|  | 
 | /* | 
 |  * Copyright (C) Unbit S.a.s. 2009-2010 | 
 |  * Copyright (C) 2008 Manlio Perillo (manlio.perillo@gmail.com) | 
 |  * Copyright (C) Igor Sysoev | 
 |  * Copyright (C) Nginx, Inc. | 
 |  */ | 
 |  | 
 |  | 
 | #include <ngx_config.h> | 
 | #include <ngx_core.h> | 
 | #include <ngx_http.h> | 
 |  | 
 |  | 
 | typedef struct { | 
 |     ngx_array_t                caches;  /* ngx_http_file_cache_t * */ | 
 | } ngx_http_uwsgi_main_conf_t; | 
 |  | 
 |  | 
 | typedef struct { | 
 |     ngx_array_t               *flushes; | 
 |     ngx_array_t               *lengths; | 
 |     ngx_array_t               *values; | 
 |     ngx_uint_t                 number; | 
 |     ngx_hash_t                 hash; | 
 | } ngx_http_uwsgi_params_t; | 
 |  | 
 |  | 
 | typedef struct { | 
 |     ngx_http_upstream_conf_t   upstream; | 
 |  | 
 |     ngx_http_uwsgi_params_t    params; | 
 | #if (NGX_HTTP_CACHE) | 
 |     ngx_http_uwsgi_params_t    params_cache; | 
 | #endif | 
 |     ngx_array_t               *params_source; | 
 |  | 
 |     ngx_array_t               *uwsgi_lengths; | 
 |     ngx_array_t               *uwsgi_values; | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |     ngx_http_complex_value_t   cache_key; | 
 | #endif | 
 |  | 
 |     ngx_str_t                  uwsgi_string; | 
 |  | 
 |     ngx_uint_t                 modifier1; | 
 |     ngx_uint_t                 modifier2; | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |     ngx_uint_t                 ssl; | 
 |     ngx_uint_t                 ssl_protocols; | 
 |     ngx_str_t                  ssl_ciphers; | 
 |     ngx_uint_t                 ssl_verify_depth; | 
 |     ngx_str_t                  ssl_trusted_certificate; | 
 |     ngx_str_t                  ssl_crl; | 
 |     ngx_array_t               *ssl_conf_commands; | 
 | #endif | 
 | } ngx_http_uwsgi_loc_conf_t; | 
 |  | 
 |  | 
 | static ngx_int_t ngx_http_uwsgi_eval(ngx_http_request_t *r, | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf); | 
 | static ngx_int_t ngx_http_uwsgi_create_request(ngx_http_request_t *r); | 
 | static ngx_int_t ngx_http_uwsgi_reinit_request(ngx_http_request_t *r); | 
 | static ngx_int_t ngx_http_uwsgi_process_status_line(ngx_http_request_t *r); | 
 | static ngx_int_t ngx_http_uwsgi_process_header(ngx_http_request_t *r); | 
 | static ngx_int_t ngx_http_uwsgi_input_filter_init(void *data); | 
 | static void ngx_http_uwsgi_abort_request(ngx_http_request_t *r); | 
 | static void ngx_http_uwsgi_finalize_request(ngx_http_request_t *r, | 
 |     ngx_int_t rc); | 
 |  | 
 | static void *ngx_http_uwsgi_create_main_conf(ngx_conf_t *cf); | 
 | static void *ngx_http_uwsgi_create_loc_conf(ngx_conf_t *cf); | 
 | static char *ngx_http_uwsgi_merge_loc_conf(ngx_conf_t *cf, void *parent, | 
 |     void *child); | 
 | static ngx_int_t ngx_http_uwsgi_init_params(ngx_conf_t *cf, | 
 |     ngx_http_uwsgi_loc_conf_t *conf, ngx_http_uwsgi_params_t *params, | 
 |     ngx_keyval_t *default_params); | 
 |  | 
 | static char *ngx_http_uwsgi_pass(ngx_conf_t *cf, ngx_command_t *cmd, | 
 |     void *conf); | 
 | static char *ngx_http_uwsgi_store(ngx_conf_t *cf, ngx_command_t *cmd, | 
 |     void *conf); | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 | static ngx_int_t ngx_http_uwsgi_create_key(ngx_http_request_t *r); | 
 | static char *ngx_http_uwsgi_cache(ngx_conf_t *cf, ngx_command_t *cmd, | 
 |     void *conf); | 
 | static char *ngx_http_uwsgi_cache_key(ngx_conf_t *cf, ngx_command_t *cmd, | 
 |     void *conf); | 
 | #endif | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 | static char *ngx_http_uwsgi_ssl_password_file(ngx_conf_t *cf, | 
 |     ngx_command_t *cmd, void *conf); | 
 | static char *ngx_http_uwsgi_ssl_conf_command_check(ngx_conf_t *cf, void *post, | 
 |     void *data); | 
 | static ngx_int_t ngx_http_uwsgi_set_ssl(ngx_conf_t *cf, | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf); | 
 | #endif | 
 |  | 
 |  | 
 | static ngx_conf_num_bounds_t  ngx_http_uwsgi_modifier_bounds = { | 
 |     ngx_conf_check_num_bounds, 0, 255 | 
 | }; | 
 |  | 
 |  | 
 | static ngx_conf_bitmask_t ngx_http_uwsgi_next_upstream_masks[] = { | 
 |     { ngx_string("error"), NGX_HTTP_UPSTREAM_FT_ERROR }, | 
 |     { ngx_string("timeout"), NGX_HTTP_UPSTREAM_FT_TIMEOUT }, | 
 |     { ngx_string("invalid_header"), NGX_HTTP_UPSTREAM_FT_INVALID_HEADER }, | 
 |     { ngx_string("non_idempotent"), NGX_HTTP_UPSTREAM_FT_NON_IDEMPOTENT }, | 
 |     { ngx_string("http_500"), NGX_HTTP_UPSTREAM_FT_HTTP_500 }, | 
 |     { ngx_string("http_503"), NGX_HTTP_UPSTREAM_FT_HTTP_503 }, | 
 |     { ngx_string("http_403"), NGX_HTTP_UPSTREAM_FT_HTTP_403 }, | 
 |     { ngx_string("http_404"), NGX_HTTP_UPSTREAM_FT_HTTP_404 }, | 
 |     { ngx_string("http_429"), NGX_HTTP_UPSTREAM_FT_HTTP_429 }, | 
 |     { ngx_string("updating"), NGX_HTTP_UPSTREAM_FT_UPDATING }, | 
 |     { ngx_string("off"), NGX_HTTP_UPSTREAM_FT_OFF }, | 
 |     { ngx_null_string, 0 } | 
 | }; | 
 |  | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |  | 
 | static ngx_conf_bitmask_t  ngx_http_uwsgi_ssl_protocols[] = { | 
 |     { ngx_string("SSLv2"), NGX_SSL_SSLv2 }, | 
 |     { ngx_string("SSLv3"), NGX_SSL_SSLv3 }, | 
 |     { ngx_string("TLSv1"), NGX_SSL_TLSv1 }, | 
 |     { ngx_string("TLSv1.1"), NGX_SSL_TLSv1_1 }, | 
 |     { ngx_string("TLSv1.2"), NGX_SSL_TLSv1_2 }, | 
 |     { ngx_string("TLSv1.3"), NGX_SSL_TLSv1_3 }, | 
 |     { ngx_null_string, 0 } | 
 | }; | 
 |  | 
 | static ngx_conf_post_t  ngx_http_uwsgi_ssl_conf_command_post = | 
 |     { ngx_http_uwsgi_ssl_conf_command_check }; | 
 |  | 
 | #endif | 
 |  | 
 |  | 
 | ngx_module_t  ngx_http_uwsgi_module; | 
 |  | 
 |  | 
 | static ngx_command_t ngx_http_uwsgi_commands[] = { | 
 |  | 
 |     { ngx_string("uwsgi_pass"), | 
 |       NGX_HTTP_LOC_CONF|NGX_HTTP_LIF_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_uwsgi_pass, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       0, | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_modifier1"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_num_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, modifier1), | 
 |       &ngx_http_uwsgi_modifier_bounds }, | 
 |  | 
 |     { ngx_string("uwsgi_modifier2"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_num_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, modifier2), | 
 |       &ngx_http_uwsgi_modifier_bounds }, | 
 |  | 
 |     { ngx_string("uwsgi_store"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_uwsgi_store, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       0, | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_store_access"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE123, | 
 |       ngx_conf_set_access_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.store_access), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_buffering"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.buffering), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_request_buffering"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.request_buffering), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ignore_client_abort"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ignore_client_abort), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_bind"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE12, | 
 |       ngx_http_upstream_bind_set_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.local), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_socket_keepalive"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.socket_keepalive), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_connect_timeout"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.connect_timeout), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_send_timeout"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.send_timeout), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_buffer_size"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_size_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.buffer_size), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_pass_request_headers"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_request_headers), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_pass_request_body"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_request_body), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_intercept_errors"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.intercept_errors), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_read_timeout"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.read_timeout), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_buffers"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE2, | 
 |       ngx_conf_set_bufs_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.bufs), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_busy_buffers_size"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_size_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.busy_buffers_size_conf), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_force_ranges"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.force_ranges), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_limit_rate"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_size_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.limit_rate), | 
 |       NULL }, | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 |     { ngx_string("uwsgi_cache"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_uwsgi_cache, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       0, | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_key"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_uwsgi_cache_key, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       0, | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_path"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_CONF_2MORE, | 
 |       ngx_http_file_cache_set_slot, | 
 |       NGX_HTTP_MAIN_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_main_conf_t, caches), | 
 |       &ngx_http_uwsgi_module }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_bypass"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_http_set_predicate_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_bypass), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_no_cache"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_http_set_predicate_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.no_cache), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_valid"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_http_file_cache_valid_set_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_valid), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_min_uses"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_num_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_min_uses), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_max_range_offset"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_off_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_max_range_offset), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_use_stale"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_conf_set_bitmask_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_use_stale), | 
 |       &ngx_http_uwsgi_next_upstream_masks }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_methods"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_conf_set_bitmask_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_methods), | 
 |       &ngx_http_upstream_cache_method_mask }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_lock"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_lock_timeout"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock_timeout), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_lock_age"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock_age), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_revalidate"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_revalidate), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_cache_background_update"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_background_update), | 
 |       NULL }, | 
 |  | 
 | #endif | 
 |  | 
 |     { ngx_string("uwsgi_temp_path"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1234, | 
 |       ngx_conf_set_path_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.temp_path), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_max_temp_file_size"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_size_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.max_temp_file_size_conf), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_temp_file_write_size"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_size_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.temp_file_write_size_conf), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_next_upstream"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_conf_set_bitmask_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream), | 
 |       &ngx_http_uwsgi_next_upstream_masks }, | 
 |  | 
 |     { ngx_string("uwsgi_next_upstream_tries"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_num_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream_tries), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_next_upstream_timeout"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_msec_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream_timeout), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_param"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE23, | 
 |       ngx_http_upstream_param_set_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, params_source), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_string"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, uwsgi_string), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_pass_header"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_array_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_headers), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_hide_header"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_array_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.hide_headers), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ignore_headers"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_conf_set_bitmask_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ignore_headers), | 
 |       &ngx_http_upstream_ignore_headers_masks }, | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |  | 
 |     { ngx_string("uwsgi_ssl_session_reuse"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_session_reuse), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_protocols"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, | 
 |       ngx_conf_set_bitmask_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_protocols), | 
 |       &ngx_http_uwsgi_ssl_protocols }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_ciphers"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_ciphers), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_name"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_set_complex_value_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_name), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_server_name"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_server_name), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_verify"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, | 
 |       ngx_conf_set_flag_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_verify), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_verify_depth"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_num_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_verify_depth), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_trusted_certificate"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_trusted_certificate), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_crl"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_conf_set_str_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_crl), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_certificate"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_set_complex_value_zero_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_certificate), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_certificate_key"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_set_complex_value_zero_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_certificate_key), | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_password_file"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, | 
 |       ngx_http_uwsgi_ssl_password_file, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       0, | 
 |       NULL }, | 
 |  | 
 |     { ngx_string("uwsgi_ssl_conf_command"), | 
 |       NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE2, | 
 |       ngx_conf_set_keyval_slot, | 
 |       NGX_HTTP_LOC_CONF_OFFSET, | 
 |       offsetof(ngx_http_uwsgi_loc_conf_t, ssl_conf_commands), | 
 |       &ngx_http_uwsgi_ssl_conf_command_post }, | 
 |  | 
 | #endif | 
 |  | 
 |       ngx_null_command | 
 | }; | 
 |  | 
 |  | 
 | static ngx_http_module_t ngx_http_uwsgi_module_ctx = { | 
 |     NULL,                                  /* preconfiguration */ | 
 |     NULL,                                  /* postconfiguration */ | 
 |  | 
 |     ngx_http_uwsgi_create_main_conf,       /* create main configuration */ | 
 |     NULL,                                  /* init main configuration */ | 
 |  | 
 |     NULL,                                  /* create server configuration */ | 
 |     NULL,                                  /* merge server configuration */ | 
 |  | 
 |     ngx_http_uwsgi_create_loc_conf,        /* create location configuration */ | 
 |     ngx_http_uwsgi_merge_loc_conf          /* merge location configuration */ | 
 | }; | 
 |  | 
 |  | 
 | ngx_module_t ngx_http_uwsgi_module = { | 
 |     NGX_MODULE_V1, | 
 |     &ngx_http_uwsgi_module_ctx,            /* module context */ | 
 |     ngx_http_uwsgi_commands,               /* module directives */ | 
 |     NGX_HTTP_MODULE,                       /* module type */ | 
 |     NULL,                                  /* init master */ | 
 |     NULL,                                  /* init module */ | 
 |     NULL,                                  /* init process */ | 
 |     NULL,                                  /* init thread */ | 
 |     NULL,                                  /* exit thread */ | 
 |     NULL,                                  /* exit process */ | 
 |     NULL,                                  /* exit master */ | 
 |     NGX_MODULE_V1_PADDING | 
 | }; | 
 |  | 
 |  | 
 | static ngx_str_t ngx_http_uwsgi_hide_headers[] = { | 
 |     ngx_string("X-Accel-Expires"), | 
 |     ngx_string("X-Accel-Redirect"), | 
 |     ngx_string("X-Accel-Limit-Rate"), | 
 |     ngx_string("X-Accel-Buffering"), | 
 |     ngx_string("X-Accel-Charset"), | 
 |     ngx_null_string | 
 | }; | 
 |  | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 | static ngx_keyval_t  ngx_http_uwsgi_cache_headers[] = { | 
 |     { ngx_string("HTTP_IF_MODIFIED_SINCE"), | 
 |       ngx_string("$upstream_cache_last_modified") }, | 
 |     { ngx_string("HTTP_IF_UNMODIFIED_SINCE"), ngx_string("") }, | 
 |     { ngx_string("HTTP_IF_NONE_MATCH"), ngx_string("$upstream_cache_etag") }, | 
 |     { ngx_string("HTTP_IF_MATCH"), ngx_string("") }, | 
 |     { ngx_string("HTTP_RANGE"), ngx_string("") }, | 
 |     { ngx_string("HTTP_IF_RANGE"), ngx_string("") }, | 
 |     { ngx_null_string, ngx_null_string } | 
 | }; | 
 |  | 
 | #endif | 
 |  | 
 |  | 
 | static ngx_path_init_t ngx_http_uwsgi_temp_path = { | 
 |     ngx_string(NGX_HTTP_UWSGI_TEMP_PATH), { 1, 2, 0 } | 
 | }; | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_handler(ngx_http_request_t *r) | 
 | { | 
 |     ngx_int_t                    rc; | 
 |     ngx_http_status_t           *status; | 
 |     ngx_http_upstream_t         *u; | 
 |     ngx_http_uwsgi_loc_conf_t   *uwcf; | 
 | #if (NGX_HTTP_CACHE) | 
 |     ngx_http_uwsgi_main_conf_t  *uwmcf; | 
 | #endif | 
 |  | 
 |     if (ngx_http_upstream_create(r) != NGX_OK) { | 
 |         return NGX_HTTP_INTERNAL_SERVER_ERROR; | 
 |     } | 
 |  | 
 |     status = ngx_pcalloc(r->pool, sizeof(ngx_http_status_t)); | 
 |     if (status == NULL) { | 
 |         return NGX_HTTP_INTERNAL_SERVER_ERROR; | 
 |     } | 
 |  | 
 |     ngx_http_set_ctx(r, status, ngx_http_uwsgi_module); | 
 |  | 
 |     uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); | 
 |  | 
 |     u = r->upstream; | 
 |  | 
 |     if (uwcf->uwsgi_lengths == NULL) { | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |         u->ssl = (uwcf->upstream.ssl != NULL); | 
 |  | 
 |         if (u->ssl) { | 
 |             ngx_str_set(&u->schema, "suwsgi://"); | 
 |  | 
 |         } else { | 
 |             ngx_str_set(&u->schema, "uwsgi://"); | 
 |         } | 
 | #else | 
 |         ngx_str_set(&u->schema, "uwsgi://"); | 
 | #endif | 
 |  | 
 |     } else { | 
 |         if (ngx_http_uwsgi_eval(r, uwcf) != NGX_OK) { | 
 |             return NGX_HTTP_INTERNAL_SERVER_ERROR; | 
 |         } | 
 |     } | 
 |  | 
 |     u->output.tag = (ngx_buf_tag_t) &ngx_http_uwsgi_module; | 
 |  | 
 |     u->conf = &uwcf->upstream; | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |     uwmcf = ngx_http_get_module_main_conf(r, ngx_http_uwsgi_module); | 
 |  | 
 |     u->caches = &uwmcf->caches; | 
 |     u->create_key = ngx_http_uwsgi_create_key; | 
 | #endif | 
 |  | 
 |     u->create_request = ngx_http_uwsgi_create_request; | 
 |     u->reinit_request = ngx_http_uwsgi_reinit_request; | 
 |     u->process_header = ngx_http_uwsgi_process_status_line; | 
 |     u->abort_request = ngx_http_uwsgi_abort_request; | 
 |     u->finalize_request = ngx_http_uwsgi_finalize_request; | 
 |     r->state = 0; | 
 |  | 
 |     u->buffering = uwcf->upstream.buffering; | 
 |  | 
 |     u->pipe = ngx_pcalloc(r->pool, sizeof(ngx_event_pipe_t)); | 
 |     if (u->pipe == NULL) { | 
 |         return NGX_HTTP_INTERNAL_SERVER_ERROR; | 
 |     } | 
 |  | 
 |     u->pipe->input_filter = ngx_event_pipe_copy_input_filter; | 
 |     u->pipe->input_ctx = r; | 
 |  | 
 |     u->input_filter_init = ngx_http_uwsgi_input_filter_init; | 
 |     u->input_filter = ngx_http_upstream_non_buffered_filter; | 
 |     u->input_filter_ctx = r; | 
 |  | 
 |     if (!uwcf->upstream.request_buffering | 
 |         && uwcf->upstream.pass_request_body | 
 |         && !r->headers_in.chunked) | 
 |     { | 
 |         r->request_body_no_buffering = 1; | 
 |     } | 
 |  | 
 |     rc = ngx_http_read_client_request_body(r, ngx_http_upstream_init); | 
 |  | 
 |     if (rc >= NGX_HTTP_SPECIAL_RESPONSE) { | 
 |         return rc; | 
 |     } | 
 |  | 
 |     return NGX_DONE; | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_eval(ngx_http_request_t *r, ngx_http_uwsgi_loc_conf_t * uwcf) | 
 | { | 
 |     size_t                add; | 
 |     ngx_url_t             url; | 
 |     ngx_http_upstream_t  *u; | 
 |  | 
 |     ngx_memzero(&url, sizeof(ngx_url_t)); | 
 |  | 
 |     if (ngx_http_script_run(r, &url.url, uwcf->uwsgi_lengths->elts, 0, | 
 |                             uwcf->uwsgi_values->elts) | 
 |         == NULL) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (url.url.len > 8 | 
 |         && ngx_strncasecmp(url.url.data, (u_char *) "uwsgi://", 8) == 0) | 
 |     { | 
 |         add = 8; | 
 |  | 
 |     } else if (url.url.len > 9 | 
 |                && ngx_strncasecmp(url.url.data, (u_char *) "suwsgi://", 9) == 0) | 
 |     { | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |         add = 9; | 
 |         r->upstream->ssl = 1; | 
 | #else | 
 |         ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, | 
 |                       "suwsgi protocol requires SSL support"); | 
 |         return NGX_ERROR; | 
 | #endif | 
 |  | 
 |     } else { | 
 |         add = 0; | 
 |     } | 
 |  | 
 |     u = r->upstream; | 
 |  | 
 |     if (add) { | 
 |         u->schema.len = add; | 
 |         u->schema.data = url.url.data; | 
 |  | 
 |         url.url.data += add; | 
 |         url.url.len -= add; | 
 |  | 
 |     } else { | 
 |         ngx_str_set(&u->schema, "uwsgi://"); | 
 |     } | 
 |  | 
 |     url.no_resolve = 1; | 
 |  | 
 |     if (ngx_parse_url(r->pool, &url) != NGX_OK) { | 
 |         if (url.err) { | 
 |             ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, | 
 |                           "%s in upstream \"%V\"", url.err, &url.url); | 
 |         } | 
 |  | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     u->resolved = ngx_pcalloc(r->pool, sizeof(ngx_http_upstream_resolved_t)); | 
 |     if (u->resolved == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (url.addrs) { | 
 |         u->resolved->sockaddr = url.addrs[0].sockaddr; | 
 |         u->resolved->socklen = url.addrs[0].socklen; | 
 |         u->resolved->name = url.addrs[0].name; | 
 |         u->resolved->naddrs = 1; | 
 |     } | 
 |  | 
 |     u->resolved->host = url.host; | 
 |     u->resolved->port = url.port; | 
 |     u->resolved->no_port = url.no_port; | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_create_key(ngx_http_request_t *r) | 
 | { | 
 |     ngx_str_t                  *key; | 
 |     ngx_http_uwsgi_loc_conf_t  *uwcf; | 
 |  | 
 |     key = ngx_array_push(&r->cache->keys); | 
 |     if (key == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); | 
 |  | 
 |     if (ngx_http_complex_value(r, &uwcf->cache_key, key) != NGX_OK) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 | #endif | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_create_request(ngx_http_request_t *r) | 
 | { | 
 |     u_char                        ch, sep, *lowcase_key; | 
 |     size_t                        key_len, val_len, len, allocated; | 
 |     ngx_uint_t                    i, n, hash, skip_empty, header_params; | 
 |     ngx_buf_t                    *b; | 
 |     ngx_chain_t                  *cl, *body; | 
 |     ngx_list_part_t              *part; | 
 |     ngx_table_elt_t              *header, *hn, **ignored; | 
 |     ngx_http_uwsgi_params_t      *params; | 
 |     ngx_http_script_code_pt       code; | 
 |     ngx_http_script_engine_t      e, le; | 
 |     ngx_http_uwsgi_loc_conf_t    *uwcf; | 
 |     ngx_http_script_len_code_pt   lcode; | 
 |  | 
 |     len = 0; | 
 |     header_params = 0; | 
 |     ignored = NULL; | 
 |  | 
 |     uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |     params = r->upstream->cacheable ? &uwcf->params_cache : &uwcf->params; | 
 | #else | 
 |     params = &uwcf->params; | 
 | #endif | 
 |  | 
 |     if (params->lengths) { | 
 |         ngx_memzero(&le, sizeof(ngx_http_script_engine_t)); | 
 |  | 
 |         ngx_http_script_flush_no_cacheable_variables(r, params->flushes); | 
 |         le.flushed = 1; | 
 |  | 
 |         le.ip = params->lengths->elts; | 
 |         le.request = r; | 
 |  | 
 |         while (*(uintptr_t *) le.ip) { | 
 |  | 
 |             lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             key_len = lcode(&le); | 
 |  | 
 |             lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             skip_empty = lcode(&le); | 
 |  | 
 |             for (val_len = 0; *(uintptr_t *) le.ip; val_len += lcode(&le)) { | 
 |                 lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             } | 
 |             le.ip += sizeof(uintptr_t); | 
 |  | 
 |             if (skip_empty && val_len == 0) { | 
 |                 continue; | 
 |             } | 
 |  | 
 |             len += 2 + key_len + 2 + val_len; | 
 |         } | 
 |     } | 
 |  | 
 |     if (uwcf->upstream.pass_request_headers) { | 
 |  | 
 |         allocated = 0; | 
 |         lowcase_key = NULL; | 
 |  | 
 |         if (ngx_http_link_multi_headers(r) != NGX_OK) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         if (params->number || r->headers_in.multi) { | 
 |             n = 0; | 
 |             part = &r->headers_in.headers.part; | 
 |  | 
 |             while (part) { | 
 |                 n += part->nelts; | 
 |                 part = part->next; | 
 |             } | 
 |  | 
 |             ignored = ngx_palloc(r->pool, n * sizeof(void *)); | 
 |             if (ignored == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |         } | 
 |  | 
 |         part = &r->headers_in.headers.part; | 
 |         header = part->elts; | 
 |  | 
 |         for (i = 0; /* void */ ; i++) { | 
 |  | 
 |             if (i >= part->nelts) { | 
 |                 if (part->next == NULL) { | 
 |                     break; | 
 |                 } | 
 |  | 
 |                 part = part->next; | 
 |                 header = part->elts; | 
 |                 i = 0; | 
 |             } | 
 |  | 
 |             for (n = 0; n < header_params; n++) { | 
 |                 if (&header[i] == ignored[n]) { | 
 |                     goto next_length; | 
 |                 } | 
 |             } | 
 |  | 
 |             if (params->number) { | 
 |                 if (allocated < header[i].key.len) { | 
 |                     allocated = header[i].key.len + 16; | 
 |                     lowcase_key = ngx_pnalloc(r->pool, allocated); | 
 |                     if (lowcase_key == NULL) { | 
 |                         return NGX_ERROR; | 
 |                     } | 
 |                 } | 
 |  | 
 |                 hash = 0; | 
 |  | 
 |                 for (n = 0; n < header[i].key.len; n++) { | 
 |                     ch = header[i].key.data[n]; | 
 |  | 
 |                     if (ch >= 'A' && ch <= 'Z') { | 
 |                         ch |= 0x20; | 
 |  | 
 |                     } else if (ch == '-') { | 
 |                         ch = '_'; | 
 |                     } | 
 |  | 
 |                     hash = ngx_hash(hash, ch); | 
 |                     lowcase_key[n] = ch; | 
 |                 } | 
 |  | 
 |                 if (ngx_hash_find(¶ms->hash, hash, lowcase_key, n)) { | 
 |                     ignored[header_params++] = &header[i]; | 
 |                     continue; | 
 |                 } | 
 |             } | 
 |  | 
 |             len += 2 + sizeof("HTTP_") - 1 + header[i].key.len | 
 |                  + 2 + header[i].value.len; | 
 |  | 
 |             for (hn = header[i].next; hn; hn = hn->next) { | 
 |                 len += hn->value.len + 2; | 
 |                 ignored[header_params++] = hn; | 
 |             } | 
 |  | 
 |         next_length: | 
 |  | 
 |             continue; | 
 |         } | 
 |     } | 
 |  | 
 |     len += uwcf->uwsgi_string.len; | 
 |  | 
 | #if 0 | 
 |     /* allow custom uwsgi packet */ | 
 |     if (len > 0 && len < 2) { | 
 |         ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0, | 
 |                       "uwsgi request is too little: %uz", len); | 
 |         return NGX_ERROR; | 
 |     } | 
 | #endif | 
 |  | 
 |     if (len > 65535) { | 
 |         ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0, | 
 |                       "uwsgi request is too big: %uz", len); | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     b = ngx_create_temp_buf(r->pool, len + 4); | 
 |     if (b == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     cl = ngx_alloc_chain_link(r->pool); | 
 |     if (cl == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     cl->buf = b; | 
 |  | 
 |     *b->last++ = (u_char) uwcf->modifier1; | 
 |     *b->last++ = (u_char) (len & 0xff); | 
 |     *b->last++ = (u_char) ((len >> 8) & 0xff); | 
 |     *b->last++ = (u_char) uwcf->modifier2; | 
 |  | 
 |     if (params->lengths) { | 
 |         ngx_memzero(&e, sizeof(ngx_http_script_engine_t)); | 
 |  | 
 |         e.ip = params->values->elts; | 
 |         e.pos = b->last; | 
 |         e.request = r; | 
 |         e.flushed = 1; | 
 |  | 
 |         le.ip = params->lengths->elts; | 
 |  | 
 |         while (*(uintptr_t *) le.ip) { | 
 |  | 
 |             lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             key_len = (u_char) lcode(&le); | 
 |  | 
 |             lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             skip_empty = lcode(&le); | 
 |  | 
 |             for (val_len = 0; *(uintptr_t *) le.ip; val_len += lcode(&le)) { | 
 |                 lcode = *(ngx_http_script_len_code_pt *) le.ip; | 
 |             } | 
 |             le.ip += sizeof(uintptr_t); | 
 |  | 
 |             if (skip_empty && val_len == 0) { | 
 |                 e.skip = 1; | 
 |  | 
 |                 while (*(uintptr_t *) e.ip) { | 
 |                     code = *(ngx_http_script_code_pt *) e.ip; | 
 |                     code((ngx_http_script_engine_t *) &e); | 
 |                 } | 
 |                 e.ip += sizeof(uintptr_t); | 
 |  | 
 |                 e.skip = 0; | 
 |  | 
 |                 continue; | 
 |             } | 
 |  | 
 |             *e.pos++ = (u_char) (key_len & 0xff); | 
 |             *e.pos++ = (u_char) ((key_len >> 8) & 0xff); | 
 |  | 
 |             code = *(ngx_http_script_code_pt *) e.ip; | 
 |             code((ngx_http_script_engine_t *) &e); | 
 |  | 
 |             *e.pos++ = (u_char) (val_len & 0xff); | 
 |             *e.pos++ = (u_char) ((val_len >> 8) & 0xff); | 
 |  | 
 |             while (*(uintptr_t *) e.ip) { | 
 |                 code = *(ngx_http_script_code_pt *) e.ip; | 
 |                 code((ngx_http_script_engine_t *) &e); | 
 |             } | 
 |  | 
 |             e.ip += sizeof(uintptr_t); | 
 |  | 
 |             ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                            "uwsgi param: \"%*s: %*s\"", | 
 |                            key_len, e.pos - (key_len + 2 + val_len), | 
 |                            val_len, e.pos - val_len); | 
 |         } | 
 |  | 
 |         b->last = e.pos; | 
 |     } | 
 |  | 
 |     if (uwcf->upstream.pass_request_headers) { | 
 |  | 
 |         part = &r->headers_in.headers.part; | 
 |         header = part->elts; | 
 |  | 
 |         for (i = 0; /* void */ ; i++) { | 
 |  | 
 |             if (i >= part->nelts) { | 
 |                 if (part->next == NULL) { | 
 |                     break; | 
 |                 } | 
 |  | 
 |                 part = part->next; | 
 |                 header = part->elts; | 
 |                 i = 0; | 
 |             } | 
 |  | 
 |             for (n = 0; n < header_params; n++) { | 
 |                 if (&header[i] == ignored[n]) { | 
 |                     goto next_value; | 
 |                 } | 
 |             } | 
 |  | 
 |             key_len = sizeof("HTTP_") - 1 + header[i].key.len; | 
 |             *b->last++ = (u_char) (key_len & 0xff); | 
 |             *b->last++ = (u_char) ((key_len >> 8) & 0xff); | 
 |  | 
 |             b->last = ngx_cpymem(b->last, "HTTP_", sizeof("HTTP_") - 1); | 
 |             for (n = 0; n < header[i].key.len; n++) { | 
 |                 ch = header[i].key.data[n]; | 
 |  | 
 |                 if (ch >= 'a' && ch <= 'z') { | 
 |                     ch &= ~0x20; | 
 |  | 
 |                 } else if (ch == '-') { | 
 |                     ch = '_'; | 
 |                 } | 
 |  | 
 |                 *b->last++ = ch; | 
 |             } | 
 |  | 
 |             val_len = header[i].value.len; | 
 |  | 
 |             for (hn = header[i].next; hn; hn = hn->next) { | 
 |                 val_len += hn->value.len + 2; | 
 |             } | 
 |  | 
 |             *b->last++ = (u_char) (val_len & 0xff); | 
 |             *b->last++ = (u_char) ((val_len >> 8) & 0xff); | 
 |             b->last = ngx_copy(b->last, header[i].value.data, | 
 |                                header[i].value.len); | 
 |  | 
 |             if (header[i].next) { | 
 |  | 
 |                 if (header[i].key.len == sizeof("Cookie") - 1 | 
 |                     && ngx_strncasecmp(header[i].key.data, (u_char *) "Cookie", | 
 |                                        sizeof("Cookie") - 1) | 
 |                        == 0) | 
 |                 { | 
 |                     sep = ';'; | 
 |  | 
 |                 } else { | 
 |                     sep = ','; | 
 |                 } | 
 |  | 
 |                 for (hn = header[i].next; hn; hn = hn->next) { | 
 |                     *b->last++ = sep; | 
 |                     *b->last++ = ' '; | 
 |                     b->last = ngx_copy(b->last, hn->value.data, hn->value.len); | 
 |                 } | 
 |             } | 
 |  | 
 |             ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                            "uwsgi param: \"%*s: %*s\"", | 
 |                            key_len, b->last - (key_len + 2 + val_len), | 
 |                            val_len, b->last - val_len); | 
 |         next_value: | 
 |  | 
 |             continue; | 
 |         } | 
 |     } | 
 |  | 
 |     b->last = ngx_copy(b->last, uwcf->uwsgi_string.data, | 
 |                        uwcf->uwsgi_string.len); | 
 |  | 
 |     if (r->request_body_no_buffering) { | 
 |         r->upstream->request_bufs = cl; | 
 |  | 
 |     } else if (uwcf->upstream.pass_request_body) { | 
 |         body = r->upstream->request_bufs; | 
 |         r->upstream->request_bufs = cl; | 
 |  | 
 |         while (body) { | 
 |             b = ngx_alloc_buf(r->pool); | 
 |             if (b == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             ngx_memcpy(b, body->buf, sizeof(ngx_buf_t)); | 
 |  | 
 |             cl->next = ngx_alloc_chain_link(r->pool); | 
 |             if (cl->next == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             cl = cl->next; | 
 |             cl->buf = b; | 
 |  | 
 |             body = body->next; | 
 |         } | 
 |  | 
 |     } else { | 
 |         r->upstream->request_bufs = cl; | 
 |     } | 
 |  | 
 |     b->flush = 1; | 
 |     cl->next = NULL; | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_reinit_request(ngx_http_request_t *r) | 
 | { | 
 |     ngx_http_status_t  *status; | 
 |  | 
 |     status = ngx_http_get_module_ctx(r, ngx_http_uwsgi_module); | 
 |  | 
 |     if (status == NULL) { | 
 |         return NGX_OK; | 
 |     } | 
 |  | 
 |     status->code = 0; | 
 |     status->count = 0; | 
 |     status->start = NULL; | 
 |     status->end = NULL; | 
 |  | 
 |     r->upstream->process_header = ngx_http_uwsgi_process_status_line; | 
 |     r->state = 0; | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_process_status_line(ngx_http_request_t *r) | 
 | { | 
 |     size_t                 len; | 
 |     ngx_int_t              rc; | 
 |     ngx_http_status_t     *status; | 
 |     ngx_http_upstream_t   *u; | 
 |  | 
 |     status = ngx_http_get_module_ctx(r, ngx_http_uwsgi_module); | 
 |  | 
 |     if (status == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     u = r->upstream; | 
 |  | 
 |     rc = ngx_http_parse_status_line(r, &u->buffer, status); | 
 |  | 
 |     if (rc == NGX_AGAIN) { | 
 |         return rc; | 
 |     } | 
 |  | 
 |     if (rc == NGX_ERROR) { | 
 |         u->process_header = ngx_http_uwsgi_process_header; | 
 |         return ngx_http_uwsgi_process_header(r); | 
 |     } | 
 |  | 
 |     if (u->state && u->state->status == 0) { | 
 |         u->state->status = status->code; | 
 |     } | 
 |  | 
 |     u->headers_in.status_n = status->code; | 
 |  | 
 |     len = status->end - status->start; | 
 |     u->headers_in.status_line.len = len; | 
 |  | 
 |     u->headers_in.status_line.data = ngx_pnalloc(r->pool, len); | 
 |     if (u->headers_in.status_line.data == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     ngx_memcpy(u->headers_in.status_line.data, status->start, len); | 
 |  | 
 |     ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                    "http uwsgi status %ui \"%V\"", | 
 |                    u->headers_in.status_n, &u->headers_in.status_line); | 
 |  | 
 |     u->process_header = ngx_http_uwsgi_process_header; | 
 |  | 
 |     return ngx_http_uwsgi_process_header(r); | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_process_header(ngx_http_request_t *r) | 
 | { | 
 |     ngx_str_t                      *status_line; | 
 |     ngx_int_t                       rc, status; | 
 |     ngx_table_elt_t                *h; | 
 |     ngx_http_upstream_t            *u; | 
 |     ngx_http_upstream_header_t     *hh; | 
 |     ngx_http_upstream_main_conf_t  *umcf; | 
 |  | 
 |     umcf = ngx_http_get_module_main_conf(r, ngx_http_upstream_module); | 
 |  | 
 |     for ( ;; ) { | 
 |  | 
 |         rc = ngx_http_parse_header_line(r, &r->upstream->buffer, 1); | 
 |  | 
 |         if (rc == NGX_OK) { | 
 |  | 
 |             /* a header line has been parsed successfully */ | 
 |  | 
 |             h = ngx_list_push(&r->upstream->headers_in.headers); | 
 |             if (h == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             h->hash = r->header_hash; | 
 |  | 
 |             h->key.len = r->header_name_end - r->header_name_start; | 
 |             h->value.len = r->header_end - r->header_start; | 
 |  | 
 |             h->key.data = ngx_pnalloc(r->pool, | 
 |                                       h->key.len + 1 + h->value.len + 1 | 
 |                                       + h->key.len); | 
 |             if (h->key.data == NULL) { | 
 |                 h->hash = 0; | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             h->value.data = h->key.data + h->key.len + 1; | 
 |             h->lowcase_key = h->key.data + h->key.len + 1 + h->value.len + 1; | 
 |  | 
 |             ngx_memcpy(h->key.data, r->header_name_start, h->key.len); | 
 |             h->key.data[h->key.len] = '\0'; | 
 |             ngx_memcpy(h->value.data, r->header_start, h->value.len); | 
 |             h->value.data[h->value.len] = '\0'; | 
 |  | 
 |             if (h->key.len == r->lowcase_index) { | 
 |                 ngx_memcpy(h->lowcase_key, r->lowcase_header, h->key.len); | 
 |  | 
 |             } else { | 
 |                 ngx_strlow(h->lowcase_key, h->key.data, h->key.len); | 
 |             } | 
 |  | 
 |             hh = ngx_hash_find(&umcf->headers_in_hash, h->hash, | 
 |                                h->lowcase_key, h->key.len); | 
 |  | 
 |             if (hh) { | 
 |                 rc = hh->handler(r, h, hh->offset); | 
 |  | 
 |                 if (rc != NGX_OK) { | 
 |                     return rc; | 
 |                 } | 
 |             } | 
 |  | 
 |             ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                            "http uwsgi header: \"%V: %V\"", &h->key, &h->value); | 
 |  | 
 |             continue; | 
 |         } | 
 |  | 
 |         if (rc == NGX_HTTP_PARSE_HEADER_DONE) { | 
 |  | 
 |             /* a whole header has been parsed successfully */ | 
 |  | 
 |             ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                            "http uwsgi header done"); | 
 |  | 
 |             u = r->upstream; | 
 |  | 
 |             if (u->headers_in.status_n) { | 
 |                 goto done; | 
 |             } | 
 |  | 
 |             if (u->headers_in.status) { | 
 |                 status_line = &u->headers_in.status->value; | 
 |  | 
 |                 status = ngx_atoi(status_line->data, 3); | 
 |                 if (status == NGX_ERROR) { | 
 |                     ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, | 
 |                                   "upstream sent invalid status \"%V\"", | 
 |                                   status_line); | 
 |                     return NGX_HTTP_UPSTREAM_INVALID_HEADER; | 
 |                 } | 
 |  | 
 |                 u->headers_in.status_n = status; | 
 |                 u->headers_in.status_line = *status_line; | 
 |  | 
 |             } else if (u->headers_in.location) { | 
 |                 u->headers_in.status_n = 302; | 
 |                 ngx_str_set(&u->headers_in.status_line, | 
 |                             "302 Moved Temporarily"); | 
 |  | 
 |             } else { | 
 |                 u->headers_in.status_n = 200; | 
 |                 ngx_str_set(&u->headers_in.status_line, "200 OK"); | 
 |             } | 
 |  | 
 |             if (u->state && u->state->status == 0) { | 
 |                 u->state->status = u->headers_in.status_n; | 
 |             } | 
 |  | 
 |         done: | 
 |  | 
 |             if (u->headers_in.status_n == NGX_HTTP_SWITCHING_PROTOCOLS | 
 |                 && r->headers_in.upgrade) | 
 |             { | 
 |                 u->upgrade = 1; | 
 |             } | 
 |  | 
 |             return NGX_OK; | 
 |         } | 
 |  | 
 |         if (rc == NGX_AGAIN) { | 
 |             return NGX_AGAIN; | 
 |         } | 
 |  | 
 |         /* rc == NGX_HTTP_PARSE_INVALID_HEADER */ | 
 |  | 
 |         ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, | 
 |                       "upstream sent invalid header: \"%*s\\x%02xd...\"", | 
 |                       r->header_end - r->header_name_start, | 
 |                       r->header_name_start, *r->header_end); | 
 |  | 
 |         return NGX_HTTP_UPSTREAM_INVALID_HEADER; | 
 |     } | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_input_filter_init(void *data) | 
 | { | 
 |     ngx_http_request_t   *r = data; | 
 |     ngx_http_upstream_t  *u; | 
 |  | 
 |     u = r->upstream; | 
 |  | 
 |     ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                    "http uwsgi filter init s:%ui l:%O", | 
 |                    u->headers_in.status_n, u->headers_in.content_length_n); | 
 |  | 
 |     if (u->headers_in.status_n == NGX_HTTP_NO_CONTENT | 
 |         || u->headers_in.status_n == NGX_HTTP_NOT_MODIFIED) | 
 |     { | 
 |         u->pipe->length = 0; | 
 |         u->length = 0; | 
 |  | 
 |     } else if (r->method == NGX_HTTP_HEAD) { | 
 |         u->pipe->length = -1; | 
 |         u->length = -1; | 
 |  | 
 |     } else { | 
 |         u->pipe->length = u->headers_in.content_length_n; | 
 |         u->length = u->headers_in.content_length_n; | 
 |     } | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 |  | 
 | static void | 
 | ngx_http_uwsgi_abort_request(ngx_http_request_t *r) | 
 | { | 
 |     ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                    "abort http uwsgi request"); | 
 |  | 
 |     return; | 
 | } | 
 |  | 
 |  | 
 | static void | 
 | ngx_http_uwsgi_finalize_request(ngx_http_request_t *r, ngx_int_t rc) | 
 | { | 
 |     ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, | 
 |                    "finalize http uwsgi request"); | 
 |  | 
 |     return; | 
 | } | 
 |  | 
 |  | 
 | static void * | 
 | ngx_http_uwsgi_create_main_conf(ngx_conf_t *cf) | 
 | { | 
 |     ngx_http_uwsgi_main_conf_t  *conf; | 
 |  | 
 |     conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_uwsgi_main_conf_t)); | 
 |     if (conf == NULL) { | 
 |         return NULL; | 
 |     } | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |     if (ngx_array_init(&conf->caches, cf->pool, 4, | 
 |                        sizeof(ngx_http_file_cache_t *)) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NULL; | 
 |     } | 
 | #endif | 
 |  | 
 |     return conf; | 
 | } | 
 |  | 
 |  | 
 | static void * | 
 | ngx_http_uwsgi_create_loc_conf(ngx_conf_t *cf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t  *conf; | 
 |  | 
 |     conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_uwsgi_loc_conf_t)); | 
 |     if (conf == NULL) { | 
 |         return NULL; | 
 |     } | 
 |  | 
 |     conf->modifier1 = NGX_CONF_UNSET_UINT; | 
 |     conf->modifier2 = NGX_CONF_UNSET_UINT; | 
 |  | 
 |     conf->upstream.store = NGX_CONF_UNSET; | 
 |     conf->upstream.store_access = NGX_CONF_UNSET_UINT; | 
 |     conf->upstream.next_upstream_tries = NGX_CONF_UNSET_UINT; | 
 |     conf->upstream.buffering = NGX_CONF_UNSET; | 
 |     conf->upstream.request_buffering = NGX_CONF_UNSET; | 
 |     conf->upstream.ignore_client_abort = NGX_CONF_UNSET; | 
 |     conf->upstream.force_ranges = NGX_CONF_UNSET; | 
 |  | 
 |     conf->upstream.local = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.socket_keepalive = NGX_CONF_UNSET; | 
 |  | 
 |     conf->upstream.connect_timeout = NGX_CONF_UNSET_MSEC; | 
 |     conf->upstream.send_timeout = NGX_CONF_UNSET_MSEC; | 
 |     conf->upstream.read_timeout = NGX_CONF_UNSET_MSEC; | 
 |     conf->upstream.next_upstream_timeout = NGX_CONF_UNSET_MSEC; | 
 |  | 
 |     conf->upstream.send_lowat = NGX_CONF_UNSET_SIZE; | 
 |     conf->upstream.buffer_size = NGX_CONF_UNSET_SIZE; | 
 |     conf->upstream.limit_rate = NGX_CONF_UNSET_SIZE; | 
 |  | 
 |     conf->upstream.busy_buffers_size_conf = NGX_CONF_UNSET_SIZE; | 
 |     conf->upstream.max_temp_file_size_conf = NGX_CONF_UNSET_SIZE; | 
 |     conf->upstream.temp_file_write_size_conf = NGX_CONF_UNSET_SIZE; | 
 |  | 
 |     conf->upstream.pass_request_headers = NGX_CONF_UNSET; | 
 |     conf->upstream.pass_request_body = NGX_CONF_UNSET; | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |     conf->upstream.cache = NGX_CONF_UNSET; | 
 |     conf->upstream.cache_min_uses = NGX_CONF_UNSET_UINT; | 
 |     conf->upstream.cache_max_range_offset = NGX_CONF_UNSET; | 
 |     conf->upstream.cache_bypass = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.no_cache = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.cache_valid = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.cache_lock = NGX_CONF_UNSET; | 
 |     conf->upstream.cache_lock_timeout = NGX_CONF_UNSET_MSEC; | 
 |     conf->upstream.cache_lock_age = NGX_CONF_UNSET_MSEC; | 
 |     conf->upstream.cache_revalidate = NGX_CONF_UNSET; | 
 |     conf->upstream.cache_background_update = NGX_CONF_UNSET; | 
 | #endif | 
 |  | 
 |     conf->upstream.hide_headers = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.pass_headers = NGX_CONF_UNSET_PTR; | 
 |  | 
 |     conf->upstream.intercept_errors = NGX_CONF_UNSET; | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |     conf->upstream.ssl_session_reuse = NGX_CONF_UNSET; | 
 |     conf->upstream.ssl_name = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.ssl_server_name = NGX_CONF_UNSET; | 
 |     conf->upstream.ssl_verify = NGX_CONF_UNSET; | 
 |     conf->ssl_verify_depth = NGX_CONF_UNSET_UINT; | 
 |     conf->upstream.ssl_certificate = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.ssl_certificate_key = NGX_CONF_UNSET_PTR; | 
 |     conf->upstream.ssl_passwords = NGX_CONF_UNSET_PTR; | 
 |     conf->ssl_conf_commands = NGX_CONF_UNSET_PTR; | 
 | #endif | 
 |  | 
 |     /* "uwsgi_cyclic_temp_file" is disabled */ | 
 |     conf->upstream.cyclic_temp_file = 0; | 
 |  | 
 |     conf->upstream.change_buffering = 1; | 
 |  | 
 |     ngx_str_set(&conf->upstream.module, "uwsgi"); | 
 |  | 
 |     return conf; | 
 | } | 
 |  | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *prev = parent; | 
 |     ngx_http_uwsgi_loc_conf_t *conf = child; | 
 |  | 
 |     size_t                        size; | 
 |     ngx_int_t                     rc; | 
 |     ngx_hash_init_t               hash; | 
 |     ngx_http_core_loc_conf_t     *clcf; | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 |     if (conf->upstream.store > 0) { | 
 |         conf->upstream.cache = 0; | 
 |     } | 
 |  | 
 |     if (conf->upstream.cache > 0) { | 
 |         conf->upstream.store = 0; | 
 |     } | 
 |  | 
 | #endif | 
 |  | 
 |     if (conf->upstream.store == NGX_CONF_UNSET) { | 
 |         ngx_conf_merge_value(conf->upstream.store, prev->upstream.store, 0); | 
 |  | 
 |         conf->upstream.store_lengths = prev->upstream.store_lengths; | 
 |         conf->upstream.store_values = prev->upstream.store_values; | 
 |     } | 
 |  | 
 |     ngx_conf_merge_uint_value(conf->upstream.store_access, | 
 |                               prev->upstream.store_access, 0600); | 
 |  | 
 |     ngx_conf_merge_uint_value(conf->upstream.next_upstream_tries, | 
 |                               prev->upstream.next_upstream_tries, 0); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.buffering, | 
 |                               prev->upstream.buffering, 1); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.request_buffering, | 
 |                               prev->upstream.request_buffering, 1); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.ignore_client_abort, | 
 |                               prev->upstream.ignore_client_abort, 0); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.force_ranges, | 
 |                               prev->upstream.force_ranges, 0); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.local, | 
 |                               prev->upstream.local, NULL); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.socket_keepalive, | 
 |                               prev->upstream.socket_keepalive, 0); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.connect_timeout, | 
 |                               prev->upstream.connect_timeout, 60000); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.send_timeout, | 
 |                               prev->upstream.send_timeout, 60000); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.read_timeout, | 
 |                               prev->upstream.read_timeout, 60000); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.next_upstream_timeout, | 
 |                               prev->upstream.next_upstream_timeout, 0); | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.send_lowat, | 
 |                               prev->upstream.send_lowat, 0); | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.buffer_size, | 
 |                               prev->upstream.buffer_size, | 
 |                               (size_t) ngx_pagesize); | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.limit_rate, | 
 |                               prev->upstream.limit_rate, 0); | 
 |  | 
 |  | 
 |     ngx_conf_merge_bufs_value(conf->upstream.bufs, prev->upstream.bufs, | 
 |                               8, ngx_pagesize); | 
 |  | 
 |     if (conf->upstream.bufs.num < 2) { | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |                            "there must be at least 2 \"uwsgi_buffers\""); | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |  | 
 |     size = conf->upstream.buffer_size; | 
 |     if (size < conf->upstream.bufs.size) { | 
 |         size = conf->upstream.bufs.size; | 
 |     } | 
 |  | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.busy_buffers_size_conf, | 
 |                               prev->upstream.busy_buffers_size_conf, | 
 |                               NGX_CONF_UNSET_SIZE); | 
 |  | 
 |     if (conf->upstream.busy_buffers_size_conf == NGX_CONF_UNSET_SIZE) { | 
 |         conf->upstream.busy_buffers_size = 2 * size; | 
 |     } else { | 
 |         conf->upstream.busy_buffers_size = | 
 |             conf->upstream.busy_buffers_size_conf; | 
 |     } | 
 |  | 
 |     if (conf->upstream.busy_buffers_size < size) { | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |             "\"uwsgi_busy_buffers_size\" must be equal to or greater " | 
 |             "than the maximum of the value of \"uwsgi_buffer_size\" and " | 
 |             "one of the \"uwsgi_buffers\""); | 
 |  | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     if (conf->upstream.busy_buffers_size | 
 |         > (conf->upstream.bufs.num - 1) * conf->upstream.bufs.size) | 
 |     { | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |             "\"uwsgi_busy_buffers_size\" must be less than " | 
 |             "the size of all \"uwsgi_buffers\" minus one buffer"); | 
 |  | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.temp_file_write_size_conf, | 
 |                               prev->upstream.temp_file_write_size_conf, | 
 |                               NGX_CONF_UNSET_SIZE); | 
 |  | 
 |     if (conf->upstream.temp_file_write_size_conf == NGX_CONF_UNSET_SIZE) { | 
 |         conf->upstream.temp_file_write_size = 2 * size; | 
 |     } else { | 
 |         conf->upstream.temp_file_write_size = | 
 |             conf->upstream.temp_file_write_size_conf; | 
 |     } | 
 |  | 
 |     if (conf->upstream.temp_file_write_size < size) { | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |             "\"uwsgi_temp_file_write_size\" must be equal to or greater than " | 
 |             "the maximum of the value of \"uwsgi_buffer_size\" and " | 
 |             "one of the \"uwsgi_buffers\""); | 
 |  | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |  | 
 |     ngx_conf_merge_size_value(conf->upstream.max_temp_file_size_conf, | 
 |                               prev->upstream.max_temp_file_size_conf, | 
 |                               NGX_CONF_UNSET_SIZE); | 
 |  | 
 |     if (conf->upstream.max_temp_file_size_conf == NGX_CONF_UNSET_SIZE) { | 
 |         conf->upstream.max_temp_file_size = 1024 * 1024 * 1024; | 
 |     } else { | 
 |         conf->upstream.max_temp_file_size = | 
 |             conf->upstream.max_temp_file_size_conf; | 
 |     } | 
 |  | 
 |     if (conf->upstream.max_temp_file_size != 0 | 
 |         && conf->upstream.max_temp_file_size < size) | 
 |     { | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |             "\"uwsgi_max_temp_file_size\" must be equal to zero to disable " | 
 |             "temporary files usage or must be equal to or greater than " | 
 |             "the maximum of the value of \"uwsgi_buffer_size\" and " | 
 |             "one of the \"uwsgi_buffers\""); | 
 |  | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |  | 
 |     ngx_conf_merge_bitmask_value(conf->upstream.ignore_headers, | 
 |                                  prev->upstream.ignore_headers, | 
 |                                  NGX_CONF_BITMASK_SET); | 
 |  | 
 |  | 
 |     ngx_conf_merge_bitmask_value(conf->upstream.next_upstream, | 
 |                                  prev->upstream.next_upstream, | 
 |                                  (NGX_CONF_BITMASK_SET | 
 |                                   |NGX_HTTP_UPSTREAM_FT_ERROR | 
 |                                   |NGX_HTTP_UPSTREAM_FT_TIMEOUT)); | 
 |  | 
 |     if (conf->upstream.next_upstream & NGX_HTTP_UPSTREAM_FT_OFF) { | 
 |         conf->upstream.next_upstream = NGX_CONF_BITMASK_SET | 
 |                                        |NGX_HTTP_UPSTREAM_FT_OFF; | 
 |     } | 
 |  | 
 |     if (ngx_conf_merge_path_value(cf, &conf->upstream.temp_path, | 
 |                                   prev->upstream.temp_path, | 
 |                                   &ngx_http_uwsgi_temp_path) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 |     if (conf->upstream.cache == NGX_CONF_UNSET) { | 
 |         ngx_conf_merge_value(conf->upstream.cache, | 
 |                               prev->upstream.cache, 0); | 
 |  | 
 |         conf->upstream.cache_zone = prev->upstream.cache_zone; | 
 |         conf->upstream.cache_value = prev->upstream.cache_value; | 
 |     } | 
 |  | 
 |     if (conf->upstream.cache_zone && conf->upstream.cache_zone->data == NULL) { | 
 |         ngx_shm_zone_t  *shm_zone; | 
 |  | 
 |         shm_zone = conf->upstream.cache_zone; | 
 |  | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |                            "\"uwsgi_cache\" zone \"%V\" is unknown", | 
 |                            &shm_zone->shm.name); | 
 |  | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     ngx_conf_merge_uint_value(conf->upstream.cache_min_uses, | 
 |                               prev->upstream.cache_min_uses, 1); | 
 |  | 
 |     ngx_conf_merge_off_value(conf->upstream.cache_max_range_offset, | 
 |                               prev->upstream.cache_max_range_offset, | 
 |                               NGX_MAX_OFF_T_VALUE); | 
 |  | 
 |     ngx_conf_merge_bitmask_value(conf->upstream.cache_use_stale, | 
 |                               prev->upstream.cache_use_stale, | 
 |                               (NGX_CONF_BITMASK_SET | 
 |                                |NGX_HTTP_UPSTREAM_FT_OFF)); | 
 |  | 
 |     if (conf->upstream.cache_use_stale & NGX_HTTP_UPSTREAM_FT_OFF) { | 
 |         conf->upstream.cache_use_stale = NGX_CONF_BITMASK_SET | 
 |                                          |NGX_HTTP_UPSTREAM_FT_OFF; | 
 |     } | 
 |  | 
 |     if (conf->upstream.cache_use_stale & NGX_HTTP_UPSTREAM_FT_ERROR) { | 
 |         conf->upstream.cache_use_stale |= NGX_HTTP_UPSTREAM_FT_NOLIVE; | 
 |     } | 
 |  | 
 |     if (conf->upstream.cache_methods == 0) { | 
 |         conf->upstream.cache_methods = prev->upstream.cache_methods; | 
 |     } | 
 |  | 
 |     conf->upstream.cache_methods |= NGX_HTTP_GET|NGX_HTTP_HEAD; | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.cache_bypass, | 
 |                              prev->upstream.cache_bypass, NULL); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.no_cache, | 
 |                              prev->upstream.no_cache, NULL); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.cache_valid, | 
 |                              prev->upstream.cache_valid, NULL); | 
 |  | 
 |     if (conf->cache_key.value.data == NULL) { | 
 |         conf->cache_key = prev->cache_key; | 
 |     } | 
 |  | 
 |     if (conf->upstream.cache && conf->cache_key.value.data == NULL) { | 
 |         ngx_conf_log_error(NGX_LOG_WARN, cf, 0, | 
 |                            "no \"uwsgi_cache_key\" for \"uwsgi_cache\""); | 
 |     } | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.cache_lock, | 
 |                               prev->upstream.cache_lock, 0); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.cache_lock_timeout, | 
 |                               prev->upstream.cache_lock_timeout, 5000); | 
 |  | 
 |     ngx_conf_merge_msec_value(conf->upstream.cache_lock_age, | 
 |                               prev->upstream.cache_lock_age, 5000); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.cache_revalidate, | 
 |                               prev->upstream.cache_revalidate, 0); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.cache_background_update, | 
 |                               prev->upstream.cache_background_update, 0); | 
 |  | 
 | #endif | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.pass_request_headers, | 
 |                          prev->upstream.pass_request_headers, 1); | 
 |     ngx_conf_merge_value(conf->upstream.pass_request_body, | 
 |                          prev->upstream.pass_request_body, 1); | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.intercept_errors, | 
 |                          prev->upstream.intercept_errors, 0); | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |  | 
 |     ngx_conf_merge_value(conf->upstream.ssl_session_reuse, | 
 |                               prev->upstream.ssl_session_reuse, 1); | 
 |  | 
 |     ngx_conf_merge_bitmask_value(conf->ssl_protocols, prev->ssl_protocols, | 
 |                                  (NGX_CONF_BITMASK_SET|NGX_SSL_TLSv1 | 
 |                                   |NGX_SSL_TLSv1_1|NGX_SSL_TLSv1_2)); | 
 |  | 
 |     ngx_conf_merge_str_value(conf->ssl_ciphers, prev->ssl_ciphers, | 
 |                              "DEFAULT"); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.ssl_name, | 
 |                               prev->upstream.ssl_name, NULL); | 
 |     ngx_conf_merge_value(conf->upstream.ssl_server_name, | 
 |                               prev->upstream.ssl_server_name, 0); | 
 |     ngx_conf_merge_value(conf->upstream.ssl_verify, | 
 |                               prev->upstream.ssl_verify, 0); | 
 |     ngx_conf_merge_uint_value(conf->ssl_verify_depth, | 
 |                               prev->ssl_verify_depth, 1); | 
 |     ngx_conf_merge_str_value(conf->ssl_trusted_certificate, | 
 |                               prev->ssl_trusted_certificate, ""); | 
 |     ngx_conf_merge_str_value(conf->ssl_crl, prev->ssl_crl, ""); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->upstream.ssl_certificate, | 
 |                               prev->upstream.ssl_certificate, NULL); | 
 |     ngx_conf_merge_ptr_value(conf->upstream.ssl_certificate_key, | 
 |                               prev->upstream.ssl_certificate_key, NULL); | 
 |     ngx_conf_merge_ptr_value(conf->upstream.ssl_passwords, | 
 |                               prev->upstream.ssl_passwords, NULL); | 
 |  | 
 |     ngx_conf_merge_ptr_value(conf->ssl_conf_commands, | 
 |                               prev->ssl_conf_commands, NULL); | 
 |  | 
 |     if (conf->ssl && ngx_http_uwsgi_set_ssl(cf, conf) != NGX_OK) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 | #endif | 
 |  | 
 |     ngx_conf_merge_str_value(conf->uwsgi_string, prev->uwsgi_string, ""); | 
 |  | 
 |     hash.max_size = 512; | 
 |     hash.bucket_size = ngx_align(64, ngx_cacheline_size); | 
 |     hash.name = "uwsgi_hide_headers_hash"; | 
 |  | 
 |     if (ngx_http_upstream_hide_headers_hash(cf, &conf->upstream, | 
 |             &prev->upstream, ngx_http_uwsgi_hide_headers, &hash) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     clcf = ngx_http_conf_get_module_loc_conf(cf, ngx_http_core_module); | 
 |  | 
 |     if (clcf->noname | 
 |         && conf->upstream.upstream == NULL && conf->uwsgi_lengths == NULL) | 
 |     { | 
 |         conf->upstream.upstream = prev->upstream.upstream; | 
 |  | 
 |         conf->uwsgi_lengths = prev->uwsgi_lengths; | 
 |         conf->uwsgi_values = prev->uwsgi_values; | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |         conf->upstream.ssl = prev->upstream.ssl; | 
 | #endif | 
 |     } | 
 |  | 
 |     if (clcf->lmt_excpt && clcf->handler == NULL | 
 |         && (conf->upstream.upstream || conf->uwsgi_lengths)) | 
 |     { | 
 |         clcf->handler = ngx_http_uwsgi_handler; | 
 |     } | 
 |  | 
 |     ngx_conf_merge_uint_value(conf->modifier1, prev->modifier1, 0); | 
 |     ngx_conf_merge_uint_value(conf->modifier2, prev->modifier2, 0); | 
 |  | 
 |     if (conf->params_source == NULL) { | 
 |         conf->params = prev->params; | 
 | #if (NGX_HTTP_CACHE) | 
 |         conf->params_cache = prev->params_cache; | 
 | #endif | 
 |         conf->params_source = prev->params_source; | 
 |     } | 
 |  | 
 |     rc = ngx_http_uwsgi_init_params(cf, conf, &conf->params, NULL); | 
 |     if (rc != NGX_OK) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 |     if (conf->upstream.cache) { | 
 |         rc = ngx_http_uwsgi_init_params(cf, conf, &conf->params_cache, | 
 |                                         ngx_http_uwsgi_cache_headers); | 
 |         if (rc != NGX_OK) { | 
 |             return NGX_CONF_ERROR; | 
 |         } | 
 |     } | 
 |  | 
 | #endif | 
 |  | 
 |     /* | 
 |      * special handling to preserve conf->params in the "http" section | 
 |      * to inherit it to all servers | 
 |      */ | 
 |  | 
 |     if (prev->params.hash.buckets == NULL | 
 |         && conf->params_source == prev->params_source) | 
 |     { | 
 |         prev->params = conf->params; | 
 | #if (NGX_HTTP_CACHE) | 
 |         prev->params_cache = conf->params_cache; | 
 | #endif | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_init_params(ngx_conf_t *cf, ngx_http_uwsgi_loc_conf_t *conf, | 
 |     ngx_http_uwsgi_params_t *params, ngx_keyval_t *default_params) | 
 | { | 
 |     u_char                       *p; | 
 |     size_t                        size; | 
 |     uintptr_t                    *code; | 
 |     ngx_uint_t                    i, nsrc; | 
 |     ngx_array_t                   headers_names, params_merged; | 
 |     ngx_keyval_t                 *h; | 
 |     ngx_hash_key_t               *hk; | 
 |     ngx_hash_init_t               hash; | 
 |     ngx_http_upstream_param_t    *src, *s; | 
 |     ngx_http_script_compile_t     sc; | 
 |     ngx_http_script_copy_code_t  *copy; | 
 |  | 
 |     if (params->hash.buckets) { | 
 |         return NGX_OK; | 
 |     } | 
 |  | 
 |     if (conf->params_source == NULL && default_params == NULL) { | 
 |         params->hash.buckets = (void *) 1; | 
 |         return NGX_OK; | 
 |     } | 
 |  | 
 |     params->lengths = ngx_array_create(cf->pool, 64, 1); | 
 |     if (params->lengths == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     params->values = ngx_array_create(cf->pool, 512, 1); | 
 |     if (params->values == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (ngx_array_init(&headers_names, cf->temp_pool, 4, sizeof(ngx_hash_key_t)) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (conf->params_source) { | 
 |         src = conf->params_source->elts; | 
 |         nsrc = conf->params_source->nelts; | 
 |  | 
 |     } else { | 
 |         src = NULL; | 
 |         nsrc = 0; | 
 |     } | 
 |  | 
 |     if (default_params) { | 
 |         if (ngx_array_init(¶ms_merged, cf->temp_pool, 4, | 
 |                            sizeof(ngx_http_upstream_param_t)) | 
 |             != NGX_OK) | 
 |         { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         for (i = 0; i < nsrc; i++) { | 
 |  | 
 |             s = ngx_array_push(¶ms_merged); | 
 |             if (s == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             *s = src[i]; | 
 |         } | 
 |  | 
 |         h = default_params; | 
 |  | 
 |         while (h->key.len) { | 
 |  | 
 |             src = params_merged.elts; | 
 |             nsrc = params_merged.nelts; | 
 |  | 
 |             for (i = 0; i < nsrc; i++) { | 
 |                 if (ngx_strcasecmp(h->key.data, src[i].key.data) == 0) { | 
 |                     goto next; | 
 |                 } | 
 |             } | 
 |  | 
 |             s = ngx_array_push(¶ms_merged); | 
 |             if (s == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             s->key = h->key; | 
 |             s->value = h->value; | 
 |             s->skip_empty = 1; | 
 |  | 
 |         next: | 
 |  | 
 |             h++; | 
 |         } | 
 |  | 
 |         src = params_merged.elts; | 
 |         nsrc = params_merged.nelts; | 
 |     } | 
 |  | 
 |     for (i = 0; i < nsrc; i++) { | 
 |  | 
 |         if (src[i].key.len > sizeof("HTTP_") - 1 | 
 |             && ngx_strncmp(src[i].key.data, "HTTP_", sizeof("HTTP_") - 1) == 0) | 
 |         { | 
 |             hk = ngx_array_push(&headers_names); | 
 |             if (hk == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |             hk->key.len = src[i].key.len - 5; | 
 |             hk->key.data = src[i].key.data + 5; | 
 |             hk->key_hash = ngx_hash_key_lc(hk->key.data, hk->key.len); | 
 |             hk->value = (void *) 1; | 
 |  | 
 |             if (src[i].value.len == 0) { | 
 |                 continue; | 
 |             } | 
 |         } | 
 |  | 
 |         copy = ngx_array_push_n(params->lengths, | 
 |                                 sizeof(ngx_http_script_copy_code_t)); | 
 |         if (copy == NULL) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         copy->code = (ngx_http_script_code_pt) (void *) | 
 |                                                  ngx_http_script_copy_len_code; | 
 |         copy->len = src[i].key.len; | 
 |  | 
 |         copy = ngx_array_push_n(params->lengths, | 
 |                                 sizeof(ngx_http_script_copy_code_t)); | 
 |         if (copy == NULL) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         copy->code = (ngx_http_script_code_pt) (void *) | 
 |                                                  ngx_http_script_copy_len_code; | 
 |         copy->len = src[i].skip_empty; | 
 |  | 
 |  | 
 |         size = (sizeof(ngx_http_script_copy_code_t) | 
 |                 + src[i].key.len + sizeof(uintptr_t) - 1) | 
 |                & ~(sizeof(uintptr_t) - 1); | 
 |  | 
 |         copy = ngx_array_push_n(params->values, size); | 
 |         if (copy == NULL) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         copy->code = ngx_http_script_copy_code; | 
 |         copy->len = src[i].key.len; | 
 |  | 
 |         p = (u_char *) copy + sizeof(ngx_http_script_copy_code_t); | 
 |         ngx_memcpy(p, src[i].key.data, src[i].key.len); | 
 |  | 
 |  | 
 |         ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); | 
 |  | 
 |         sc.cf = cf; | 
 |         sc.source = &src[i].value; | 
 |         sc.flushes = ¶ms->flushes; | 
 |         sc.lengths = ¶ms->lengths; | 
 |         sc.values = ¶ms->values; | 
 |  | 
 |         if (ngx_http_script_compile(&sc) != NGX_OK) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         code = ngx_array_push_n(params->lengths, sizeof(uintptr_t)); | 
 |         if (code == NULL) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         *code = (uintptr_t) NULL; | 
 |  | 
 |  | 
 |         code = ngx_array_push_n(params->values, sizeof(uintptr_t)); | 
 |         if (code == NULL) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         *code = (uintptr_t) NULL; | 
 |     } | 
 |  | 
 |     code = ngx_array_push_n(params->lengths, sizeof(uintptr_t)); | 
 |     if (code == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     *code = (uintptr_t) NULL; | 
 |  | 
 |     params->number = headers_names.nelts; | 
 |  | 
 |     hash.hash = ¶ms->hash; | 
 |     hash.key = ngx_hash_key_lc; | 
 |     hash.max_size = 512; | 
 |     hash.bucket_size = 64; | 
 |     hash.name = "uwsgi_params_hash"; | 
 |     hash.pool = cf->pool; | 
 |     hash.temp_pool = NULL; | 
 |  | 
 |     return ngx_hash_init(&hash, headers_names.elts, headers_names.nelts); | 
 | } | 
 |  | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_pass(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf = conf; | 
 |  | 
 |     size_t                      add; | 
 |     ngx_url_t                   u; | 
 |     ngx_str_t                  *value, *url; | 
 |     ngx_uint_t                  n; | 
 |     ngx_http_core_loc_conf_t   *clcf; | 
 |     ngx_http_script_compile_t   sc; | 
 |  | 
 |     if (uwcf->upstream.upstream || uwcf->uwsgi_lengths) { | 
 |         return "is duplicate"; | 
 |     } | 
 |  | 
 |     clcf = ngx_http_conf_get_module_loc_conf(cf, ngx_http_core_module); | 
 |     clcf->handler = ngx_http_uwsgi_handler; | 
 |  | 
 |     value = cf->args->elts; | 
 |  | 
 |     url = &value[1]; | 
 |  | 
 |     n = ngx_http_script_variables_count(url); | 
 |  | 
 |     if (n) { | 
 |  | 
 |         ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); | 
 |  | 
 |         sc.cf = cf; | 
 |         sc.source = url; | 
 |         sc.lengths = &uwcf->uwsgi_lengths; | 
 |         sc.values = &uwcf->uwsgi_values; | 
 |         sc.variables = n; | 
 |         sc.complete_lengths = 1; | 
 |         sc.complete_values = 1; | 
 |  | 
 |         if (ngx_http_script_compile(&sc) != NGX_OK) { | 
 |             return NGX_CONF_ERROR; | 
 |         } | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |         uwcf->ssl = 1; | 
 | #endif | 
 |  | 
 |         return NGX_CONF_OK; | 
 |     } | 
 |  | 
 |     if (ngx_strncasecmp(url->data, (u_char *) "uwsgi://", 8) == 0) { | 
 |         add = 8; | 
 |  | 
 |     } else if (ngx_strncasecmp(url->data, (u_char *) "suwsgi://", 9) == 0) { | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |         add = 9; | 
 |         uwcf->ssl = 1; | 
 | #else | 
 |         ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, | 
 |                            "suwsgi protocol requires SSL support"); | 
 |         return NGX_CONF_ERROR; | 
 | #endif | 
 |  | 
 |     } else { | 
 |         add = 0; | 
 |     } | 
 |  | 
 |     ngx_memzero(&u, sizeof(ngx_url_t)); | 
 |  | 
 |     u.url.len = url->len - add; | 
 |     u.url.data = url->data + add; | 
 |     u.no_resolve = 1; | 
 |  | 
 |     uwcf->upstream.upstream = ngx_http_upstream_add(cf, &u, 0); | 
 |     if (uwcf->upstream.upstream == NULL) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     if (clcf->name.len && clcf->name.data[clcf->name.len - 1] == '/') { | 
 |         clcf->auto_redirect = 1; | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_store(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf = conf; | 
 |  | 
 |     ngx_str_t                  *value; | 
 |     ngx_http_script_compile_t   sc; | 
 |  | 
 |     if (uwcf->upstream.store != NGX_CONF_UNSET) { | 
 |         return "is duplicate"; | 
 |     } | 
 |  | 
 |     value = cf->args->elts; | 
 |  | 
 |     if (ngx_strcmp(value[1].data, "off") == 0) { | 
 |         uwcf->upstream.store = 0; | 
 |         return NGX_CONF_OK; | 
 |     } | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 |     if (uwcf->upstream.cache > 0) { | 
 |         return "is incompatible with \"uwsgi_cache\""; | 
 |     } | 
 |  | 
 | #endif | 
 |  | 
 |     uwcf->upstream.store = 1; | 
 |  | 
 |     if (ngx_strcmp(value[1].data, "on") == 0) { | 
 |         return NGX_CONF_OK; | 
 |     } | 
 |  | 
 |     /* include the terminating '\0' into script */ | 
 |     value[1].len++; | 
 |  | 
 |     ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); | 
 |  | 
 |     sc.cf = cf; | 
 |     sc.source = &value[1]; | 
 |     sc.lengths = &uwcf->upstream.store_lengths; | 
 |     sc.values = &uwcf->upstream.store_values; | 
 |     sc.variables = ngx_http_script_variables_count(&value[1]); | 
 |     sc.complete_lengths = 1; | 
 |     sc.complete_values = 1; | 
 |  | 
 |     if (ngx_http_script_compile(&sc) != NGX_OK) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 |  | 
 | #if (NGX_HTTP_CACHE) | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_cache(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf = conf; | 
 |  | 
 |     ngx_str_t                         *value; | 
 |     ngx_http_complex_value_t           cv; | 
 |     ngx_http_compile_complex_value_t   ccv; | 
 |  | 
 |     value = cf->args->elts; | 
 |  | 
 |     if (uwcf->upstream.cache != NGX_CONF_UNSET) { | 
 |         return "is duplicate"; | 
 |     } | 
 |  | 
 |     if (ngx_strcmp(value[1].data, "off") == 0) { | 
 |         uwcf->upstream.cache = 0; | 
 |         return NGX_CONF_OK; | 
 |     } | 
 |  | 
 |     if (uwcf->upstream.store > 0) { | 
 |         return "is incompatible with \"uwsgi_store\""; | 
 |     } | 
 |  | 
 |     uwcf->upstream.cache = 1; | 
 |  | 
 |     ngx_memzero(&ccv, sizeof(ngx_http_compile_complex_value_t)); | 
 |  | 
 |     ccv.cf = cf; | 
 |     ccv.value = &value[1]; | 
 |     ccv.complex_value = &cv; | 
 |  | 
 |     if (ngx_http_compile_complex_value(&ccv) != NGX_OK) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     if (cv.lengths != NULL) { | 
 |  | 
 |         uwcf->upstream.cache_value = ngx_palloc(cf->pool, | 
 |                                              sizeof(ngx_http_complex_value_t)); | 
 |         if (uwcf->upstream.cache_value == NULL) { | 
 |             return NGX_CONF_ERROR; | 
 |         } | 
 |  | 
 |         *uwcf->upstream.cache_value = cv; | 
 |  | 
 |         return NGX_CONF_OK; | 
 |     } | 
 |  | 
 |     uwcf->upstream.cache_zone = ngx_shared_memory_add(cf, &value[1], 0, | 
 |                                                       &ngx_http_uwsgi_module); | 
 |     if (uwcf->upstream.cache_zone == NULL) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_cache_key(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf = conf; | 
 |  | 
 |     ngx_str_t                         *value; | 
 |     ngx_http_compile_complex_value_t   ccv; | 
 |  | 
 |     value = cf->args->elts; | 
 |  | 
 |     if (uwcf->cache_key.value.data) { | 
 |         return "is duplicate"; | 
 |     } | 
 |  | 
 |     ngx_memzero(&ccv, sizeof(ngx_http_compile_complex_value_t)); | 
 |  | 
 |     ccv.cf = cf; | 
 |     ccv.value = &value[1]; | 
 |     ccv.complex_value = &uwcf->cache_key; | 
 |  | 
 |     if (ngx_http_compile_complex_value(&ccv) != NGX_OK) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 | #endif | 
 |  | 
 |  | 
 | #if (NGX_HTTP_SSL) | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_ssl_password_file(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) | 
 | { | 
 |     ngx_http_uwsgi_loc_conf_t *uwcf = conf; | 
 |  | 
 |     ngx_str_t  *value; | 
 |  | 
 |     if (uwcf->upstream.ssl_passwords != NGX_CONF_UNSET_PTR) { | 
 |         return "is duplicate"; | 
 |     } | 
 |  | 
 |     value = cf->args->elts; | 
 |  | 
 |     uwcf->upstream.ssl_passwords = ngx_ssl_read_password_file(cf, &value[1]); | 
 |  | 
 |     if (uwcf->upstream.ssl_passwords == NULL) { | 
 |         return NGX_CONF_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_CONF_OK; | 
 | } | 
 |  | 
 |  | 
 | static char * | 
 | ngx_http_uwsgi_ssl_conf_command_check(ngx_conf_t *cf, void *post, void *data) | 
 | { | 
 | #ifndef SSL_CONF_FLAG_FILE | 
 |     return "is not supported on this platform"; | 
 | #else | 
 |     return NGX_CONF_OK; | 
 | #endif | 
 | } | 
 |  | 
 |  | 
 | static ngx_int_t | 
 | ngx_http_uwsgi_set_ssl(ngx_conf_t *cf, ngx_http_uwsgi_loc_conf_t *uwcf) | 
 | { | 
 |     ngx_pool_cleanup_t  *cln; | 
 |  | 
 |     uwcf->upstream.ssl = ngx_pcalloc(cf->pool, sizeof(ngx_ssl_t)); | 
 |     if (uwcf->upstream.ssl == NULL) { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     uwcf->upstream.ssl->log = cf->log; | 
 |  | 
 |     if (ngx_ssl_create(uwcf->upstream.ssl, uwcf->ssl_protocols, NULL) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     cln = ngx_pool_cleanup_add(cf->pool, 0); | 
 |     if (cln == NULL) { | 
 |         ngx_ssl_cleanup_ctx(uwcf->upstream.ssl); | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     cln->handler = ngx_ssl_cleanup_ctx; | 
 |     cln->data = uwcf->upstream.ssl; | 
 |  | 
 |     if (ngx_ssl_ciphers(cf, uwcf->upstream.ssl, &uwcf->ssl_ciphers, 0) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (uwcf->upstream.ssl_certificate) { | 
 |  | 
 |         if (uwcf->upstream.ssl_certificate_key == NULL) { | 
 |             ngx_log_error(NGX_LOG_EMERG, cf->log, 0, | 
 |                           "no \"uwsgi_ssl_certificate_key\" is defined " | 
 |                           "for certificate \"%V\"", | 
 |                           &uwcf->upstream.ssl_certificate->value); | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         if (uwcf->upstream.ssl_certificate->lengths | 
 |             || uwcf->upstream.ssl_certificate_key->lengths) | 
 |         { | 
 |             uwcf->upstream.ssl_passwords = | 
 |                   ngx_ssl_preserve_passwords(cf, uwcf->upstream.ssl_passwords); | 
 |             if (uwcf->upstream.ssl_passwords == NULL) { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |  | 
 |         } else { | 
 |             if (ngx_ssl_certificate(cf, uwcf->upstream.ssl, | 
 |                                     &uwcf->upstream.ssl_certificate->value, | 
 |                                     &uwcf->upstream.ssl_certificate_key->value, | 
 |                                     uwcf->upstream.ssl_passwords) | 
 |                 != NGX_OK) | 
 |             { | 
 |                 return NGX_ERROR; | 
 |             } | 
 |         } | 
 |     } | 
 |  | 
 |     if (uwcf->upstream.ssl_verify) { | 
 |         if (uwcf->ssl_trusted_certificate.len == 0) { | 
 |             ngx_log_error(NGX_LOG_EMERG, cf->log, 0, | 
 |                       "no uwsgi_ssl_trusted_certificate for uwsgi_ssl_verify"); | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         if (ngx_ssl_trusted_certificate(cf, uwcf->upstream.ssl, | 
 |                                         &uwcf->ssl_trusted_certificate, | 
 |                                         uwcf->ssl_verify_depth) | 
 |             != NGX_OK) | 
 |         { | 
 |             return NGX_ERROR; | 
 |         } | 
 |  | 
 |         if (ngx_ssl_crl(cf, uwcf->upstream.ssl, &uwcf->ssl_crl) != NGX_OK) { | 
 |             return NGX_ERROR; | 
 |         } | 
 |     } | 
 |  | 
 |     if (ngx_ssl_client_session_cache(cf, uwcf->upstream.ssl, | 
 |                                      uwcf->upstream.ssl_session_reuse) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     if (ngx_ssl_conf_commands(cf, uwcf->upstream.ssl, uwcf->ssl_conf_commands) | 
 |         != NGX_OK) | 
 |     { | 
 |         return NGX_ERROR; | 
 |     } | 
 |  | 
 |     return NGX_OK; | 
 | } | 
 |  | 
 | #endif |