the logfile.
*/
prefixstrip = 0;
if (perdir != NULL) {
if ( strlen(uri) >= strlen(perdir)
&& strncmp(uri, perdir, strlen(perdir)) == 0) {
rewritelog(r, 3, "[per-dir %s] strip per-dir prefix: %s -> %s",
perdir, uri, uri+strlen(perdir));
uri = uri+strlen(perdir);
prefixstrip = 1;
}
}
/*
* Try to match the URI against the RewriteRule pattern
* and exit immeddiately if it didn't apply.
*/
if (perdir == NULL) {
rewritelog(r, 3, "applying pattern '%s' to uri '%s'",
p->pattern, uri);
}
else {
rewritelog(r, 3, "[per-dir %s] applying pattern '%s' to uri '%s'",
perdir, p->pattern, uri);
}
rc = (ap_regexec(regexp, uri, regexp->re_nsub+1, regmatch, 0) == 0);
if (! (( rc && !(p->flags & RULEFLAG_NOTMATCH)) ||
(!rc && (p->flags & RULEFLAG_NOTMATCH)) ) ) {
return 0;
}
/*
* Else create the RewriteRule `regsubinfo' structure which
* holds the substitution information.
*/
briRR = (backrefinfo *)ap_palloc(r->pool, sizeof(backrefinfo));
if (!rc && (p->flags & RULEFLAG_NOTMATCH)) {
/* empty info on negative patterns */
briRR->source = "";
briRR->nsub = 0;
}
else {
briRR->source = ap_pstrdup(r->pool, uri);
briRR->nsub = regexp->re_nsub;
memcpy((void *)(briRR->regmatch), (void *)(regmatch),
sizeof(regmatch));
}
/*
* Initiallally create the RewriteCond backrefinfo with
* empty backrefinfo, i.e. not subst parts
* (this one is adjusted inside apply_rewrite_cond() later!!)
*/
briRC = (backrefinfo *)ap_pcalloc(r->pool, sizeof(backrefinfo));
briRC->source = "";
briRC->nsub = 0;
/*
* Ok, we already know the pattern has matched, but we now
* additionally have to check for all existing preconditions
* (RewriteCond) which have to be also true. We do this at
* this very late stage to avoid unnessesary checks which
* would slow down the rewriting engine!!
*/
rewriteconds = p->rewriteconds;
conds = (rewritecond_entry *)rewriteconds->elts;
failed = 0;
for (i = 0; i < rewriteconds->nelts; i++) {
c = &conds[i];
rc = apply_rewrite_cond(r, c, perdir, briRR, briRC);
if (c->flags & CONDFLAG_ORNEXT) {
/*
* The "OR" case
*/
if (rc == 0) {
/* One condition is false, but another can be
* still true, so we have to continue...
*/
ap_table_unset(r->notes, VARY_KEY_THIS);
continue;
}
else {
/* One true condition is enough in "or" case, so
* skip the other conditions which are "ornext"
* chained
*/
while ( i < rewriteconds->nelts
&& c->flags & CONDFLAG_ORNEXT) {
i++;
c = &conds[i];
}
continue;
}
}
else {
/*
* The "AND" case, i.e. no "or" flag,
* so a single failure means total failure.
*/
if (rc == 0) {
failed = 1;
break;
}
}
vary = ap_table_get(r->notes, VARY_KEY_THIS);
if (vary != NULL) {
ap_table_merge(r->notes, VARY_KEY, vary);
ap_table_unset(r->notes, VARY_KEY_THIS);
}
}
/* if any condition fails the complete rule fails */
if (failed) {
ap_table_unset(r->notes, VARY_KEY);
ap_table_unset(r->notes, VARY_KEY_THIS);
return 0;
}
/*
* Regardless of what we do next, we've found a match. Check to see
* if any of the request header fields were involved, and add them
* to the Vary field of the response.
*/
if ((vary = ap_table_get(r->notes, VARY_KEY)) != NULL) {
ap_table_merge(r->headers_out, "Vary", vary);
ap_table_unset(r->notes, VARY_KEY);
}
/*
* If this is a pure matching rule (`RewriteRule <pat> -')
* we stop processing and return immediately. The only thing
* we have not to forget are the environment variables
* (`RewriteRule <pat> - [E=...]')
*/
if (strcmp(output, "-") == 0) {
for (i = 0; p->env[i] != NULL; i++) {
/* 1. take the string */
ap_cpystrn(env, p->env[i], sizeof(env));
/* 2. expand $N (i.e. backrefs to RewriteRule pattern) */
expand_backref_inbuffer(r->pool, env, sizeof(env), briRR, '$');
/* 3. expand %N (i.e. backrefs to latest RewriteCond pattern) */
expand_backref_inbuffer(r->pool, env, sizeof(env), briRC, '%');
/* 4. expand %{...} (i.e. variables) */
expand_variables_inbuffer(r, env, sizeof(env));
/* 5. expand ${...} (RewriteMap lookups) */
expand_map_lookups(r, env, sizeof(env));
/* and add the variable to Apache's structures */
add_env_variable(r, env);
}
if (p->forced_mimetype != NULL) {
if (perdir == NULL) {
/* In the per-server context we can force the MIME-type
* the correct way by notifying our MIME-type hook handler
* to do the job when the MIME-type API stage is reached.
*/
rewritelog(r, 2, "remember %s to have MIME-type '%s'",
r->filename, p->forced_mimetype);
ap_table_setn(r->notes, REWRITE_FORCED_MIMETYPE_NOTEVAR,
p->forced_mimetype);
}
else {
/* In per-directory context we operate in the Fixup API hook
* which is after the MIME-type hook, so our MIME-type handler
* has no chance to set r->content_type. And because we are
* in the situation where no substitution takes place no
* sub-request will happen (which could solve the
* restriction). As a workaround we do it ourself now
* immediately although this is not strictly API-conforming.
* But it's the only chance we have...
*/
rewritelog(r, 1, "[per-dir %s] force %s to have MIME-type "
"'%s'", perdir, r->filename, p->forced_mimetype);
r->content_type = p->forced_mimetype;
}
}
return 2;
}
/*
* Ok, now we finally know all patterns have matched and
* that there is something to replace, so we create the
* substitution URL string in `newuri'.
*/
/* 1. take the output string */
ap_cpystrn(newuri, output, sizeof(newuri));
/* 2. expand $N (i.e. backrefs to RewriteRule pattern) */
expand_backref_inbuffer(r->pool, newuri, sizeof(newuri), briRR, '$');
/* 3. expand %N (i.e. backrefs to latest RewriteCond pattern) */
expand_backref_inbuffer(r->pool, newuri, sizeof(newuri), briRC, '%');
/* 4. expand %{...} (i.e. variables) */
expand_variables_inbuffer(r, newuri, sizeof(newuri));
/* 5. expand ${...} (RewriteMap lookups) */
expand_map_lookups(r, newuri, sizeof(newuri));
/* and log the result... */
if (perdir == NULL) {
rewritelog(r, 2, "rewrite %s -> %s", uri, newuri);
}
else {
rewritelog(r, 2, "[per-dir %s] rewrite %s -> %s", perdir, uri, newuri);
}
/*
* Additionally do expansion for the environment variable
* strings (`RewriteRule .. .. [E=<string>]').
*/
for (i = 0; p->env[i] != NULL; i++) {
/* 1. take the string */
ap_cpystrn(env, p->env[i], sizeof(env));
/* 2. expand $N (i.e. backrefs to RewriteRule pattern) */
expand_backref_inbuffer(r->pool, env, sizeof(env), briRR, '$');
/* 3. expand %N (i.e. backrefs to latest RewriteCond pattern) */
expand_backref_inbuffer(r->pool, env, sizeof(env), briRC, '%');
/* 4. expand %{...} (i.e. variables) */
expand_variables_inbuffer(r, env, sizeof(env));
/* 5. expand ${...} (RewriteMap lookups) */
expand_map_lookups(r, env, sizeof(env));
/* and add the variable to Apache's structures */
add_env_variable(r, env);
}
/*
* Now replace API's knowledge of the current URI:
* Replace r->filename with the new URI string and split out
* an on-the-fly generated QUERY_STRING part into r->args
*/
r->filename = ap_pstrdup(r->pool, newuri);
splitout_queryargs(r, p->flags & RULEFLAG_QSAPPEND);
/*
* Again add the previously stripped per-directory location
* prefix if the new URI is not a new one for this
* location, i.e. if it's not starting with either a slash
* or a fully qualified URL scheme.
*/
i = strlen(r->filename);
if ( prefixstrip
&& !( r->filename[0] == '/'
|| ( (i > 7 && strncasecmp(r->filename, "http://", 7) == 0)
|| (i > 8 && strncasecmp(r->filename, "https://", 8) == 0)
|| (i > 9 && strncasecmp(r->filename, "gopher://", 9) == 0)
|| (i > 6 && strncasecmp(r->filename, "ftp://", 6) == 0)))) {
rewritelog(r, 3, "[per-dir %s] add per-dir prefix: %s -> %s%s",
perdir, r->filename, perdir, r->filename);
r->filename = ap_pstrcat(r->pool, perdir, r->filename, NULL);
}
/*
* If this rule is forced for proxy throughput
* (`RewriteRule ... ... [P]') then emulate mod_proxy's
* URL-to-filename handler to be sure mod_proxy is triggered
* for this URL later in the Apache API. But make sure it is
* a fully-qualified URL. (If not it is qualified with
* ourself).
*/
if (p->flags & RULEFLAG_PROXY) {
fully_qualify_uri(r);
if (perdir == NULL) {
rewritelog(r, 2, "forcing proxy-throughput with %s", r->filename);
}
else {
rewritelog(r, 2, "[per-dir %s] forcing proxy-throughput with %s",
perdir, r->filename);
}
r->filename = ap_pstrcat(r->pool, "proxy:", r->filename, NULL);
return 1;
}
/*
* If this rule is explicitly forced for HTTP redirection
* (`RewriteRule .. .. [R]') then force an external HTTP
* redirect. But make sure it is a fully-qualified URL. (If
* not it is qualified with ourself).
*/
if (p->flags & RULEFLAG_FORCEREDIRECT) {
fully_qualify_uri(r);
if (perdir == NULL) {
rewritelog(r, 2,
"explicitly forcing redirect with %s", r->filename);
}
else {
rewritelog(r, 2,
"[per-dir %s] explicitly forcing redirect with %s",
perdir, r->filename);
}
r->status = p->forced_responsecode;
return 1;
}
/*
* Special Rewriting Feature: Self-Reduction
* We reduce the URL by stripping a possible
* http[s]://<ourhost>[:<port>] prefix, i.e. a prefix which
* corresponds to ourself. This is to simplify rewrite maps
* and to avoid recursion, etc. When this prefix is not a
* coincidence then the user has to use [R] explicitly (see
* above).
*/
reduce_uri(r);
/*
* If this rule is still implicitly forced for HTTP
* redirection (`RewriteRule .. <scheme>://...') then
* directly force an external HTTP redirect.
*/
i = strlen(r->filename);
if ( (i > 7 && strncasecmp(r->filename, "http://", 7) == 0)
|| (i > 8 && strncasecmp(r->filename, "https://", 8) == 0)
|| (i > 9 && strncasecmp(r->filename, "gopher://", 9) == 0)
|| (i > 6 && strncasecmp(r->filename, "ftp://", 6) == 0)) {
if (perdir == NULL) {
rewritelog(r, 2,
"implicitly forcing redirect (rc=%d) with %s",
p->forced_responsecode, r->filename);
}
else {
rewritelog(r, 2, "[per-dir %s] implicitly forcing redirect "
"(rc=%d) with %s", perdir, p->forced_responsecode,
r->filename);
}
r->status = p->forced_responsecode;
return 1;
}
/*
* Now we are sure it is not a fully qualified URL. But
* there is still one special case left: A local rewrite in
* per-directory context, i.e. a substitution URL which does
* not start with a slash. Here we add again the initially
* stripped per-directory prefix.
*/
if (prefixstrip && r->filename[0] != '/') {
rewritelog(r, 3, "[per-dir %s] add per-dir prefix: %s -> %s%s",
perdir, r->filename, perdir, r->filename);
r->filename = ap_pstrcat(r->pool, perdir, r->filename, NULL);
}
/*
* Finally we had to remember if a MIME-type should be
* forced for this URL (`RewriteRule .. .. [T=<type>]')
* Later in the API processing phase this is forced by our
* MIME API-hook function. This time its no problem even for
* the per-directory context (where the MIME-type hook was
* already processed) because a sub-request happens ;-)
*/
if (p->forced_mimetype != NULL) {
ap_table_setn(r->notes, REWRITE_FORCED_MIMETYPE_NOTEVAR,
p->forced_mimetype);
if (perdir == NULL) {
rewritelog(r, 2, "remember %s to have MIME-type '%s'",
r->filename, p->forced_mimetype);
}
else {
rewritelog(r, 2,
"[per-dir %s] remember %s to have MIME-type '%s'",
perdir, r->filename, p->forced_mimetype);
}
}
/*
* Puuhhhhhhhh... WHAT COMPLICATED STUFF ;_)
* But now we're done for this particular rule.
*/
return 1;
}
static int apply_rewrite_cond(request_rec *r, rewritecond_entry *p,
char *perdir, backrefinfo *briRR,
backrefinfo *briRC)
{
char input[MAX_STRING_LEN];
struct stat sb;
request_rec *rsub;
regmatch_t regmatch[MAX_NMATCH];
int rc;
/*
* Construct the string we match against
*/
/* 1. take the string */
ap_cpystrn(input, p->input, sizeof(input));
/* 2. expand $N (i.e. backrefs to RewriteRule pattern) */
expand_backref_inbuffer(r->pool, input, sizeof(input), briRR, '$');
/* 3. expand %N (i.e. backrefs to latest RewriteCond pattern) */
expand_backref_inbuffer(r->pool, input, sizeof(input), briRC, '%');
/* 4. expand %{...} (i.e. variables) */
expand_variables_inbuffer(r, input, sizeof(input));
/* 5. expand ${...} (RewriteMap lookups) */
expand_map_lookups(r, input, sizeof(input));
/*
* Apply the patterns
*/
rc = 0;
if (strcmp(p->pattern, "-f") == 0) {
if (stat(input, &sb) == 0) {
if (S_ISREG(sb.st_mode)) {
rc = 1;
}
}
}
else if (strcmp(p->pattern, "-s") == 0) {
if (stat(input, &sb) == 0) {
if (S_ISREG(sb.st_mode) && sb.st_size > 0) {
rc = 1;
}
}
}
else if (strcmp(p->pattern, "-l") == 0) {
#if !defined(OS2) && !defined(WIN32)
if (lstat(input, &sb) == 0) {
if (S_ISLNK(sb.st_mode)) {
rc = 1;
}
}
#endif
}
else if (strcmp(p->pattern, "-d") == 0) {
if (stat(input, &sb) == 0) {
if (S_ISDIR(sb.st_mode)) {
rc = 1;
}
}
}
else if (strcmp(p->pattern, "-U") == 0) {
/* avoid infinite subrequest recursion */
if (strlen(input) > 0 /* nonempty path, and */
&& ( r->main == NULL /* - either not in a subrequest */
|| ( r->main->uri != NULL /* - or in a subrequest... */
&& r->uri != NULL /* ...and URIs aren't NULL... */
/* ...and sub/main URIs differ */
&& strcmp(r->main->uri, r->uri) != 0) ) ) {
/* run a URI-based subrequest */
rsub = ap_sub_req_lookup_uri(input, r);
/* URI exists for any result up to 3xx, redirects allowed */
if (rsub->status < 400)
rc = 1;
/* log it */
rewritelog(r, 5, "RewriteCond URI (-U) check: "
"path=%s -> status=%d", input, rsub->status);
/* cleanup by destroying the subrequest */
ap_destroy_sub_req(rsub);
}
}
else if (strcmp(p->pattern, "-F") == 0) {
/* avoid infinite subrequest recursion */
if (strlen(input) > 0 /* nonempty path, and */
&& ( r->main == NULL /* - either not in a subrequest */
|| ( r->main->uri != NULL /* - or in a subrequest... */
&& r->uri != NULL /* ...and URIs aren't NULL... */
/* ...and sub/main URIs differ */
&& strcmp(r->main->uri, r->uri) != 0) ) ) {
/* process a file-based subrequest:
* this differs from -U in that no path translation is done.
*/
rsub = ap_sub_req_lookup_file(input, r);
/* file exists for any result up to 2xx, no redirects */
if (rsub->status < 300 &&
/* double-check that file exists since default result is 200 */
stat(rsub->filename, &sb) == 0) {
rc = 1;
}
/* log it */
rewritelog(r, 5, "RewriteCond file (-F) check: path=%s "
"-> file=%s status=%d", input, rsub->filename,
rsub->status);
/* cleanup by destroying the subrequest */
ap_destroy_sub_req(rsub);
}
}
else if (strlen(p->pattern) > 1 && *(p->pattern) == '>') {
rc = (compare_lexicography(input, p->pattern+1) == 1 ? 1 : 0);
}
else if (strlen(p->pattern) > 1 && *(p->pattern) == '<') {
rc = (compare_lexicography(input, p->pattern+1) == -1 ? 1 : 0);
}
else if (strlen(p->pattern) > 1 && *(p->pattern) == '=') {
if (strcmp(p->pattern+1, "\"\"") == 0) {
rc = (*input == '\0');
}
else {
rc = (strcmp(input, p->pattern+1) == 0 ? 1 : 0);
}
}
else {
/* it is really a regexp pattern, so apply it */
rc = (ap_regexec(p->regexp, input,
p->regexp->re_nsub+1, regmatch,0) == 0);
/* if it isn't a negated pattern and really matched
we update the passed-through regex subst info structure */
if (rc && !(p->flags & CONDFLAG_NOTMATCH)) {
briRC->source = ap_pstrdup(r->pool, input);
briRC->nsub = p->regexp->re_nsub;
memcpy((void *)(briRC->regmatch), (void *)(regmatch),
sizeof(regmatch));
}
}
/* if this is a non-matching regexp, just negate the result */
if (p->flags & CONDFLAG_NOTMATCH) {
rc = !rc;
}
rewritelog(r, 4, "RewriteCond: input='%s' pattern='%s%s' => %s",
input, (p->flags & CONDFLAG_NOTMATCH ? "!" : ""),
p->pattern, rc ? "matched" : "not-matched");
/* end just return the result */
return rc;
}
/*
** +-------------------------------------------------------+
** | |
** | URL transformation functions
** | |
** +-------------------------------------------------------+
*/
/*
**
** split out a QUERY_STRING part from
** the current URI string
**
*/
static void splitout_queryargs(request_rec *r, int qsappend)
{
char *q;
char *olduri;
q = strchr(r->filename, '?');
if (q != NULL) {
olduri = ap_pstrdup(r->pool, r->filename);
*q++ = '\0';
if (qsappend) {
r->args = ap_pstrcat(r->pool, q, "&", r->args, NULL);
}
else {
r->args = ap_pstrdup(r->pool, q);
}
if (strlen(r->args) == 0) {
r->args = NULL;
rewritelog(r, 3, "split uri=%s -> uri=%s, args=<none>", olduri,
r->filename);
}
else {
if (r->args[strlen(r->args)-1] == '&') {
r->args[strlen(r->args)-1] = '\0';
}
rewritelog(r, 3, "split uri=%s -> uri=%s, args=%s", olduri,
r->filename, r->args);
}
}
return;
}
/*
**
** strip 'http[s]://ourhost/' from URI
**
*/
static void reduce_uri(request_rec *r)
{
char *cp;
unsigned short port;
char *portp;
char *hostp;
char *url;
char c;
char host[LONG_STRING_LEN];
char buf[MAX_STRING_LEN];
char *olduri;
int l;
cp = ap_http_method(r);
l = strlen(cp);
if ( strlen(r->filename) > l+3
&& strncasecmp(r->filename, cp, l) == 0
&& r->filename[l] == ':'
&& r->filename[l+1] == '/'
&& r->filename[l+2] == '/' ) {
/* there was really a rewrite to a remote path */
olduri = ap_pstrdup(r->pool, r->filename); /* save for logging */
/* cut the hostname and port out of the URI */
ap_cpystrn(buf, r->filename+(l+3), sizeof(buf));
hostp = buf;
for (cp = hostp; *cp != '\0' && *cp != '/' && *cp != ':'; cp++)
;
if (*cp == ':') {
/* set host */
*cp++ = '\0';
ap_cpystrn(host, hostp, sizeof(host));
/* set port */
portp = cp;
for (; *cp != '\0' && *cp != '/'; cp++)
;
c = *cp;
*cp = '\0';
port = atoi(portp);
*cp = c;
/* set remaining url */
url = cp;
}
else if (*cp == '/') {
/* set host */
*cp = '\0';
ap_cpystrn(host, hostp, sizeof(host));
*cp = '/';
/* set port */
port = ap_default_port(r);
/* set remaining url */
url = cp;
}
else {
/* set host */
ap_cpystrn(host, hostp, sizeof(host));
/* set port */
port = ap_default_port(r);
/* set remaining url */
url = "/";
}
/* now check whether we could reduce it to a local path... */
if (ap_matches_request_vhost(r, host, port)) {
/* this is our host, so only the URL remains */
r->filename = ap_pstrdup(r->pool, url);
rewritelog(r, 3, "reduce %s -> %s", olduri, r->filename);
}
}
return;
}
/*
**
** add 'http[s]://ourhost[:ourport]/' to URI
** if URI is still not fully qualified
**
*/
static void fully_qualify_uri(request_rec *r)
{
int i;
char buf[32];
const char *thisserver;
char *thisport;
int port;
i = strlen(r->filename);
if (!( (i > 7 && strncasecmp(r->filename, "http://", 7) == 0)
|| (i > 8 && strncasecmp(r->filename, "https://", 8) == 0)
|| (i > 9 && strncasecmp(r->filename, "gopher://", 9) == 0)
|| (i > 6 && strncasecmp(r->filename, "ftp://", 6) == 0))) {
thisserver = ap_get_server_name(r);
port = ap_get_server_port(r);
if (ap_is_default_port(port,r)) {
thisport = "";
}
else {
ap_snprintf(buf, sizeof(buf), ":%u", port);
thisport = buf;
}
if (r->filename[0] == '/') {
r->filename = ap_psprintf(r->pool, "%s://%s%s%s",
ap_http_method(r), thisserver,
thisport, r->filename);
}
else {
r->filename = ap_psprintf(r->pool, "%s://%s%s/%s",
ap_http_method(r), thisserver,
thisport, r->filename);
}
}
return;
}
/*
**
** Expand the %0-%9 or $0-$9 regex backreferences
**
*/
static void expand_backref_inbuffer(pool *p, char *buf, int nbuf,
backrefinfo *bri, char c)
{
int i;
if (bri->nsub < 1) {
return;
}
if (c != '$') {
/* safe existing $N backrefs and replace <c>N with $N backrefs */
for (i = 0; buf[i] != '\0' && i < nbuf; i++) {
if (buf[i] == '$' && (buf[i+1] >= '0' && buf[i+1] <= '9')) {
buf[i++] = '\001';
}
else if (buf[i] == c && (buf[i+1] >= '0' && buf[i+1] <= '9')) {
buf[i++] = '$';
}
}
}
/* now apply the pregsub() function */
ap_cpystrn(buf, ap_pregsub(p, buf, bri->source,
bri->nsub+1, bri->regmatch), nbuf);
if (c != '$') {
/* restore the original $N backrefs */
for (i = 0; buf[i] != '\0' && i < nbuf; i++) {
if (buf[i] == '\001' && (buf[i+1] >= '0' && buf[i+1] <= '9')) {
buf[i++] = '$';
}
}
}
}
/*
**
** Expand tilde-paths (/~user) through
** Unix /etc/passwd database information
**
*/
#ifndef WIN32
static char *expand_tildepaths(request_rec *r, char *uri)
{
char user[LONG_STRING_LEN];
struct passwd *pw;
char *newuri;
int i, j;
newuri = uri;
if (uri != NULL && strlen(uri) > 2 && uri[0] == '/' && uri[1] == '~') {
/* cut out the username */
for (j = 0, i = 2; j < sizeof(user)-1
&& uri[i] != '\0'
&& uri[i] != '/' ; ) {
user[j++] = uri[i++];
}
user[j] = '\0';
/* lookup username in systems passwd file */
if ((pw = getpwnam(user)) != NULL) {
/* ok, user was found, so expand the ~user string */
if (uri[i] != '\0') {
/* ~user/anything... has to be expanded */
if (pw->pw_dir[strlen(pw->pw_dir)-1] == '/') {
pw->pw_dir[strlen(pw->pw_dir)-1] = '\0';
}
newuri = ap_pstrcat(r->pool, pw->pw_dir, uri+i, NULL);
}
else {
/* only ~user has to be expanded */
newuri = ap_pstrdup(r->pool, pw->pw_dir);
}
}
}
return newuri;
}
#endif
/*
**
** mapfile expansion support
** i.e. expansion of MAP lookup directives
** ${<mapname>:<key>} in RewriteRule rhs
**
*/
#define limit_length(n) (n > LONG_STRING_LEN-1 ? LONG_STRING_LEN-1 : n)
static void expand_map_lookups(request_rec *r, char *uri, int uri_len)
{
char newuri[MAX_STRING_LEN];
char *cpI;
char *cpIE;
char *cpO;
char *cpT;
char *cpT2;
char mapname[LONG_STRING_LEN];
char mapkey[LONG_STRING_LEN];
char defaultvalue[LONG_STRING_LEN];
int n;
cpI = uri;
cpIE = cpI+strlen(cpI);
cpO = newuri;
while (cpI < cpIE) {
if (cpI+6 < cpIE && strncmp(cpI, "${", 2) == 0) {
/* missing delimiter -> take it as plain text */
if ( strchr(cpI+2, ':') == NULL
|| strchr(cpI+2, '}') == NULL) {
memcpy(cpO, cpI, 2);
cpO += 2;
cpI += 2;
continue;
}
cpI += 2;
cpT = strchr(cpI, ':');
n = cpT-cpI;
memcpy(mapname, cpI, limit_length(n));
mapname[limit_length(n)] = '\0';
cpI += n+1;
cpT2 = strchr(cpI, '|');
cpT = strchr(cpI, '}');
if (cpT2 != NULL && cpT2 < cpT) {
n = cpT2-cpI;
memcpy(mapkey, cpI, limit_length(n));
mapkey[limit_length(n)] = '\0';
cpI += n+1;
n = cpT-cpI;
memcpy(defaultvalue, cpI, limit_length(n));
defaultvalue[limit_length(n)] = '\0';
cpI += n+1;
}
else {
n = cpT-cpI;
memcpy(mapkey, cpI, limit_length(n));
mapkey[limit_length(n)] = '\0';
cpI += n+1;
defaultvalue[0] = '\0';
}
cpT = lookup_map(r, mapname, mapkey);
if (cpT != NULL) {
n = strlen(cpT);
if (cpO + n >= newuri + sizeof(newuri)) {
ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
r, "insufficient space in "
"expand_map_lookups, aborting");
return;
}
memcpy(cpO, cpT, n);
cpO += n;
}
else {
n = strlen(defaultvalue);
if (cpO + n >= newuri + sizeof(newuri)) {
ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
r, "insufficient space in "
"expand_map_lookups, aborting");
return;
}
memcpy(cpO, defaultvalue, n);
cpO += n;
}
}
else {
cpT = strstr(cpI, "${");
if (cpT == NULL)
cpT = cpI+strlen(cpI);
n = cpT-cpI;
if (cpO + n >= newuri + sizeof(newuri)) {
ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR,
r, "insufficient space in "
"expand_map_lookups, aborting");
return;
}
memcpy(cpO, cpI, n);
cpO += n;
cpI += n;
}
}
*cpO = '\0';
ap_cpystrn(uri, newuri, uri_len);
return;
}
#undef limit_length
/*
** +-------------------------------------------------------+
** | |
** | DBM hashfile support
** | |
** +-------------------------------------------------------+
*/
static char *lookup_map(request_rec *r, char *name, char *key)
{
void *sconf;
rewrite_server_conf *conf;
array_header *rewritemaps;
rewritemap_entry *entries;
rewritemap_entry *s;
char *value;
struct stat st;
int i;
/* get map configuration */
sconf = r->server->module_config;
conf = (rewrite_server_conf *)ap_get_module_config(sconf,
&rewrite_module);
rewritemaps = conf->rewritemaps;
entries = (rewritemap_entry *)rewritemaps->elts;
for (i = 0; i < rewritemaps->nelts; i++) {
s = &entries[i];
if (strcmp(s->name, name) == 0) {
if (s->type == MAPTYPE_TXT) {
if (stat(s->checkfile, &st) == -1) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
"mod_rewrite: can't access text RewriteMap "
"file %s", s->checkfile);
rewritelog(r, 1, "can't open RewriteMap file, "
"see error log");
return NULL;
}
value = get_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key);
if (value == NULL) {
rewritelog(r, 6, "cache lookup FAILED, forcing new "
"map lookup");
if ((value =
lookup_map_txtfile(r, s->datafile, key)) != NULL) {
rewritelog(r, 5, "map lookup OK: map=%s key=%s[txt] "
"-> val=%s", s->name, key, value);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, value);
return value;
}
else {
rewritelog(r, 5, "map lookup FAILED: map=%s[txt] "
"key=%s", s->name, key);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, "");
return NULL;
}
}
else {
rewritelog(r, 5, "cache lookup OK: map=%s[txt] key=%s "
"-> val=%s", s->name, key, value);
return value[0] != '\0' ? value : NULL;
}
}
else if (s->type == MAPTYPE_DBM) {
#ifndef NO_DBM_REWRITEMAP
if (stat(s->checkfile, &st) == -1) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
"mod_rewrite: can't access DBM RewriteMap "
"file %s", s->checkfile);
rewritelog(r, 1, "can't open DBM RewriteMap file, "
"see error log");
return NULL;
}
value = get_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key);
if (value == NULL) {
rewritelog(r, 6,
"cache lookup FAILED, forcing new map lookup");
if ((value =
lookup_map_dbmfile(r, s->datafile, key)) != NULL) {
rewritelog(r, 5, "map lookup OK: map=%s[dbm] key=%s "
"-> val=%s", s->name, key, value);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, value);
return value;
}
else {
rewritelog(r, 5, "map lookup FAILED: map=%s[dbm] "
"key=%s", s->name, key);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, "");
return NULL;
}
}
else {
rewritelog(r, 5, "cache lookup OK: map=%s[dbm] key=%s "
"-> val=%s", s->name, key, value);
return value[0] != '\0' ? value : NULL;
}
#else
return NULL;
#endif
}
else if (s->type == MAPTYPE_PRG) {
if ((value =
lookup_map_program(r, s->fpin, s->fpout, key)) != NULL) {
rewritelog(r, 5, "map lookup OK: map=%s key=%s -> val=%s",
s->name, key, value);
return value;
}
else {
rewritelog(r, 5, "map lookup FAILED: map=%s key=%s",
s->name, key);
}
}
else if (s->type == MAPTYPE_INT) {
if ((value = lookup_map_internal(r, s->func, key)) != NULL) {
rewritelog(r, 5, "map lookup OK: map=%s key=%s -> val=%s",
s->name, key, value);
return value;
}
else {
rewritelog(r, 5, "map lookup FAILED: map=%s key=%s",
s->name, key);
}
}
else if (s->type == MAPTYPE_RND) {
if (stat(s->checkfile, &st) == -1) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
"mod_rewrite: can't access text RewriteMap "
"file %s", s->checkfile);
rewritelog(r, 1, "can't open RewriteMap file, "
"see error log");
return NULL;
}
value = get_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key);
if (value == NULL) {
rewritelog(r, 6, "cache lookup FAILED, forcing new "
"map lookup");
if ((value =
lookup_map_txtfile(r, s->datafile, key)) != NULL) {
rewritelog(r, 5, "map lookup OK: map=%s key=%s[txt] "
"-> val=%s", s->name, key, value);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, value);
}
else {
rewritelog(r, 5, "map lookup FAILED: map=%s[txt] "
"key=%s", s->name, key);
set_cache_string(cachep, s->name, CACHEMODE_TS,
st.st_mtime, key, "");
return NULL;
}
}
else {
rewritelog(r, 5, "cache lookup OK: map=%s[txt] key=%s "
"-> val=%s", s->name, key, value);
}
if (value[0] != '\0') {
value = select_random_value_part(r, value);
rewritelog(r, 5, "randomly choosen the subvalue `%s'", value);
}
else {
value = NULL;
}
return value;
}
}
}
return NULL;
}
static char *lookup_map_txtfile(request_rec *r, char *file, char *key)
{
FILE *fp = NULL;
char line[1024];
char *value = NULL;
char *cpT;
size_t skip;
char *curkey;
char *curval;
if ((fp = ap_pfopen(r->pool, file, "r")) == NULL) {
return NULL;
}
while (fgets(line, sizeof(line), fp) != NULL) {
if (line[0] == '#')
continue; /* ignore comments */
cpT = line;
curkey = cpT;
skip = strcspn(cpT," \t\r\n");
if (skip == 0)
continue; /* ignore lines that start with a space, tab, CR, or LF */
cpT += skip;
*cpT = '\0';
if (strcmp(curkey, key) != 0)
continue; /* key does not match... */
/* found a matching key; now extract and return the value */
++cpT;
skip = strspn(cpT, " \t\r\n");
cpT += skip;
curval = cpT;
skip = strcspn(cpT, " \t\r\n");
if (skip == 0)
continue; /* no value... */
cpT += skip;
*cpT = '\0';
value = ap_pstrdup(r->pool, curval);
break;
}
ap_pfclose(r->pool, fp);
return value;
}
#ifndef NO_DBM_REWRITEMAP
static char *lookup_map_dbmfile(request_rec *r, char *file, char *key)
{
DBM *dbmfp = NULL;
datum dbmkey;
datum dbmval;
char *value = NULL;
char buf[MAX_STRING_LEN];
dbmkey.dptr = key;
dbmkey.dsize = strlen(key);
if ((dbmfp = dbm_open(file, O_RDONLY, 0666)) != NULL) {
dbmval = dbm_fetch(dbmfp, dbmkey);
if (dbmval.dptr != NULL) {
memcpy(buf, dbmval.dptr,
dbmval.dsize < sizeof(buf)-1 ?
dbmval.dsize : sizeof(buf)-1 );
buf[dbmval.dsize] = '\0';
value = ap_pstrdup(r->pool, buf);
}
dbm_close(dbmfp);
}
return value;
}
#endif
static char *lookup_map_program(request_rec *r, int fpin, int fpout, char *key)
{
char buf[LONG_STRING_LEN];
char c;
int i;
#ifndef NO_WRITEV
struct iovec iov[2];
#endif
/* when `RewriteEngine off' was used in the per-server
* context then the rewritemap-programs were not spawned.
* In this case using such a map (usually in per-dir context)
* is useless because it is not available.
*/
if (fpin == -1 || fpout == -1) {
return NULL;
}
/* take the lock */
rewritelock_alloc(r);
/* write out the request key */
#ifdef NO_WRITEV
write(fpin, key, strlen(key));
write(fpin, "\n", 1);
#else
iov[0].iov_base = key;
iov[0].iov_len = strlen(key);
iov[1].iov_base = "\n";
iov[1].iov_len = 1;
writev(fpin, iov, 2);
#endif
/* read in the response value */
i = 0;
while (read(fpout, &c, 1) == 1 && (i < LONG_STRING_LEN-1)) {
if (c == '\n') {
break;
}
buf[i++] = c;
}
buf[i] = '\0';
/* give the lock back */
rewritelock_free(r);
if (strcasecmp(buf, "NULL") == 0) {
return NULL;
}
else {
return ap_pstrdup(r->pool, buf);
}
}
static char *lookup_map_internal(request_rec *r,
char *(*func)(request_rec *, char *),
char *key)
{
/* currently we just let the function convert
the key to a corresponding value */
return func(r, key);
}
static char *rewrite_mapfunc_toupper(request_rec *r, char *key)
{
char *value, *cp;
for (cp = value = ap_pstrdup(r->pool, key); cp != NULL && *cp != '\0';
cp++) {
*cp = ap_toupper(*cp);
}
return value;
}
static char *rewrite_mapfunc_tolower(request_rec *r, char *key)
{
char *value, *cp;
for (cp = value = ap_pstrdup(r->pool, key); cp != NULL && *cp != '\0';
cp++) {
*cp = ap_tolower(*cp);
}
return value;
}
static char *rewrite_mapfunc_escape(request_rec *r, char *key)
{
char *value;
value = ap_escape_uri(r->pool, key);
return value;
}
static char *rewrite_mapfunc_unescape(request_rec *r, char *key)
{
char *value;
value = ap_pstrdup(r->pool, key);
ap_unescape_url(value);
return value;
}
static int rewrite_rand_init_done = 0;
static void rewrite_rand_init(void)
{
if (!rewrite_rand_init_done) {
srand((unsigned)(getpid()));
rewrite_rand_init_done = 1;
}
return;
}
static int rewrite_rand(int l, int h)
{
int i;
char buf[50];
rewrite_rand_init();
ap_snprintf(buf, sizeof(buf), "%.0f",
(((double)(rand()%RAND_MAX)/RAND_MAX)*(h-l)));
i = atoi(buf)+1;
if (i < l) i = l;
if (i > h) i = h;
return i;
}
static char *select_random_value_part(request_rec *r, char *value)
{
char *buf;
int n, i, k;
/* count number of distinct values */
for (n = 1, i = 0; value[i] != '\0'; i++) {
if (value[i] == '|') {
n++;
}
}
/* when only one value we have no option to choose */
if (n == 1) {
return value;
}
/* else randomly select one */
k = rewrite_rand(1, n);
/* and grep it out */
for (n = 1, i = 0; value[i] != '\0'; i++) {
if (n == k) {
break;
}
if (value[i] == '|') {
n++;
}
}
buf = ap_pstrdup(r->pool, &value[i]);
for (i = 0; buf[i] != '\0' && buf[i] != '|'; i++)
;
buf[i] = '\0';
return buf;
}
/*
** +-------------------------------------------------------+
** | |
** | rewriting logfile support
** | |
** +-------------------------------------------------------+
*/
static void open_rewritelog(server_rec *s, pool *p)
{
rewrite_server_conf *conf;
char *fname;
piped_log *pl;
int rewritelog_flags = ( O_WRONLY|O_APPEND|O_CREAT );
#ifdef WIN32
mode_t rewritelog_mode = ( _S_IREAD|_S_IWRITE );
#else
mode_t rewritelog_mode = ( S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH );
#endif
conf = ap_get_module_config(s->module_config, &rewrite_module);
if (conf->rewritelogfile == NULL) {
return;
}
if (*(conf->rewritelogfile) == '\0') {
return;
}
if (conf->rewritelogfp > 0) {
return; /* virtual log shared w/ main server */
}
fname = ap_server_root_relative(p, conf->rewritelogfile);
if (*conf->rewritelogfile == '|') {
if ((pl = ap_open_piped_log(p, conf->rewritelogfile+1)) == NULL) {
ap_log_error(APLOG_MARK, APLOG_ERR, s,
"mod_rewrite: could not open reliable pipe "
"to RewriteLog filter %s", conf->rewritelogfile+1);
exit(1);
}
conf->rewritelogfp = ap_piped_log_write_fd(pl);
}
else if (*conf->rewritelogfile != '\0') {
if ((conf->rewritelogfp = ap_popenf(p, fname, rewritelog_flags,
rewritelog_mode)) < 0) {
ap_log_error(APLOG_MARK, APLOG_ERR, s,
"mod_rewrite: could not open RewriteLog "
"file %s", fname);
exit(1);
}
}
return;
}
static void rewritelog(request_rec *r, int level, const char *text, ...)
{
rewrite_server_conf *conf;
conn_rec *conn;
char *str1;
char str2[512];
char str3[1024];
char type[20];
char redir[20];
va_list ap;
int i;
request_rec *req;
char *ruser;
const char *rhost;
va_start(ap, text);
conf = ap_get_module_config(r->server->module_config, &rewrite_module);
conn = r->connection;
if (conf->rewritelogfp < 0) {
return;
}
if (conf->rewritelogfile == NULL) {
return;
}
if (*(conf->rewritelogfile) == '\0') {
return;
}
if (level > conf->rewriteloglevel) {
return;
}
if (conn->user == NULL) {
ruser = "-";
}
else if (strlen(conn->user) != 0) {
ruser = conn->user;
}
else {
ruser = "\"\"";
}
rhost = ap_get_remote_host(conn, r->server->module_config,
REMOTE_NOLOOKUP);
if (rhost == NULL) {
rhost = "UNKNOWN-HOST";
}
str1 = ap_pstrcat(r->pool, rhost, " ",
(conn->remote_logname != NULL ?
conn->remote_logname : "-"), " ",
ruser, NULL);
ap_vsnprintf(str2, sizeof(str2), text, ap);
if (r->main == NULL) {
strcpy(type, "initial");
}
else {
strcpy(type, "subreq");
}
for (i = 0, req = r; req->prev != NULL; req = req->prev) {
i++;
}
if (i == 0) {
redir[0] = '\0';
}
else {
ap_snprintf(redir, sizeof(redir), "/redir#%d", i);
}
ap_snprintf(str3, sizeof(str3),
"%s %s [%s/sid#%lx][rid#%lx/%s%s] (%d) %s\n", str1,
current_logtime(r), ap_get_server_name(r),
(unsigned long)(r->server), (unsigned long)r,
type, redir, level, str2);
fd_lock(r, conf->rewritelogfp);
write(conf->rewritelogfp, str3, strlen(str3));
fd_unlock(r, conf->rewritelogfp);
va_end(ap);
return;
}
static char *current_logtime(request_rec *r)
{
int timz;
struct tm *t;
char tstr[80];
char sign;
t = ap_get_gmtoff(&timz);
sign = (timz < 0 ? '-' : '+');
if (timz < 0) {
timz = -timz;
}
strftime(tstr, 80, "[%d/%b/%Y:%H:%M:%S ", t);
ap_snprintf(tstr + strlen(tstr), 80-strlen(tstr), "%c%.2d%.2d]",
sign, timz/60, timz%60);
return ap_pstrdup(r->pool, tstr);
}
/*
** +-------------------------------------------------------+
** | |
** | rewriting lockfile support
** | |
** +-------------------------------------------------------+
*/
#ifdef WIN32
#define REWRITELOCK_MODE ( _S_IREAD|_S_IWRITE )
#else
#define REWRITELOCK_MODE ( S_IRUSR|S_IWUSR|S_IRGRP|S_IROTH )
#endif
static void rewritelock_create(server_rec *s, pool *p)
{
rewrite_server_conf *conf;
conf = ap_get_module_config(s->module_config, &rewrite_module);
/* only operate if a lockfile is used */
if (lockname == NULL || *(lockname) == '\0') {
return;
}
/* fixup the path, especially for rewritelock_remove() */
lockname = ap_server_root_relative(p, lockname);
/* create the lockfile */
unlink(lockname);
if ((lockfd = ap_popenf(p, lockname, O_WRONLY|O_CREAT,
REWRITELOCK_MODE)) < 0) {
ap_log_error(APLOG_MARK, APLOG_ERR, s,
"mod_rewrite: Parent could not create RewriteLock "
"file %s", lockname);
exit(1);
}
#if !defined(OS2) && !defined(WIN32)
/* make sure the childs have access to this file */
if (geteuid() == 0 /* is superuser */)
chown(lockname, ap_user_id, -1 /* no gid change */);
#endif
return;
}
static void rewritelock_open(server_rec *s, pool *p)
{
rewrite_server_conf *conf;
conf = ap_get_module_config(s->module_config, &rewrite_module);
/* only operate if a lockfile is used */
if (lockname == NULL || *(lockname) == '\0') {
return;
}
/* open the lockfile (once per child) to get a unique fd */
if ((lockfd = ap_popenf(p, lockname, O_WRONLY,
REWRITELOCK_MODE)) < 0) {
ap_log_error(APLOG_MARK, APLOG_ERR, s,
"mod_rewrite: Child could not open RewriteLock "
"file %s", lockname);
exit(1);
}
return;
}
static void rewritelock_remove(void *data)
{
/* only operate if a lockfile is used */
if (lockname == NULL || *(lockname) == '\0') {
return;
}
/* remove the lockfile */
unlink(lockname);
lockname = NULL;
lockfd = -1;
}
static void rewritelock_alloc(request_rec *r)
{
if (lockfd != -1) {
fd_lock(r, lockfd);
}
return;
}
static void rewritelock_free(request_rec *r)
{
if (lockfd != -1) {
fd_unlock(r, lockfd);
}
return;
}
/*
** +-------------------------------------------------------+
** | |
** | program map support
** | |
** +-------------------------------------------------------+
*/
static void run_rewritemap_programs(server_rec *s, pool *p)
{
rewrite_server_conf *conf;
FILE *fpin;
FILE *fpout;
FILE *fperr;
array_header *rewritemaps;
rewritemap_entry *entries;
rewritemap_entry *map;
int i;
int rc;
conf = ap_get_module_config(s->module_config, &rewrite_module);
/* If the engine isn't turned on,
* don't even try to do anything.
*/
if (conf->state == ENGINE_DISABLED) {
return;
}
rewritemaps = conf->rewritemaps;
entries = (rewritemap_entry *)rewritemaps->elts;
for (i = 0; i < rewritemaps->nelts; i++) {
map = &entries[i];
if (map->type != MAPTYPE_PRG) {
continue;
}
if (map->datafile == NULL
|| *(map->datafile) == '\0'
|| map->fpin != -1
|| map->fpout != -1 ) {
continue;
}
fpin = NULL;
fpout = NULL;
rc = ap_spawn_child(p, rewritemap_program_child,
(void *)map->datafile, kill_after_timeout,
&fpin, &fpout, &fperr);
if (rc == 0 || fpin == NULL || fpout == NULL) {
ap_log_error(APLOG_MARK, APLOG_ERR, s,
"mod_rewrite: could not fork child for "
"RewriteMap process");
exit(1);
}
map->fpin = fileno(fpin);
map->fpout = fileno(fpout);
map->fperr = fileno(fperr);
}
return;
}
/* child process code */
static int rewritemap_program_child(void *cmd, child_info *pinfo)
{
int child_pid = 1;
/*
* Prepare for exec
*/
ap_cleanup_for_exec();
#ifdef SIGHUP
signal(SIGHUP, SIG_IGN);
#endif
/*
* Exec() the child program
*/
#if defined(WIN32)
/* MS Windows */
{
char pCommand[MAX_STRING_LEN];
STARTUPINFO si;
PROCESS_INFORMATION pi;
ap_snprintf(pCommand, sizeof(pCommand), "%s /C %s", SHELL_PATH, cmd);
memset(&si, 0, sizeof(si));
memset(&pi, 0, sizeof(pi));
si.cb = sizeof(si);
si.dwFlags = STARTF_USESHOWWINDOW | STARTF_USESTDHANDLES;
si.wShowWindow = SW_HIDE;
si.hStdInput = pinfo->hPipeInputRead;
si.hStdOutput = pinfo->hPipeOutputWrite;
si.hStdError = pinfo->hPipeErrorWrite;
if (CreateProcess(NULL, pCommand, NULL, NULL, TRUE, 0,
environ, NULL, &si, &pi)) {
CloseHandle(pi.hProcess);
CloseHandle(pi.hThread);
child_pid = pi.dwProcessId;
}
}
#elif defined(OS2)
/* IBM OS/2 */
execl(SHELL_PATH, SHELL_PATH, "/c", (char *)cmd, NULL);
#else
/* Standard Unix */
execl(SHELL_PATH, SHELL_PATH, "-c", (char *)cmd, NULL);
#endif
return(child_pid);
}
/*
** +-------------------------------------------------------+
** | |
** | environment variable support
** | |
** +-------------------------------------------------------+
*/
static void expand_variables_inbuffer(request_rec *r, char *buf, int buf_len)
{
char *newbuf;
newbuf = expand_variables(r, buf);
if (strcmp(newbuf, buf) != 0) {
ap_cpystrn(buf, newbuf, buf_len);
}
return;
}
static char *expand_variables(request_rec *r, char *str)
{
char output[MAX_STRING_LEN];
char input[MAX_STRING_LEN];
char *cp;
char *cp2;
char *cp3;
int expanded;
char *outp;
char *endp;
ap_cpystrn(input, str, sizeof(input));
output[0] = '\0';
outp = output;
endp = output + sizeof(output);
expanded = 0;
for (cp = input; cp < input+MAX_STRING_LEN; ) {
if ((cp2 = strstr(cp, "%{")) != NULL) {
if ((cp3 = strstr(cp2, "}")) != NULL) {
*cp2 = '\0';
outp = ap_cpystrn(outp, cp, endp - outp);
cp2 += 2;
*cp3 = '\0';
outp = ap_cpystrn(outp, lookup_variable(r, cp2), endp - outp);
cp = cp3+1;
expanded = 1;
continue;
}
}
outp = ap_cpystrn(outp, cp, endp - outp);
break;
}
return expanded ? ap_pstrdup(r->pool, output) : str;
}
static char *lookup_variable(request_rec *r, char *var)
{
const char *result;
char resultbuf[LONG_STRING_LEN];
time_t tc;
struct tm *tm;
request_rec *rsub;
#ifndef WIN32
struct passwd *pw;
struct group *gr;
struct stat finfo;
#endif
result = NULL;
/* HTTP headers */
if (strcasecmp(var, "HTTP_USER_AGENT") == 0) {
result = lookup_header(r, "User-Agent");
}
else if (strcasecmp(var, "HTTP_REFERER") == 0) {
result = lookup_header(r, "Referer");
}
else if (strcasecmp(var, "HTTP_COOKIE") == 0) {
result = lookup_header(r, "Cookie");
}
else if (strcasecmp(var, "HTTP_FORWARDED") == 0) {
result = lookup_header(r, "Forwarded");
}
else if (strcasecmp(var, "HTTP_HOST") == 0) {
result = lookup_header(r, "Host");
}
else if (strcasecmp(var, "HTTP_PROXY_CONNECTION") == 0) {
result = lookup_header(r, "Proxy-Connection");
}
else if (strcasecmp(var, "HTTP_ACCEPT") == 0) {
result = lookup_header(r, "Accept");
}
/* all other headers from which we are still not know about */
else if (strlen(var) > 5 && strncasecmp(var, "HTTP:", 5) == 0) {
result = lookup_header(r, var+5);
}
/* connection stuff */
else if (strcasecmp(var, "REMOTE_ADDR") == 0) {
result = r->connection->remote_ip;
}
else if (strcasecmp(var, "REMOTE_HOST") == 0) {
result = (char *)ap_get_remote_host(r->connection,
r->per_dir_config, REMOTE_NAME);
}
else if (strcasecmp(var, "REMOTE_USER") == 0) {
result = r->connection->user;
}
else if (strcasecmp(var, "REMOTE_IDENT") == 0) {
result = (char *)ap_get_remote_logname(r);
}
/* request stuff */
else if (strcasecmp(var, "THE_REQUEST") == 0) { /* non-standard */
result = r->the_request;
}
else if (strcasecmp(var, "REQUEST_METHOD") == 0) {
result = r->method;
}
else if (strcasecmp(var, "REQUEST_URI") == 0) { /* non-standard */
result = r->uri;
}
else if (strcasecmp(var, "SCRIPT_FILENAME") == 0 ||
strcasecmp(var, "REQUEST_FILENAME") == 0 ) {
result = r->filename;
}
else if (strcasecmp(var, "PATH_INFO") == 0) {
result = r->path_info;
}
else if (strcasecmp(var, "QUERY_STRING") == 0) {
result = r->args;
}
else if (strcasecmp(var, "AUTH_TYPE") == 0) {
result = r->connection->ap_auth_type;
}
else if (strcasecmp(var, "IS_SUBREQ") == 0) { /* non-standard */
result = (r->main != NULL ? "true" : "false");
}
/* internal server stuff */
else if (strcasecmp(var, "DOCUMENT_ROOT") == 0) {
result = ap_document_root(r);
}
else if (strcasecmp(var, "SERVER_ADMIN") == 0) {
result = r->server->server_admin;
}
else if (strcasecmp(var, "SERVER_NAME") == 0) {
result = ap_get_server_name(r);
}
else if (strcasecmp(var, "SERVER_ADDR") == 0) { /* non-standard */
result = r->connection->local_ip;
}
else if (strcasecmp(var, "SERVER_PORT") == 0) {
ap_snprintf(resultbuf, sizeof(resultbuf), "%u", ap_get_server_port(r));
result = resultbuf;
}
else if (strcasecmp(var, "SERVER_PROTOCOL") == 0) {
result = r->protocol;
}
else if (strcasecmp(var, "SERVER_SOFTWARE") == 0) {
result = ap_get_server_version();
}
else if (strcasecmp(var, "API_VERSION") == 0) { /* non-standard */
ap_snprintf(resultbuf, sizeof(resultbuf), "%d:%d",
MODULE_MAGIC_NUMBER_MAJOR, MODULE_MAGIC_NUMBER_MINOR);
result = resultbuf;
}
/* underlaying Unix system stuff */
else if (strcasecmp(var, "TIME_YEAR") == 0) {
tc = time(NULL);
tm = localtime(&tc);
ap_snprintf(resultbuf, sizeof(resultbuf), "%02d%02d",
(tm->tm_year / 100) + 19, tm->tm_year % 100);
result = resultbuf;
}
#define MKTIMESTR(format, tmfield) \
tc = time(NULL); \
tm = localtime(&tc); \
ap_snprintf(resultbuf, sizeof(resultbuf), format, tm->tmfield); \
result = resultbuf;
else if (strcasecmp(var, "TIME_MON") == 0) {
MKTIMESTR("%02d", tm_mon+1)
}
else if (strcasecmp(var, "TIME_DAY") == 0) {
MKTIMESTR("%02d", tm_mday)
}
else if (strcasecmp(var, "TIME_HOUR") == 0) {
MKTIMESTR("%02d", tm_hour)
}
else if (strcasecmp(var, "TIME_MIN") == 0) {
MKTIMESTR("%02d", tm_min)
}
else if (strcasecmp(var, "TIME_SEC") == 0) {
MKTIMESTR("%02d", tm_sec)
}
else if (strcasecmp(var, "TIME_WDAY") == 0) {
MKTIMESTR("%d", tm_wday)
}
else if (strcasecmp(var, "TIME") == 0) {
tc = time(NULL);
tm = localtime(&tc);
ap_snprintf(resultbuf, sizeof(resultbuf),
"%02d%02d%02d%02d%02d%02d%02d", (tm->tm_year / 100) + 19,
(tm->tm_year % 100), tm->tm_mon+1, tm->tm_mday,
tm->tm_hour, tm->tm_min, tm->tm_sec);
result = resultbuf;
rewritelog(r, 1, "RESULT='%s'", result);
}
/* all other env-variables from the parent Apache process */
else if (strlen(var) > 4 && strncasecmp(var, "ENV:", 4) == 0) {
/* first try the internal Apache notes structure */
result = ap_table_get(r->notes, var+4);
/* second try the internal Apache env structure */
if (result == NULL) {
result = ap_table_get(r->subprocess_env, var+4);
}
/* third try the external OS env */
if (result == NULL) {
result = getenv(var+4);
}
}
#define LOOKAHEAD(subrecfunc) \
if ( \
/* filename is safe to use */ \
r->filename != NULL \
/* - and we're either not in a subrequest */ \
&& ( r->main == NULL \
/* - or in a subrequest where paths are non-NULL... */ \
|| ( r->main->uri != NULL && r->uri != NULL \
/* ...and sub and main paths differ */ \
&& strcmp(r->main->uri, r->uri) != 0))) { \
/* process a file-based subrequest */ \
rsub = subrecfunc(r->filename, r); \
/* now recursively lookup the variable in the sub_req */ \
result = lookup_variable(rsub, var+5); \
/* copy it up to our scope before we destroy sub_req's pool */ \
result = ap_pstrdup(r->pool, result); \
/* cleanup by destroying the subrequest */ \
ap_destroy_sub_req(rsub); \
/* log it */ \
rewritelog(r, 5, "lookahead: path=%s var=%s -> val=%s", \
r->filename, var+5, result); \
/* return ourself to prevent re-pstrdup */ \
return (char *)result; \
}
/* look-ahead for parameter through URI-based sub-request */
else if (strlen(var) > 5 && strncasecmp(var, "LA-U:", 5) == 0) {
LOOKAHEAD(ap_sub_req_lookup_uri)
}
/* look-ahead for parameter through file-based sub-request */
else if (strlen(var) > 5 && strncasecmp(var, "LA-F:", 5) == 0) {
LOOKAHEAD(ap_sub_req_lookup_file)
}
#ifndef WIN32
/* Win32 has a rather different view of file ownerships.
For now, just forget it */
/* file stuff */
else if (strcasecmp(var, "SCRIPT_USER") == 0) {
result = "<unknown>";
if (r->finfo.st_mode != 0) {
if ((pw = getpwuid(r->finfo.st_uid)) != NULL) {
result = pw->pw_name;
}
}
else {
if (stat(r->filename, &finfo) == 0) {
if ((pw = getpwuid(finfo.st_uid)) != NULL) {
result = pw->pw_name;
}
}
}
}
else if (strcasecmp(var, "SCRIPT_GROUP") == 0) {
result = "<unknown>";
if (r->finfo.st_mode != 0) {
if ((gr = getgrgid(r->finfo.st_gid)) != NULL) {
result = gr->gr_name;
}
}
else {
if (stat(r->filename, &finfo) == 0) {
if ((gr = getgrgid(finfo.st_gid)) != NULL) {
result = gr->gr_name;
}
}
}
}
#endif /* ndef WIN32 */
if (result == NULL) {
return ap_pstrdup(r->pool, "");
}
else {
return ap_pstrdup(r->pool, result);
}
}
static char *lookup_header(request_rec *r, const char *name)
{
array_header *hdrs_arr;
table_entry *hdrs;
int i;
hdrs_arr = ap_table_elts(r->headers_in);
hdrs = (table_entry *)hdrs_arr->elts;
for (i = 0; i < hdrs_arr->nelts; ++i) {
if (hdrs[i].key == NULL) {
continue;
}
if (strcasecmp(hdrs[i].key, name) == 0) {
ap_table_merge(r->notes, VARY_KEY_THIS, name);
return hdrs[i].val;
}
}
return NULL;
}
/*
** +-------------------------------------------------------+
** | |
** | caching support
** | |
** +-------------------------------------------------------+
*/
static cache *init_cache(pool *p)
{
cache *c;
c = (cache *)ap_palloc(p, sizeof(cache));
c->pool = ap_make_sub_pool(p);
c->lists = ap_make_array(c->pool, 2, sizeof(cachelist));
return c;
}
static void set_cache_string(cache *c, char *res, int mode, time_t t,
char *key, char *value)
{
cacheentry ce;
ce.time = t;
ce.key = key;
ce.value = value;
store_cache_string(c, res, &ce);
return;
}
static char *get_cache_string(cache *c, char *res, int mode,
time_t t, char *key)
{
cacheentry *ce;
ce = retrieve_cache_string(c, res, key);
if (ce == NULL) {
return NULL;
}
if (mode & CACHEMODE_TS) {
if (t != ce->time) {
return NULL;
}
}
else if (mode & CACHEMODE_TTL) {
if (t > ce->time) {
return NULL;
}
}
return ap_pstrdup(c->pool, ce->value);
}
static int cache_tlb_hash(char *key)
{
unsigned long n;
char *p;
n = 0;
for (p=key; *p != '\0'; ++p) {
n = n * 53711 + 134561 + (unsigned)(*p & 0xff);
}
return n % CACHE_TLB_ROWS;
}
static cacheentry *cache_tlb_lookup(cachetlbentry *tlb, cacheentry *elt,
char *key)
{
int ix = cache_tlb_hash(key);
int i;
int j;
for (i=0; i < CACHE_TLB_COLS; ++i) {
j = tlb[ix].t[i];
if (j < 0)
return NULL;
if (strcmp(elt[j].key, key) == 0)
return &elt[j];
}
return NULL;
}
static void cache_tlb_replace(cachetlbentry *tlb, cacheentry *elt,
cacheentry *e)
{
int ix = cache_tlb_hash(e->key);
int i;
tlb = &tlb[ix];
for (i=1; i < CACHE_TLB_COLS; ++i)
tlb->t[i] = tlb->t[i-1];
tlb->t[0] = e - elt;
}
static void store_cache_string(cache *c, char *res, cacheentry *ce)
{
int i;
int j;
cachelist *l;
cacheentry *e;
cachetlbentry *t;
int found_list;
found_list = 0;
/* first try to edit an existing entry */
for (i = 0; i < c->lists->nelts; i++) {
l = &(((cachelist *)c->lists->elts)[i]);
if (strcmp(l->resource, res) == 0) {
found_list = 1;
e = cache_tlb_lookup((cachetlbentry *)l->tlb->elts,
(cacheentry *)l->entries->elts, ce->key);
if (e != NULL) {
e->time = ce->time;
e->value = ap_pstrdup(c->pool, ce->value);
return;
}
for (j = 0; j < l->entries->nelts; j++) {
e = &(((cacheentry *)l->entries->elts)[j]);
if (strcmp(e->key, ce->key) == 0) {
e->time = ce->time;
e->value = ap_pstrdup(c->pool, ce->value);
cache_tlb_replace((cachetlbentry *)l->tlb->elts,
(cacheentry *)l->entries->elts, e);
return;
}
}
}
}
/* create a needed new list */
if (!found_list) {
l = ap_push_array(c->lists);
l->resource = ap_pstrdup(c->pool, res);
l->entries = ap_make_array(c->pool, 2, sizeof(cacheentry));
l->tlb = ap_make_array(c->pool, CACHE_TLB_ROWS,
sizeof(cachetlbentry));
for (i=0; i<CACHE_TLB_ROWS; ++i) {
t = &((cachetlbentry *)l->tlb->elts)[i];
for (j=0; j<CACHE_TLB_COLS; ++j)
t->t[j] = -1;
}
}
/* create the new entry */
for (i = 0; i < c->lists->nelts; i++) {
l = &(((cachelist *)c->lists->elts)[i]);
if (strcmp(l->resource, res) == 0) {
e = ap_push_array(l->entries);
e->time = ce->time;
e->key = ap_pstrdup(c->pool, ce->key);
e->value = ap_pstrdup(c->pool, ce->value);
cache_tlb_replace((cachetlbentry *)l->tlb->elts,
(cacheentry *)l->entries->elts, e);
return;
}
}
/* not reached, but when it is no problem... */
return;
}
static cacheentry *retrieve_cache_string(cache *c, char *res, char *key)
{
int i;
int j;
cachelist *l;
cacheentry *e;
for (i = 0; i < c->lists->nelts; i++) {
l = &(((cachelist *)c->lists->elts)[i]);
if (strcmp(l->resource, res) == 0) {
e = cache_tlb_lookup((cachetlbentry *)l->tlb->elts,
(cacheentry *)l->entries->elts, key);
if (e != NULL)
return e;
for (j = 0; j < l->entries->nelts; j++) {
e = &(((cacheentry *)l->entries->elts)[j]);
if (strcmp(e->key, key) == 0) {
return e;
}
}
}
}
return NULL;
}
/*
** +-------------------------------------------------------+
** | |
** | misc functions
** | |
** +-------------------------------------------------------+
*/
static char *subst_prefix_path(request_rec *r, char *input, char *match,
char *subst)
{
char matchbuf[LONG_STRING_LEN];
char substbuf[LONG_STRING_LEN];
char *output;
int l;
output = input;
/* first create a match string which always has a trailing slash */
l = ap_cpystrn(matchbuf, match, sizeof(matchbuf)) - matchbuf;
if (matchbuf[l-1] != '/') {
matchbuf[l] = '/';
matchbuf[l+1] = '\0';
l++;
}
/* now compare the prefix */
if (strncmp(input, matchbuf, l) == 0) {
rewritelog(r, 5, "strip matching prefix: %s -> %s", output, output+l);
output = ap_pstrdup(r->pool, output+l);
/* and now add the base-URL as replacement prefix */
l = ap_cpystrn(substbuf, subst, sizeof(substbuf)) - substbuf;
if (substbuf[l-1] != '/') {
substbuf[l] = '/';
substbuf[l+1] = '\0';
l++;
}
if (output[0] == '/') {
rewritelog(r, 4, "add subst prefix: %s -> %s%s",
output, substbuf, output+1);
output = ap_pstrcat(r->pool, substbuf, output+1, NULL);
}
else {
rewritelog(r, 4, "add subst prefix: %s -> %s%s",
output, substbuf, output);
output = ap_pstrcat(r->pool, substbuf, output, NULL);
}
}
return output;
}
/*
**
** own command line parser which don't have the '\\' problem
**
*/
static int parseargline(char *str, char **a1, char **a2, char **a3)
{
char *cp;
int isquoted;
#define SKIP_WHITESPACE(cp) \
for ( ; *cp == ' ' || *cp == '\t'; ) { \
cp++; \
};
#define CHECK_QUOTATION(cp,isquoted) \
isquoted = 0; \
if (*cp == '"') { \
isquoted = 1; \
cp++; \
}
#define DETERMINE_NEXTSTRING(cp,isquoted) \
for ( ; *cp != '\0'; cp++) { \
if ( (isquoted && (*cp == ' ' || *cp == '\t')) \
|| (*cp == '\\' && (*(cp+1) == ' ' || *(cp+1) == '\t'))) { \
cp++; \
continue; \
} \
if ( (!isquoted && (*cp == ' ' || *cp == '\t')) \
|| (isquoted && *cp == '"') ) { \
break; \
} \
}
cp = str;
SKIP_WHITESPACE(cp);
/* determine first argument */
CHECK_QUOTATION(cp, isquoted);
*a1 = cp;
DETERMINE_NEXTSTRING(cp, isquoted);
if (*cp == '\0') {
return 1;
}
*cp++ = '\0';
SKIP_WHITESPACE(cp);
/* determine second argument */
CHECK_QUOTATION(cp, isquoted);
*a2 = cp;
DETERMINE_NEXTSTRING(cp, isquoted);
if (*cp == '\0') {
*cp++ = '\0';
*a3 = NULL;
return 0;
}
*cp++ = '\0';
SKIP_WHITESPACE(cp);
/* again check if there are only two arguments */
if (*cp == '\0') {
*cp++ = '\0';
*a3 = NULL;
return 0;
}
/* determine second argument */
CHECK_QUOTATION(cp, isquoted);
*a3 = cp;
DETERMINE_NEXTSTRING(cp, isquoted);
*cp++ = '\0';
return 0;
}
static void add_env_variable(request_rec *r, char *s)
{
char var[MAX_STRING_LEN];
char val[MAX_STRING_LEN];
char *cp;
int n;
if ((cp = strchr(s, ':')) != NULL) {
n = ((cp-s) > MAX_STRING_LEN-1 ? MAX_STRING_LEN-1 : (cp-s));
memcpy(var, s, n);
var[n] = '\0';
ap_cpystrn(val, cp+1, sizeof(val));
ap_table_set(r->subprocess_env, var, val);
rewritelog(r, 5, "setting env variable '%s' to '%s'", var, val);
}
}
/*
**
** stat() for only the prefix of a path
**
*/
static int prefix_stat(const char *path, struct stat *sb)
{
char curpath[LONG_STRING_LEN];
char *cp;
ap_cpystrn(curpath, path, sizeof(curpath));
if (curpath[0] != '/') {
return 0;
}
if ((cp = strchr(curpath+1, '/')) != NULL) {
*cp = '\0';
}
if (stat(curpath, sb) == 0) {
return 1;
}
else {
return 0;
}
}
/*
**
** File locking
**
*/
#ifdef USE_FCNTL
static struct flock lock_it;
static struct flock unlock_it;
#endif
static void fd_lock(request_rec *r, int fd)
{
int rc;
#ifdef USE_FCNTL
lock_it.l_whence = SEEK_SET; /* from current point */
lock_it.l_start = 0; /* -"- */
lock_it.l_len = 0; /* until end of file */
lock_it.l_type = F_WRLCK; /* set exclusive/write lock */
lock_it.l_pid = 0; /* pid not actually interesting */
while ( ((rc = fcntl(fd, F_SETLKW, &lock_it)) < 0)
&& (errno == EINTR) ) {
continue;
}
#endif
#ifdef USE_FLOCK
while ( ((rc = flock(fd, LOCK_EX)) < 0)
&& (errno == EINTR) ) {
continue;
}
#endif
#ifdef USE_LOCKING
/* Lock the first byte, always, assume we want to append
and seek to the end afterwards */
lseek(fd, 0, SEEK_SET);
rc = _locking(fd, _LK_LOCK, 1);
lseek(fd, 0, SEEK_END);
#endif
if (rc < 0) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
"mod_rewrite: failed to lock file descriptor");
exit(1);
}
return;
}
static void fd_unlock(request_rec *r, int fd)
{
int rc;
#ifdef USE_FCNTL
unlock_it.l_whence = SEEK_SET; /* from current point */
unlock_it.l_start = 0; /* -"- */
unlock_it.l_len = 0; /* until end of file */
unlock_it.l_type = F_UNLCK; /* unlock */
unlock_it.l_pid = 0; /* pid not actually interesting */
rc = fcntl(fd, F_SETLKW, &unlock_it);
#endif
#ifdef USE_FLOCK
rc = flock(fd, LOCK_UN);
#endif
#ifdef USE_LOCKING
lseek(fd, 0, SEEK_SET);
rc = _locking(fd, _LK_UNLCK, 1);
lseek(fd, 0, SEEK_END);
#endif
if (rc < 0) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, r,
"mod_rewrite: failed to unlock file descriptor");
exit(1);
}
}
/*
**
** Lexicographic Compare
**
*/
static int compare_lexicography(char *cpNum1, char *cpNum2)
{
int i;
int n1, n2;
n1 = strlen(cpNum1);
n2 = strlen(cpNum2);
if (n1 > n2) {
return 1;
}
if (n1 < n2) {
return -1;
}
for (i = 0; i < n1; i++) {
if (cpNum1[i] > cpNum2[i]) {
return 1;
}
if (cpNum1[i] < cpNum2[i]) {
return -1;
}
}
return 0;
}
/*EOF*/