blob: e3acd1698789373032634d9176d7f409dbf1b52b [file] [log] [blame]
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001/*
2 * Functions about FCGI applications and filters.
3 *
4 * Copyright (C) 2019 HAProxy Technologies, Christopher Faulet <cfaulet@haproxy.com>
5 *
6 * This program is free software; you can redistribute it and/or
7 * modify it under the terms of the GNU General Public License
8 * as published by the Free Software Foundation; either version
9 * 2 of the License, or (at your option) any later version.
10 *
11 */
12
Willy Tarreaudcc048a2020-06-04 19:11:43 +020013#include <haproxy/acl.h>
Willy Tarreau4c7e4b72020-05-27 12:58:42 +020014#include <haproxy/api.h>
Willy Tarreau6be78492020-06-05 00:00:29 +020015#include <haproxy/cfgparse.h>
Willy Tarreauc13ed532020-06-02 10:22:45 +020016#include <haproxy/chunk.h>
Willy Tarreau8d366972020-05-27 16:10:29 +020017#include <haproxy/errors.h>
Willy Tarreauc6599682020-06-04 21:33:21 +020018#include <haproxy/fcgi-app.h>
Willy Tarreauc7babd82020-06-04 21:29:29 +020019#include <haproxy/filters.h>
Willy Tarreaub2551052020-06-09 09:07:15 +020020#include <haproxy/global.h>
Willy Tarreau126ba3a2020-06-04 18:26:43 +020021#include <haproxy/http_fetch.h>
Willy Tarreau87735332020-06-04 09:08:41 +020022#include <haproxy/http_htx.h>
Willy Tarreauaeed4a82020-06-04 22:01:04 +020023#include <haproxy/log.h>
Willy Tarreaua264d962020-06-04 22:29:18 +020024#include <haproxy/proxy-t.h>
Willy Tarreau7cd8b6e2020-06-02 17:32:26 +020025#include <haproxy/regex.h>
Willy Tarreaue6ce10b2020-06-04 15:33:47 +020026#include <haproxy/sample.h>
Willy Tarreau1e56f922020-06-04 23:20:13 +020027#include <haproxy/server-t.h>
Willy Tarreau48d25b32020-06-04 18:58:52 +020028#include <haproxy/session.h>
Christopher Fauletc97406f2020-06-22 11:07:18 +020029#include <haproxy/sink.h>
Willy Tarreau48fbcae2020-06-03 18:09:46 +020030#include <haproxy/tools.h>
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020031
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020032
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020033/* Global list of all FCGI applications */
34static struct fcgi_app *fcgi_apps = NULL;
35
36struct flt_ops fcgi_flt_ops;
37const char *fcgi_flt_id = "FCGI filter";
38
39DECLARE_STATIC_POOL(pool_head_fcgi_flt_ctx, "fcgi_flt_ctx", sizeof(struct fcgi_flt_ctx));
40DECLARE_STATIC_POOL(pool_head_fcgi_param_rule, "fcgi_param_rule", sizeof(struct fcgi_param_rule));
41DECLARE_STATIC_POOL(pool_head_fcgi_hdr_rule, "fcgi_hdr_rule", sizeof(struct fcgi_hdr_rule));
42
43/**************************************************************************/
44/***************************** Uitls **************************************/
45/**************************************************************************/
46/* Makes a fcgi parameter name (prefixed by ':fcgi-') with <name> (in
47 * lowercase). All non alphanumeric character are replaced by an underscore
48 * ('_'). The result is copied into <dst>. the corrsponding ist is returned.
49 */
50static struct ist fcgi_param_name(char *dst, const struct ist name)
51{
52 size_t ofs1, ofs2;
53
54 memcpy(dst, ":fcgi-", 6);
55 ofs1 = 6;
56 for (ofs2 = 0; ofs2 < name.len; ofs2++) {
Willy Tarreau90807112020-02-25 08:16:33 +010057 if (isalnum((unsigned char)name.ptr[ofs2]))
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020058 dst[ofs1++] = ist_lc[(unsigned char)name.ptr[ofs2]];
59 else
60 dst[ofs1++] = '_';
61 }
62 return ist2(dst, ofs1);
63}
64
Ilya Shipitsin47d17182020-06-21 21:42:57 +050065/* Returns a pointer to the FCGi application matching the name <name>. NULL is
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020066 * returned if no match found.
67 */
68struct fcgi_app *fcgi_app_find_by_name(const char *name)
69{
70 struct fcgi_app *app;
71
72 for (app = fcgi_apps; app != NULL; app = app->next) {
Tim Duesterhuse5ff1412021-01-02 22:31:53 +010073 if (strcmp(app->name, name) == 0)
Christopher Faulet78fbb9f2019-08-11 23:11:03 +020074 return app;
75 }
76
77 return NULL;
78}
79
80struct fcgi_flt_conf *find_px_fcgi_conf(struct proxy *px)
81{
82 struct flt_conf *fconf;
83
84 list_for_each_entry(fconf, &px->filter_configs, list) {
85 if (fconf->id == fcgi_flt_id)
86 return fconf->conf;
87 }
88 return NULL;
89}
90
91struct fcgi_flt_ctx *find_strm_fcgi_ctx(struct stream *s)
92{
93 struct filter *filter;
94
95 if (!s)
96 return NULL;
97
98 list_for_each_entry(filter, &strm_flt(s)->filters, list) {
99 if (FLT_ID(filter) == fcgi_flt_id)
100 return FLT_CONF(filter);
101 }
102 return NULL;
103}
104
105struct fcgi_app *get_px_fcgi_app(struct proxy *px)
106{
107 struct fcgi_flt_conf *fcgi_conf = find_px_fcgi_conf(px);
108
109 if (fcgi_conf)
110 return fcgi_conf->app;
111 return NULL;
112}
113
114struct fcgi_app *get_strm_fcgi_app(struct stream *s)
115{
116 struct fcgi_flt_ctx *fcgi_ctx = find_strm_fcgi_ctx(s);
117
118 if (fcgi_ctx)
119 return fcgi_ctx->app;
120 return NULL;
121}
122
123static void fcgi_release_rule_conf(struct fcgi_rule_conf *rule)
124{
125 if (!rule)
126 return;
127 free(rule->name);
128 free(rule->value);
129 if (rule->cond) {
130 prune_acl_cond(rule->cond);
131 free(rule->cond);
132 }
133 free(rule);
134}
135
136static void fcgi_release_rule(struct fcgi_rule *rule)
137{
138 if (!rule)
139 return;
140
141 if (!LIST_ISEMPTY(&rule->value)) {
142 struct logformat_node *lf, *lfb;
143
144 list_for_each_entry_safe(lf, lfb, &rule->value, list) {
145 LIST_DEL(&lf->list);
146 release_sample_expr(lf->expr);
147 free(lf->arg);
148 free(lf);
149 }
150 }
151 /* ->cond and ->name are not owned by the rule */
152 free(rule);
153}
154
155/**************************************************************************/
156/*********************** FCGI Sample fetches ******************************/
157/**************************************************************************/
158
159static int smp_fetch_fcgi_docroot(const struct arg *args, struct sample *smp,
160 const char *kw, void *private)
161{
162 struct fcgi_app *app = get_strm_fcgi_app(smp->strm);
163
164 if (!app)
165 return 0;
166
167 smp->data.type = SMP_T_STR;
168 smp->data.u.str.area = app->docroot.ptr;
169 smp->data.u.str.data = app->docroot.len;
170 smp->flags = SMP_F_CONST;
171 return 1;
172}
173
174static int smp_fetch_fcgi_index(const struct arg *args, struct sample *smp,
175 const char *kw, void *private)
176{
177 struct fcgi_app *app = get_strm_fcgi_app(smp->strm);
178
179 if (!app || !istlen(app->index))
180 return 0;
181
182 smp->data.type = SMP_T_STR;
183 smp->data.u.str.area = app->index.ptr;
184 smp->data.u.str.data = app->index.len;
185 smp->flags = SMP_F_CONST;
186 return 1;
187}
188
189/**************************************************************************/
190/************************** FCGI filter ***********************************/
191/**************************************************************************/
192static int fcgi_flt_init(struct proxy *px, struct flt_conf *fconf)
193{
194 fconf->flags |= FLT_CFG_FL_HTX;
195 return 0;
196}
197
198static void fcgi_flt_deinit(struct proxy *px, struct flt_conf *fconf)
199{
200 struct fcgi_flt_conf *fcgi_conf = fconf->conf;
201 struct fcgi_rule *rule, *back;
202
203 if (!fcgi_conf)
204 return;
205
206 free(fcgi_conf->name);
207
208 list_for_each_entry_safe(rule, back, &fcgi_conf->param_rules, list) {
209 LIST_DEL(&rule->list);
210 fcgi_release_rule(rule);
211 }
212
213 list_for_each_entry_safe(rule, back, &fcgi_conf->hdr_rules, list) {
214 LIST_DEL(&rule->list);
215 fcgi_release_rule(rule);
216 }
217
218 free(fcgi_conf);
219}
220
221static int fcgi_flt_check(struct proxy *px, struct flt_conf *fconf)
222{
223 struct fcgi_flt_conf *fcgi_conf = fconf->conf;
224 struct fcgi_rule_conf *crule, *back;
225 struct fcgi_rule *rule = NULL;
226 struct flt_conf *f;
227 char *errmsg = NULL;
228
229 fcgi_conf->app = fcgi_app_find_by_name(fcgi_conf->name);
230 if (!fcgi_conf->app) {
231 ha_alert("config : proxy '%s' : fcgi-app '%s' not found.\n",
232 px->id, fcgi_conf->name);
233 goto err;
234 }
235
236 list_for_each_entry(f, &px->filter_configs, list) {
237 if (f->id == http_comp_flt_id || f->id == cache_store_flt_id)
238 continue;
239 else if ((f->id == fconf->id) && f->conf != fcgi_conf) {
240 ha_alert("config : proxy '%s' : only one fcgi-app supported per backend.\n",
241 px->id);
242 goto err;
243 }
244 else if (f->id != fconf->id) {
245 /* Implicit declaration is only allowed with the
246 * compression and cache. For other filters, an implicit
247 * declaration is required. */
248 ha_alert("config: proxy '%s': require an explicit filter declaration "
249 "to use the fcgi-app '%s'.\n", px->id, fcgi_conf->name);
250 goto err;
251 }
252 }
253
254 list_for_each_entry_safe(crule, back, &fcgi_conf->app->conf.rules, list) {
255 rule = calloc(1, sizeof(*rule));
256 if (!rule) {
257 ha_alert("config : proxy '%s' : out of memory.\n", px->id);
258 goto err;
259 }
260 rule->type = crule->type;
261 rule->name = ist(crule->name);
262 rule->cond = crule->cond;
263 LIST_INIT(&rule->value);
264
265 if (crule->value) {
266 if (!parse_logformat_string(crule->value, px, &rule->value, LOG_OPT_HTTP,
267 SMP_VAL_BE_HRQ_HDR, &errmsg)) {
268 ha_alert("config : proxy '%s' : %s.\n", px->id, errmsg);
269 goto err;
270 }
271 }
272
273 if (rule->type == FCGI_RULE_SET_PARAM || rule->type == FCGI_RULE_UNSET_PARAM)
274 LIST_ADDQ(&fcgi_conf->param_rules, &rule->list);
275 else /* FCGI_RULE_PASS_HDR/FCGI_RULE_HIDE_HDR */
276 LIST_ADDQ(&fcgi_conf->hdr_rules, &rule->list);
277 rule = NULL;
278 }
279 return 0;
280
281 err:
282 free(errmsg);
283 free(rule);
284 return 1;
285}
286
287static int fcgi_flt_start(struct stream *s, struct filter *filter)
288{
289 struct fcgi_flt_conf *fcgi_conf = FLT_CONF(filter);
290 struct fcgi_flt_ctx *fcgi_ctx;
291
292 fcgi_ctx = pool_alloc_dirty(pool_head_fcgi_flt_ctx);
293 if (fcgi_ctx == NULL) {
294 // FIXME: send a warning
295 return 0;
296 }
297 fcgi_ctx->filter = filter;
298 fcgi_ctx->app = fcgi_conf->app;
299 filter->ctx = fcgi_ctx;
300
301 s->req.analysers |= AN_REQ_HTTP_BODY;
302 return 1;
303}
304
305static void fcgi_flt_stop(struct stream *s, struct filter *filter)
306{
307 struct flt_fcgi_ctx *fcgi_ctx = filter->ctx;
308
309 if (!fcgi_ctx)
310 return;
311 pool_free(pool_head_fcgi_flt_ctx, fcgi_ctx);
312 filter->ctx = NULL;
313}
314
315static int fcgi_flt_http_headers(struct stream *s, struct filter *filter, struct http_msg *msg)
316{
317 struct session *sess = strm_sess(s);
318 struct buffer *value;
319 struct fcgi_flt_conf *fcgi_conf = FLT_CONF(filter);
320 struct fcgi_rule *rule;
321 struct fcgi_param_rule *param_rule;
322 struct fcgi_hdr_rule *hdr_rule;
323 struct ebpt_node *node, *next;
324 struct eb_root param_rules = EB_ROOT;
325 struct eb_root hdr_rules = EB_ROOT;
326 struct htx *htx;
327 struct http_hdr_ctx ctx;
328 int ret;
329
330 htx = htxbuf(&msg->chn->buf);
331
332 if (msg->chn->flags & CF_ISRESP) {
333 struct htx_sl *sl;
334
335 /* Remove the header "Status:" from the response */
336 ctx.blk = NULL;
337 while (http_find_header(htx, ist("status"), &ctx, 1))
338 http_remove_header(htx, &ctx);
339
340 /* Add the header "Date:" if not found */
341 ctx.blk = NULL;
342 if (!http_find_header(htx, ist("date"), &ctx, 1)) {
343 struct tm tm;
344
345 get_gmtime(date.tv_sec, &tm);
346 trash.data = strftime(trash.area, trash.size, "%a, %d %b %Y %T %Z", &tm);
347 if (trash.data)
348 http_add_header(htx, ist("date"), ist2(trash.area, trash.data));
349 }
350
351 /* Add the header "Content-Length:" if possible */
352 sl = http_get_stline(htx);
353 if (sl &&
354 (sl->flags & (HTX_SL_F_XFER_LEN|HTX_SL_F_CLEN|HTX_SL_F_CHNK)) == HTX_SL_F_XFER_LEN &&
Christopher Fauletd1ac2b92020-12-02 19:12:22 +0100355 (htx->flags & HTX_FL_EOM)) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200356 struct htx_blk * blk;
357 char *end;
358 size_t len = 0;
359
360 for (blk = htx_get_first_blk(htx); blk; blk = htx_get_next_blk(htx, blk)) {
361 enum htx_blk_type type = htx_get_blk_type(blk);
362
Christopher Fauletd1ac2b92020-12-02 19:12:22 +0100363 if (type == HTX_BLK_TLR || type == HTX_BLK_EOT)
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200364 break;
365 if (type == HTX_BLK_DATA)
366 len += htx_get_blksz(blk);
367 }
368 end = ultoa_o(len, trash.area, trash.size);
369 if (http_add_header(htx, ist("content-length"), ist2(trash.area, end-trash.area)))
370 sl->flags |= HTX_SL_F_CLEN;
371 }
372
373 return 1;
374 }
375
376 /* Analyze the request's headers */
377
378 value = alloc_trash_chunk();
379 if (!value)
380 goto end;
381
382 list_for_each_entry(rule, &fcgi_conf->param_rules, list) {
383 if (rule->cond) {
384 ret = acl_exec_cond(rule->cond, s->be, sess, s, SMP_OPT_DIR_REQ|SMP_OPT_FINAL);
385 ret = acl_pass(ret);
386 if (rule->cond->pol == ACL_COND_UNLESS)
387 ret = !ret;
388
389 /* the rule does not match */
390 if (!ret)
391 continue;
392 }
393
394 param_rule = NULL;
395 node = ebis_lookup_len(&param_rules, rule->name.ptr, rule->name.len);
396 if (node) {
397 param_rule = container_of(node, struct fcgi_param_rule, node);
398 ebpt_delete(node);
399 }
400 else {
401 param_rule = pool_alloc_dirty(pool_head_fcgi_param_rule);
402 if (param_rule == NULL)
403 goto param_rule_err;
404 }
405
406 param_rule->node.key = rule->name.ptr;
407 param_rule->name = rule->name;
408 param_rule->value = &rule->value;
409 ebis_insert(&param_rules, &param_rule->node);
410 }
411
412 list_for_each_entry(rule, &fcgi_conf->hdr_rules, list) {
413 if (rule->cond) {
414 ret = acl_exec_cond(rule->cond, s->be, sess, s, SMP_OPT_DIR_REQ|SMP_OPT_FINAL);
415 ret = acl_pass(ret);
416 if (rule->cond->pol == ACL_COND_UNLESS)
417 ret = !ret;
418
419 /* the rule does not match */
420 if (!ret)
421 continue;
422 }
423
424 hdr_rule = NULL;
425 node = ebis_lookup_len(&hdr_rules, rule->name.ptr, rule->name.len);
426 if (node) {
427 hdr_rule = container_of(node, struct fcgi_hdr_rule, node);
428 ebpt_delete(node);
429 }
430 else {
431 hdr_rule = pool_alloc_dirty(pool_head_fcgi_hdr_rule);
432 if (hdr_rule == NULL)
433 goto hdr_rule_err;
434 }
435
436 hdr_rule->node.key = rule->name.ptr;
437 hdr_rule->name = rule->name;
438 hdr_rule->pass = (rule->type == FCGI_RULE_PASS_HDR);
439 ebis_insert(&hdr_rules, &hdr_rule->node);
440 }
441
442 node = ebpt_first(&param_rules);
443 while (node) {
444 next = ebpt_next(node);
445 ebpt_delete(node);
446 param_rule = container_of(node, struct fcgi_param_rule, node);
447 node = next;
448
449 b_reset(value);
450 value->data = build_logline(s, value->area, value->size, param_rule->value);
Harris Kaufmannb605a732020-07-15 16:26:13 +0200451 if (!value->data) {
452 pool_free(pool_head_fcgi_param_rule, param_rule);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200453 continue;
Harris Kaufmannb605a732020-07-15 16:26:13 +0200454 }
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200455 if (!http_add_header(htx, param_rule->name, ist2(value->area, value->data)))
456 goto rewrite_err;
457 pool_free(pool_head_fcgi_param_rule, param_rule);
458 }
459
460 node = ebpt_first(&hdr_rules);
461 while (node) {
462 next = ebpt_next(node);
463 ebpt_delete(node);
464 hdr_rule = container_of(node, struct fcgi_hdr_rule, node);
465 node = next;
466
467 if (!hdr_rule->pass) {
468 ctx.blk = NULL;
469 while (http_find_header(htx, hdr_rule->name, &ctx, 1))
470 http_remove_header(htx, &ctx);
471 }
472 pool_free(pool_head_fcgi_hdr_rule, hdr_rule);
473 }
474
475 goto end;
476
477 rewrite_err:
478 _HA_ATOMIC_ADD(&sess->fe->fe_counters.failed_rewrites, 1);
Christopher Fauletcff0f732019-12-16 16:13:44 +0100479 _HA_ATOMIC_ADD(&s->be->be_counters.failed_rewrites, 1);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200480 if (sess->listener->counters)
481 _HA_ATOMIC_ADD(&sess->listener->counters->failed_rewrites, 1);
Christopher Fauletcff0f732019-12-16 16:13:44 +0100482 if (objt_server(s->target))
483 _HA_ATOMIC_ADD(&__objt_server(s->target)->counters.failed_rewrites, 1);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200484 hdr_rule_err:
485 node = ebpt_first(&hdr_rules);
486 while (node) {
487 next = ebpt_next(node);
488 ebpt_delete(node);
489 hdr_rule = container_of(node, struct fcgi_hdr_rule, node);
490 node = next;
491 pool_free(pool_head_fcgi_hdr_rule, hdr_rule);
492 }
493 param_rule_err:
494 node = ebpt_first(&param_rules);
495 while (node) {
496 next = ebpt_next(node);
497 ebpt_delete(node);
498 param_rule = container_of(node, struct fcgi_param_rule, node);
499 node = next;
500 pool_free(pool_head_fcgi_param_rule, param_rule);
501 }
502 end:
503 free_trash_chunk(value);
504 return 1;
505}
506
507struct flt_ops fcgi_flt_ops = {
508 .init = fcgi_flt_init,
509 .check = fcgi_flt_check,
510 .deinit = fcgi_flt_deinit,
511
512 .attach = fcgi_flt_start,
513 .detach = fcgi_flt_stop,
514
515 .http_headers = fcgi_flt_http_headers,
516};
517
518/**************************************************************************/
519/*********************** FCGI Config parsing ******************************/
520/**************************************************************************/
521static int
522parse_fcgi_flt(char **args, int *cur_arg, struct proxy *px,
523 struct flt_conf *fconf, char **err, void *private)
524{
525 struct flt_conf *f, *back;
526 struct fcgi_flt_conf *fcgi_conf = NULL;
527 char *name = NULL;
528 int pos = *cur_arg;
529
530 /* Get the fcgi-app name*/
Christopher Faulet0ce57b02019-09-18 11:18:33 +0200531 if (!*args[pos + 1]) {
532 memprintf(err, "%s : expects a <name> argument", args[pos]);
533 goto err;
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200534 }
Christopher Faulet0ce57b02019-09-18 11:18:33 +0200535 name = strdup(args[pos + 1]);
536 if (!name) {
537 memprintf(err, "%s '%s' : out of memory", args[pos], args[pos + 1]);
538 goto err;
539 }
540 pos += 2;
541
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200542 /* Check if an fcgi-app filter with the same name already exists */
543 list_for_each_entry_safe(f, back, &px->filter_configs, list) {
544 if (f->id != fcgi_flt_id)
545 continue;
546 fcgi_conf = f->conf;
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100547 if (strcmp(name, fcgi_conf->name) != 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200548 fcgi_conf = NULL;
549 continue;
550 }
551
552 /* Place the filter at its right position */
553 LIST_DEL(&f->list);
554 free(f);
555 free(name);
556 name = NULL;
557 break;
558 }
559
560 /* No other fcgi-app filter found, create configuration for the explicit one */
561 if (!fcgi_conf) {
562 fcgi_conf = calloc(1, sizeof(*fcgi_conf));
563 if (!fcgi_conf) {
564 memprintf(err, "%s: out of memory", args[*cur_arg]);
565 goto err;
566 }
567 fcgi_conf->name = name;
568 LIST_INIT(&fcgi_conf->param_rules);
569 LIST_INIT(&fcgi_conf->hdr_rules);
570 }
571
572 fconf->id = fcgi_flt_id;
573 fconf->conf = fcgi_conf;
574 fconf->ops = &fcgi_flt_ops;
575
576 *cur_arg = pos;
577 return 0;
578 err:
579 free(name);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200580 return -1;
581}
582
583/* Parses the "use-fcgi-app" proxy keyword */
584static int proxy_parse_use_fcgi_app(char **args, int section, struct proxy *curpx,
585 struct proxy *defpx, const char *file, int line,
586 char **err)
587{
588 struct flt_conf *fconf = NULL;
589 struct fcgi_flt_conf *fcgi_conf = NULL;
590 int retval = 0;
591
592 if (!(curpx->cap & PR_CAP_BE)) {
593 memprintf(err, "'%s' only available in backend or listen section", args[0]);
594 retval = -1;
595 goto end;
596 }
597
598 if (!*(args[1])) {
599 memprintf(err, "'%s' expects <name> as argument", args[0]);
600 retval = -1;
601 goto end;
602 }
603
604 /* check if a fcgi filter was already registered with this name,
605 * if that's the case, must use it. */
606 list_for_each_entry(fconf, &curpx->filter_configs, list) {
607 if (fconf->id == fcgi_flt_id) {
608 fcgi_conf = fconf->conf;
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100609 if (fcgi_conf && strcmp((char *)fcgi_conf->name, args[1]) == 0)
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200610 goto end;
611 memprintf(err, "'%s' : only one fcgi-app supported per backend", args[0]);
612 retval = -1;
613 goto end;
614 }
615 }
616
617 /* Create the FCGI filter config */
618 fcgi_conf = calloc(1, sizeof(*fcgi_conf));
619 if (!fcgi_conf)
620 goto err;
621 fcgi_conf->name = strdup(args[1]);
622 LIST_INIT(&fcgi_conf->param_rules);
623 LIST_INIT(&fcgi_conf->hdr_rules);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200624
625 /* Register the filter */
626 fconf = calloc(1, sizeof(*fconf));
627 if (!fconf)
628 goto err;
629 fconf->id = fcgi_flt_id;
630 fconf->conf = fcgi_conf;
631 fconf->ops = &fcgi_flt_ops;
632 LIST_ADDQ(&curpx->filter_configs, &fconf->list);
633
634 end:
635 return retval;
636 err:
637 if (fcgi_conf) {
638 free(fcgi_conf->name);
639 free(fcgi_conf);
640 }
641 memprintf(err, "out of memory");
642 retval = -1;
643 goto end;
644}
645
646/* Finishes the parsing of FCGI application of proxies and servers */
647static int cfg_fcgi_apps_postparser()
648{
649 struct fcgi_app *curapp;
650 struct proxy *px;
651 struct server *srv;
Christopher Fauletc97406f2020-06-22 11:07:18 +0200652 struct logsrv *logsrv;
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200653 int err_code = 0;
654
655 for (px = proxies_list; px; px = px->next) {
656 struct fcgi_flt_conf *fcgi_conf = find_px_fcgi_conf(px);
657 int nb_fcgi_srv = 0;
658
659 if (px->mode == PR_MODE_TCP && fcgi_conf) {
660 ha_alert("config : proxy '%s': FCGI application cannot be used in non-HTTP mode.\n",
661 px->id);
662 err_code |= ERR_ALERT | ERR_FATAL;
663 goto end;
664 }
665
666 for (srv = px->srv; srv; srv = srv->next) {
667 if (srv->mux_proto && isteq(srv->mux_proto->token, ist("fcgi"))) {
668 nb_fcgi_srv++;
669 if (fcgi_conf)
670 continue;
671 ha_alert("config : proxy '%s': FCGI server '%s' has no FCGI app configured.\n",
672 px->id, srv->id);
673 err_code |= ERR_ALERT | ERR_FATAL;
674 goto end;
675 }
676 }
677 if (fcgi_conf && !nb_fcgi_srv) {
678 ha_alert("config : proxy '%s': FCGI app configured but no FCGI server found.\n",
679 px->id);
680 err_code |= ERR_ALERT | ERR_FATAL;
681 goto end;
682 }
683 }
684
685 for (curapp = fcgi_apps; curapp != NULL; curapp = curapp->next) {
686 if (!istlen(curapp->docroot)) {
687 ha_alert("config : fcgi-app '%s': no docroot configured.\n",
688 curapp->name);
689 err_code |= ERR_ALERT | ERR_FATAL;
690 goto end;
691 }
692 if (!(curapp->flags & (FCGI_APP_FL_MPXS_CONNS|FCGI_APP_FL_GET_VALUES))) {
693 if (curapp->maxreqs > 1) {
694 ha_warning("config : fcgi-app '%s': multiplexing not supported, "
695 "ignore the option 'max-reqs'.\n",
696 curapp->name);
697 err_code |= ERR_WARN;
698 }
699 curapp->maxreqs = 1;
700 }
Christopher Fauletc97406f2020-06-22 11:07:18 +0200701
702 list_for_each_entry(logsrv, &curapp->logsrvs, list) {
703 if (logsrv->type == LOG_TARGET_BUFFER) {
704 struct sink *sink = sink_find(logsrv->ring_name);
705
706 if (!sink || sink->type != SINK_TYPE_BUFFER) {
Ilya Shipitsin46a030c2020-07-05 16:36:08 +0500707 ha_alert("config : fcgi-app '%s' : log server uses unknown ring named '%s'.\n",
Christopher Fauletc97406f2020-06-22 11:07:18 +0200708 curapp->name, logsrv->ring_name);
709 err_code |= ERR_ALERT | ERR_FATAL;
710 }
711 logsrv->sink = sink;
712 }
713 }
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200714 }
715
716 end:
717 return err_code;
718}
719
720static int fcgi_app_add_rule(struct fcgi_app *curapp, enum fcgi_rule_type type, char *name, char *value,
721 struct acl_cond *cond, char **err)
722{
723 struct fcgi_rule_conf *rule;
724
725 /* Param not found, add a new one */
726 rule = calloc(1, sizeof(*rule));
727 if (!rule)
728 goto err;
729 LIST_INIT(&rule->list);
730 rule->type = type;
731 if (type == FCGI_RULE_SET_PARAM || type == FCGI_RULE_UNSET_PARAM) {
732 struct ist fname = fcgi_param_name(trash.area, ist(name));
733 rule->name = my_strndup(fname.ptr, fname.len);
734 }
Christopher Fauletbc96c902019-12-02 10:33:31 +0100735 else { /* FCGI_RULE_PASS_HDR/FCGI_RULE_HIDE_HDR */
736 struct ist fname = ist2bin_lc(trash.area, ist(name));
737 rule->name = my_strndup(fname.ptr, fname.len);
738 }
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200739 if (!rule->name)
740 goto err;
741
742 if (value) {
743 rule->value = strdup(value);
744 if (!rule->value)
745 goto err;
746 }
747 rule->cond = cond;
748 LIST_ADDQ(&curapp->conf.rules, &rule->list);
749 return 1;
750
751 err:
752 if (rule) {
753 free(rule->name);
754 free(rule->value);
755 free(rule);
756 }
757 if (cond) {
758 prune_acl_cond(cond);
759 free(cond);
760 }
761 memprintf(err, "out of memory");
762 return 0;
763}
764
765/* Parses "fcgi-app" section */
766static int cfg_parse_fcgi_app(const char *file, int linenum, char **args, int kwm)
767{
768 static struct fcgi_app *curapp = NULL;
769 struct acl_cond *cond = NULL;
770 char *name, *value = NULL;
771 enum fcgi_rule_type type;
772 int err_code = 0;
773 const char *err;
774 char *errmsg = NULL;
775
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100776 if (strcmp(args[0], "fcgi-app") == 0) { /* new fcgi-app */
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200777 if (!*(args[1])) {
778 ha_alert("parsing [%s:%d]: '%s' expects <name> as argument.\n",
779 file, linenum, args[0]);
780 err_code |= ERR_ALERT | ERR_FATAL;
781 goto out;
782 }
783 if (alertif_too_many_args(1, file, linenum, args, &err_code))
784 goto out;
785
786 err = invalid_char(args[1]);
787 if (err) {
788 ha_alert("parsing [%s:%d]: character '%c' is not permitted in '%s' name '%s'.\n",
789 file, linenum, *err, args[0], args[1]);
790 err_code |= ERR_ALERT | ERR_FATAL;
791 goto out;
792 }
793
794 for (curapp = fcgi_apps; curapp != NULL; curapp = curapp->next) {
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100795 if (strcmp(curapp->name, args[1]) == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200796 ha_alert("Parsing [%s:%d]: fcgi-app section '%s' has the same name as another one declared at %s:%d.\n",
797 file, linenum, args[1], curapp->conf.file, curapp->conf.line);
798 err_code |= ERR_ALERT | ERR_FATAL;
799 }
800 }
801
802 curapp = calloc(1, sizeof(*curapp));
803 if (!curapp) {
804 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
805 err_code |= ERR_ALERT | ERR_ABORT;
806 goto out;
807 }
808
809 curapp->next = fcgi_apps;
810 fcgi_apps = curapp;
811 curapp->flags = FCGI_APP_FL_KEEP_CONN;
812 curapp->docroot = ist(NULL);
813 curapp->index = ist(NULL);
814 curapp->pathinfo_re = NULL;
815 curapp->name = strdup(args[1]);
816 curapp->maxreqs = 1;
817 curapp->conf.file = strdup(file);
818 curapp->conf.line = linenum;
819 LIST_INIT(&curapp->acls);
820 LIST_INIT(&curapp->logsrvs);
821 LIST_INIT(&curapp->conf.args.list);
822 LIST_INIT(&curapp->conf.rules);
823
824 /* Set info about authentication */
825 if (!fcgi_app_add_rule(curapp, FCGI_RULE_SET_PARAM, "REMOTE_USER", "%[http_auth_user]", NULL, &errmsg) ||
826 !fcgi_app_add_rule(curapp, FCGI_RULE_SET_PARAM, "AUTH_TYPE", "%[http_auth_type]", NULL, &errmsg)) {
827 ha_alert("parsing [%s:%d] : '%s' : %s.\n", file, linenum,
828 args[1], errmsg);
829 err_code |= ERR_ALERT | ERR_FATAL;
830 }
831
832 /* Hide hop-by-hop headers by default */
833 if (!fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "connection", NULL, NULL, &errmsg) ||
834 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "keep-alive", NULL, NULL, &errmsg) ||
835 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "authorization", NULL, NULL, &errmsg) ||
836 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "proxy", NULL, NULL, &errmsg) ||
837 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "proxy-authorization", NULL, NULL, &errmsg) ||
838 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "proxy-authenticate", NULL, NULL, &errmsg) ||
839 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "te", NULL, NULL, &errmsg) ||
840 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "trailers", NULL, NULL, &errmsg) ||
841 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "transfer-encoding", NULL, NULL, &errmsg) ||
842 !fcgi_app_add_rule(curapp, FCGI_RULE_HIDE_HDR, "upgrade", NULL, NULL, &errmsg)) {
843 ha_alert("parsing [%s:%d] : '%s' : %s.\n", file, linenum,
844 args[1], errmsg);
845 err_code |= ERR_ALERT | ERR_FATAL;
846 }
847 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100848 else if (strcmp(args[0], "docroot") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200849 if (!*(args[1])) {
850 ha_alert("parsing [%s:%d] : '%s' expects <path> as argument.\n",
851 file, linenum, args[0]);
852 err_code |= ERR_ALERT | ERR_FATAL;
853 goto out;
854 }
855 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
856 goto out;
Tim Duesterhused526372020-03-05 17:56:33 +0100857 istfree(&curapp->docroot);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200858 curapp->docroot = ist2(strdup(args[1]), strlen(args[1]));
Tim Duesterhused526372020-03-05 17:56:33 +0100859 if (!isttest(curapp->docroot)) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200860 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
861 err_code |= ERR_ALERT | ERR_ABORT;
862 }
863 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100864 else if (strcmp(args[0], "path-info") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200865 if (!*(args[1])) {
866 ha_alert("parsing [%s:%d] : '%s' expects <regex> as argument.\n",
867 file, linenum, args[0]);
868 err_code |= ERR_ALERT | ERR_FATAL;
869 goto out;
870 }
871 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
872 goto out;
873 regex_free(curapp->pathinfo_re);
874 curapp->pathinfo_re = regex_comp(args[1], 1, 1, &errmsg);
875 if (!curapp->pathinfo_re) {
876 ha_alert("parsing [%s:%d] : '%s' : %s.\n", file, linenum,
877 args[1], errmsg);
878 err_code |= ERR_ALERT | ERR_FATAL;
879 }
880 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100881 else if (strcmp(args[0], "index") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200882 if (!*(args[1])) {
883 ha_alert("parsing [%s:%d] : '%s' expects <filename> as argument.\n",
884 file, linenum, args[0]);
885 err_code |= ERR_ALERT | ERR_FATAL;
886 goto out;
887 }
888 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
889 goto out;
Tim Duesterhused526372020-03-05 17:56:33 +0100890 istfree(&curapp->index);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200891 curapp->index = ist2(strdup(args[1]), strlen(args[1]));
Tim Duesterhused526372020-03-05 17:56:33 +0100892 if (!isttest(curapp->index)) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200893 ha_alert("parsing [%s:%d] : out of memory.\n", file, linenum);
894 err_code |= ERR_ALERT | ERR_ABORT;
895 }
896 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100897 else if (strcmp(args[0], "acl") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200898 const char *err;
899 err = invalid_char(args[1]);
900 if (err) {
901 ha_alert("parsing [%s:%d] : character '%c' is not permitted in acl name '%s'.\n",
902 file, linenum, *err, args[1]);
903 err_code |= ERR_ALERT | ERR_FATAL;
Tim Duesterhus0cf811a2020-02-05 21:00:50 +0100904 goto out;
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200905 }
Tim Duesterhus0cf811a2020-02-05 21:00:50 +0100906 if (strcasecmp(args[1], "or") == 0) {
Tim Duesterhusf1bc24c2020-02-06 22:04:03 +0100907 ha_alert("parsing [%s:%d] : acl name '%s' will never match. 'or' is used to express a "
Tim Duesterhus0cf811a2020-02-05 21:00:50 +0100908 "logical disjunction within a condition.\n",
909 file, linenum, args[1]);
910 err_code |= ERR_ALERT | ERR_FATAL;
911 goto out;
912 }
913 if (parse_acl((const char **)args+1, &curapp->acls, &errmsg, &curapp->conf.args, file, linenum) == NULL) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200914 ha_alert("parsing [%s:%d] : error detected while parsing ACL '%s' : %s.\n",
915 file, linenum, args[1], errmsg);
916 err_code |= ERR_ALERT | ERR_FATAL;
Tim Duesterhus0cf811a2020-02-05 21:00:50 +0100917 goto out;
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200918 }
919 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100920 else if (strcmp(args[0], "set-param") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200921 if (!*(args[1]) || !*(args[2])) {
922 ha_alert("parsing [%s:%d] : '%s' expects <name> and <value> as arguments.\n",
923 file, linenum, args[0]);
924 err_code |= ERR_ALERT | ERR_FATAL;
925 goto out;
926 }
927 type = FCGI_RULE_SET_PARAM;
928 name = args[1];
929 value = args[2];
930 cond = NULL;
931 args += 3;
932
933 parse_cond_rule:
934 if (!*(args[0])) /* No condition */
935 goto add_rule;
936
937 if (strcmp(args[0], "if") == 0)
938 cond = parse_acl_cond((const char **)args+1, &curapp->acls, ACL_COND_IF, &errmsg, &curapp->conf.args,
939 file, linenum);
940 else if (strcmp(args[0], "unless") == 0)
941 cond = parse_acl_cond((const char **)args+1, &curapp->acls, ACL_COND_UNLESS, &errmsg, &curapp->conf.args,
942 file, linenum);
943 if (!cond) {
944 ha_alert("parsing [%s:%d] : '%s' : %s.\n", file, linenum,
945 name, errmsg);
946 err_code |= ERR_ALERT | ERR_FATAL;
947 }
948 add_rule:
949 if (!fcgi_app_add_rule(curapp, type, name, value, cond, &errmsg)) {
950 ha_alert("parsing [%s:%d] : '%s' : %s.\n", file, linenum,
951 name, errmsg);
952 err_code |= ERR_ALERT | ERR_FATAL;
953 }
954 }
955#if 0 /* Disabled for now */
956 else if (!strcmp(args[0], "unset-param")) {
957 if (!*(args[1])) {
958 ha_alert("parsing [%s:%d] : '%s' expects <name> as arguments.\n",
959 file, linenum, args[0]);
960 err_code |= ERR_ALERT | ERR_FATAL;
961 goto out;
962 }
963 type = FCGI_RULE_UNSET_PARAM;
964 name = args[1];
965 value = NULL;
966 cond = NULL;
967 args += 2;
968 goto parse_cond_rule;
969 }
970#endif
Tim Duesterhuse5ff1412021-01-02 22:31:53 +0100971 else if (strcmp(args[0], "pass-header") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +0200972 if (!*(args[1])) {
973 ha_alert("parsing [%s:%d] : '%s' expects <name> as arguments.\n",
974 file, linenum, args[0]);
975 err_code |= ERR_ALERT | ERR_FATAL;
976 goto out;
977 }
978 type = FCGI_RULE_PASS_HDR;
979 name = args[1];
980 value = NULL;
981 cond = NULL;
982 args += 2;
983 goto parse_cond_rule;
984 }
985#if 0 /* Disabled for now */
986 else if (!strcmp(args[0], "hide-header")) {
987 if (!*(args[1])) {
988 ha_alert("parsing [%s:%d] : '%s' expects <name> as arguments.\n",
989 file, linenum, args[0]);
990 err_code |= ERR_ALERT | ERR_FATAL;
991 goto out;
992 }
993 type = FCGI_RULE_HIDE_HDR;
994 name = args[1];
995 value = NULL;
996 cond = NULL;
997 args += 2;
998 goto parse_cond_rule;
999 }
1000#endif
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001001 else if (strcmp(args[0], "option") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001002 if (!*(args[1])) {
1003 ha_alert("parsing [%s:%d]: '%s' expects an option name.\n",
1004 file, linenum, args[0]);
1005 err_code |= ERR_ALERT | ERR_FATAL;
1006 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001007 else if (strcmp(args[1], "keep-conn") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001008 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
1009 goto out;
1010 if (kwm == KWM_STD)
1011 curapp->flags |= FCGI_APP_FL_KEEP_CONN;
1012 else if (kwm == KWM_NO)
1013 curapp->flags &= ~FCGI_APP_FL_KEEP_CONN;
1014 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001015 else if (strcmp(args[1], "get-values") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001016 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
1017 goto out;
1018 if (kwm == KWM_STD)
1019 curapp->flags |= FCGI_APP_FL_GET_VALUES;
1020 else if (kwm == KWM_NO)
1021 curapp->flags &= ~FCGI_APP_FL_GET_VALUES;
1022 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001023 else if (strcmp(args[1], "mpxs-conns") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001024 if (alertif_too_many_args_idx(0, 1, file, linenum, args, &err_code))
1025 goto out;
1026 if (kwm == KWM_STD)
1027 curapp->flags |= FCGI_APP_FL_MPXS_CONNS;
1028 else if (kwm == KWM_NO)
1029 curapp->flags &= ~FCGI_APP_FL_MPXS_CONNS;
1030 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001031 else if (strcmp(args[1], "max-reqs") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001032 if (kwm != KWM_STD) {
1033 ha_alert("parsing [%s:%d]: negation/default is not supported for option '%s'.\n",
1034 file, linenum, args[1]);
1035 err_code |= ERR_ALERT | ERR_FATAL;
1036 goto out;
1037 }
1038 if (!*(args[2])) {
1039 ha_alert("parsing [%s:%d]: option '%s' expects an integer argument.\n",
1040 file, linenum, args[1]);
1041 err_code |= ERR_ALERT | ERR_FATAL;
1042 goto out;
1043 }
1044 if (alertif_too_many_args_idx(1, 1, file, linenum, args, &err_code))
1045 goto out;
1046
1047 curapp->maxreqs = atol(args[2]);
1048 if (!curapp->maxreqs) {
1049 ha_alert("parsing [%s:%d]: option '%s' expects a strictly positive integer argument.\n",
1050 file, linenum, args[1]);
1051 err_code |= ERR_ALERT | ERR_FATAL;
1052 goto out;
1053 }
1054 }
1055 else {
1056 ha_alert("parsing [%s:%d] : unknown option '%s'.\n", file, linenum, args[1]);
1057 err_code |= ERR_ALERT | ERR_FATAL;
1058 }
1059 }
Tim Duesterhuse5ff1412021-01-02 22:31:53 +01001060 else if (strcmp(args[0], "log-stderr") == 0) {
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001061 if (!parse_logsrv(args, &curapp->logsrvs, (kwm == KWM_NO), &errmsg)) {
1062 ha_alert("parsing [%s:%d] : %s : %s\n", file, linenum, args[0], errmsg);
1063 err_code |= ERR_ALERT | ERR_FATAL;
1064 }
1065 }
1066 else {
1067 ha_alert("parsing [%s:%d]: unknown keyword '%s' in '%s' section\n", file, linenum, args[0], "fcgi-app");
1068 err_code |= ERR_ALERT | ERR_FATAL;
1069 }
1070
1071out:
1072 free(errmsg);
1073 return err_code;
1074}
1075
1076
1077/**************************************************************************/
1078/*********************** FCGI Deinit functions ****************************/
1079/**************************************************************************/
1080void fcgi_apps_deinit()
1081{
1082 struct fcgi_app *curapp, *nextapp;
1083 struct logsrv *log, *logb;
1084
1085 for (curapp = fcgi_apps; curapp != NULL; curapp = nextapp) {
1086 struct fcgi_rule_conf *rule, *back;
1087
1088 free(curapp->name);
Tim Duesterhused526372020-03-05 17:56:33 +01001089 istfree(&curapp->docroot);
1090 istfree(&curapp->index);
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001091 regex_free(curapp->pathinfo_re);
1092 free(curapp->conf.file);
1093
1094 list_for_each_entry_safe(log, logb, &curapp->logsrvs, list) {
1095 LIST_DEL(&log->list);
1096 free(log);
1097 }
1098
1099 list_for_each_entry_safe(rule, back, &curapp->conf.rules, list) {
1100 LIST_DEL(&rule->list);
1101 fcgi_release_rule_conf(rule);
1102 }
1103
1104 nextapp = curapp->next;
1105 free(curapp);
1106 }
1107}
1108
1109
1110/**************************************************************************/
1111/*************** Keywords definition and registration *********************/
1112/**************************************************************************/
1113static struct cfg_kw_list cfg_kws = {ILH, {
1114 { CFG_LISTEN, "use-fcgi-app", proxy_parse_use_fcgi_app },
1115 { 0, NULL, NULL },
1116}};
1117
1118// FIXME: Add rep.fcgi smp_fetch
1119static struct sample_fetch_kw_list sample_fetch_keywords = {ILH, {
1120 { "fcgi.docroot", smp_fetch_fcgi_docroot, 0, NULL, SMP_T_STR, SMP_USE_HRQHV },
Willy Tarreaufc41e252019-09-27 22:45:17 +02001121 { "fcgi.index", smp_fetch_fcgi_index, 0, NULL, SMP_T_STR, SMP_USE_HRQHV },
1122 { /* END */ }
Christopher Faulet78fbb9f2019-08-11 23:11:03 +02001123}};
1124
1125/* Declare the filter parser for "fcgi-app" keyword */
1126static struct flt_kw_list filter_kws = { "FCGI", { }, {
1127 { "fcgi-app", parse_fcgi_flt, NULL },
1128 { NULL, NULL, NULL },
1129 }
1130};
1131
1132INITCALL1(STG_REGISTER, sample_register_fetches, &sample_fetch_keywords);
1133INITCALL1(STG_REGISTER, cfg_register_keywords, &cfg_kws);
1134INITCALL1(STG_REGISTER, flt_register_keywords, &filter_kws);
1135
1136INITCALL1(STG_REGISTER, hap_register_post_deinit, fcgi_apps_deinit);
1137
1138REGISTER_CONFIG_SECTION("fcgi-app", cfg_parse_fcgi_app, NULL);
1139REGISTER_CONFIG_POSTPARSER("fcgi-apps", cfg_fcgi_apps_postparser);
1140
1141/*
1142 * Local variables:
1143 * c-indent-level: 8
1144 * c-basic-offset: 8
1145 * End:
1146 */