| |
| /* |
| * Copyright (C) Unbit S.a.s. 2009-2010 |
| * Copyright (C) 2008 Manlio Perillo (manlio.perillo@gmail.com) |
| * Copyright (C) Igor Sysoev |
| * Copyright (C) Nginx, Inc. |
| */ |
| |
| |
| #include <ngx_config.h> |
| #include <ngx_core.h> |
| #include <ngx_http.h> |
| |
| |
| typedef struct { |
| ngx_array_t caches; /* ngx_http_file_cache_t * */ |
| } ngx_http_uwsgi_main_conf_t; |
| |
| |
| typedef struct { |
| ngx_array_t *flushes; |
| ngx_array_t *lengths; |
| ngx_array_t *values; |
| ngx_uint_t number; |
| ngx_hash_t hash; |
| } ngx_http_uwsgi_params_t; |
| |
| |
| typedef struct { |
| ngx_http_upstream_conf_t upstream; |
| |
| ngx_http_uwsgi_params_t params; |
| #if (NGX_HTTP_CACHE) |
| ngx_http_uwsgi_params_t params_cache; |
| #endif |
| ngx_array_t *params_source; |
| |
| ngx_array_t *uwsgi_lengths; |
| ngx_array_t *uwsgi_values; |
| |
| #if (NGX_HTTP_CACHE) |
| ngx_http_complex_value_t cache_key; |
| #endif |
| |
| ngx_str_t uwsgi_string; |
| |
| ngx_uint_t modifier1; |
| ngx_uint_t modifier2; |
| |
| #if (NGX_HTTP_SSL) |
| ngx_uint_t ssl; |
| ngx_uint_t ssl_protocols; |
| ngx_str_t ssl_ciphers; |
| ngx_uint_t ssl_verify_depth; |
| ngx_str_t ssl_trusted_certificate; |
| ngx_str_t ssl_crl; |
| ngx_str_t ssl_certificate; |
| ngx_str_t ssl_certificate_key; |
| ngx_array_t *ssl_passwords; |
| #endif |
| } ngx_http_uwsgi_loc_conf_t; |
| |
| |
| static ngx_int_t ngx_http_uwsgi_eval(ngx_http_request_t *r, |
| ngx_http_uwsgi_loc_conf_t *uwcf); |
| static ngx_int_t ngx_http_uwsgi_create_request(ngx_http_request_t *r); |
| static ngx_int_t ngx_http_uwsgi_reinit_request(ngx_http_request_t *r); |
| static ngx_int_t ngx_http_uwsgi_process_status_line(ngx_http_request_t *r); |
| static ngx_int_t ngx_http_uwsgi_process_header(ngx_http_request_t *r); |
| static void ngx_http_uwsgi_abort_request(ngx_http_request_t *r); |
| static void ngx_http_uwsgi_finalize_request(ngx_http_request_t *r, |
| ngx_int_t rc); |
| |
| static void *ngx_http_uwsgi_create_main_conf(ngx_conf_t *cf); |
| static void *ngx_http_uwsgi_create_loc_conf(ngx_conf_t *cf); |
| static char *ngx_http_uwsgi_merge_loc_conf(ngx_conf_t *cf, void *parent, |
| void *child); |
| static ngx_int_t ngx_http_uwsgi_init_params(ngx_conf_t *cf, |
| ngx_http_uwsgi_loc_conf_t *conf, ngx_http_uwsgi_params_t *params, |
| ngx_keyval_t *default_params); |
| |
| static char *ngx_http_uwsgi_pass(ngx_conf_t *cf, ngx_command_t *cmd, |
| void *conf); |
| static char *ngx_http_uwsgi_store(ngx_conf_t *cf, ngx_command_t *cmd, |
| void *conf); |
| |
| #if (NGX_HTTP_CACHE) |
| static ngx_int_t ngx_http_uwsgi_create_key(ngx_http_request_t *r); |
| static char *ngx_http_uwsgi_cache(ngx_conf_t *cf, ngx_command_t *cmd, |
| void *conf); |
| static char *ngx_http_uwsgi_cache_key(ngx_conf_t *cf, ngx_command_t *cmd, |
| void *conf); |
| #endif |
| |
| #if (NGX_HTTP_SSL) |
| static char *ngx_http_uwsgi_ssl_password_file(ngx_conf_t *cf, |
| ngx_command_t *cmd, void *conf); |
| static ngx_int_t ngx_http_uwsgi_set_ssl(ngx_conf_t *cf, |
| ngx_http_uwsgi_loc_conf_t *uwcf); |
| #endif |
| |
| |
| static ngx_conf_num_bounds_t ngx_http_uwsgi_modifier_bounds = { |
| ngx_conf_check_num_bounds, 0, 255 |
| }; |
| |
| |
| static ngx_conf_bitmask_t ngx_http_uwsgi_next_upstream_masks[] = { |
| { ngx_string("error"), NGX_HTTP_UPSTREAM_FT_ERROR }, |
| { ngx_string("timeout"), NGX_HTTP_UPSTREAM_FT_TIMEOUT }, |
| { ngx_string("invalid_header"), NGX_HTTP_UPSTREAM_FT_INVALID_HEADER }, |
| { ngx_string("non_idempotent"), NGX_HTTP_UPSTREAM_FT_NON_IDEMPOTENT }, |
| { ngx_string("http_500"), NGX_HTTP_UPSTREAM_FT_HTTP_500 }, |
| { ngx_string("http_503"), NGX_HTTP_UPSTREAM_FT_HTTP_503 }, |
| { ngx_string("http_403"), NGX_HTTP_UPSTREAM_FT_HTTP_403 }, |
| { ngx_string("http_404"), NGX_HTTP_UPSTREAM_FT_HTTP_404 }, |
| { ngx_string("http_429"), NGX_HTTP_UPSTREAM_FT_HTTP_429 }, |
| { ngx_string("updating"), NGX_HTTP_UPSTREAM_FT_UPDATING }, |
| { ngx_string("off"), NGX_HTTP_UPSTREAM_FT_OFF }, |
| { ngx_null_string, 0 } |
| }; |
| |
| |
| #if (NGX_HTTP_SSL) |
| |
| static ngx_conf_bitmask_t ngx_http_uwsgi_ssl_protocols[] = { |
| { ngx_string("SSLv2"), NGX_SSL_SSLv2 }, |
| { ngx_string("SSLv3"), NGX_SSL_SSLv3 }, |
| { ngx_string("TLSv1"), NGX_SSL_TLSv1 }, |
| { ngx_string("TLSv1.1"), NGX_SSL_TLSv1_1 }, |
| { ngx_string("TLSv1.2"), NGX_SSL_TLSv1_2 }, |
| { ngx_string("TLSv1.3"), NGX_SSL_TLSv1_3 }, |
| { ngx_null_string, 0 } |
| }; |
| |
| #endif |
| |
| |
| ngx_module_t ngx_http_uwsgi_module; |
| |
| |
| static ngx_command_t ngx_http_uwsgi_commands[] = { |
| |
| { ngx_string("uwsgi_pass"), |
| NGX_HTTP_LOC_CONF|NGX_HTTP_LIF_CONF|NGX_CONF_TAKE1, |
| ngx_http_uwsgi_pass, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| 0, |
| NULL }, |
| |
| { ngx_string("uwsgi_modifier1"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_num_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, modifier1), |
| &ngx_http_uwsgi_modifier_bounds }, |
| |
| { ngx_string("uwsgi_modifier2"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_num_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, modifier2), |
| &ngx_http_uwsgi_modifier_bounds }, |
| |
| { ngx_string("uwsgi_store"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_http_uwsgi_store, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| 0, |
| NULL }, |
| |
| { ngx_string("uwsgi_store_access"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE123, |
| ngx_conf_set_access_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.store_access), |
| NULL }, |
| |
| { ngx_string("uwsgi_buffering"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.buffering), |
| NULL }, |
| |
| { ngx_string("uwsgi_request_buffering"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.request_buffering), |
| NULL }, |
| |
| { ngx_string("uwsgi_ignore_client_abort"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ignore_client_abort), |
| NULL }, |
| |
| { ngx_string("uwsgi_bind"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE12, |
| ngx_http_upstream_bind_set_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.local), |
| NULL }, |
| |
| { ngx_string("uwsgi_socket_keepalive"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.socket_keepalive), |
| NULL }, |
| |
| { ngx_string("uwsgi_connect_timeout"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.connect_timeout), |
| NULL }, |
| |
| { ngx_string("uwsgi_send_timeout"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.send_timeout), |
| NULL }, |
| |
| { ngx_string("uwsgi_buffer_size"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_size_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.buffer_size), |
| NULL }, |
| |
| { ngx_string("uwsgi_pass_request_headers"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_request_headers), |
| NULL }, |
| |
| { ngx_string("uwsgi_pass_request_body"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_request_body), |
| NULL }, |
| |
| { ngx_string("uwsgi_intercept_errors"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.intercept_errors), |
| NULL }, |
| |
| { ngx_string("uwsgi_read_timeout"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.read_timeout), |
| NULL }, |
| |
| { ngx_string("uwsgi_buffers"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE2, |
| ngx_conf_set_bufs_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.bufs), |
| NULL }, |
| |
| { ngx_string("uwsgi_busy_buffers_size"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_size_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.busy_buffers_size_conf), |
| NULL }, |
| |
| { ngx_string("uwsgi_force_ranges"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.force_ranges), |
| NULL }, |
| |
| { ngx_string("uwsgi_limit_rate"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_size_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.limit_rate), |
| NULL }, |
| |
| #if (NGX_HTTP_CACHE) |
| |
| { ngx_string("uwsgi_cache"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_http_uwsgi_cache, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| 0, |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_key"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_http_uwsgi_cache_key, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| 0, |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_path"), |
| NGX_HTTP_MAIN_CONF|NGX_CONF_2MORE, |
| ngx_http_file_cache_set_slot, |
| NGX_HTTP_MAIN_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_main_conf_t, caches), |
| &ngx_http_uwsgi_module }, |
| |
| { ngx_string("uwsgi_cache_bypass"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_http_set_predicate_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_bypass), |
| NULL }, |
| |
| { ngx_string("uwsgi_no_cache"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_http_set_predicate_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.no_cache), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_valid"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_http_file_cache_valid_set_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_valid), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_min_uses"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_num_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_min_uses), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_max_range_offset"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_off_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_max_range_offset), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_use_stale"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_conf_set_bitmask_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_use_stale), |
| &ngx_http_uwsgi_next_upstream_masks }, |
| |
| { ngx_string("uwsgi_cache_methods"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_conf_set_bitmask_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_methods), |
| &ngx_http_upstream_cache_method_mask }, |
| |
| { ngx_string("uwsgi_cache_lock"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_lock_timeout"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock_timeout), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_lock_age"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_lock_age), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_revalidate"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_revalidate), |
| NULL }, |
| |
| { ngx_string("uwsgi_cache_background_update"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.cache_background_update), |
| NULL }, |
| |
| #endif |
| |
| { ngx_string("uwsgi_temp_path"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1234, |
| ngx_conf_set_path_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.temp_path), |
| NULL }, |
| |
| { ngx_string("uwsgi_max_temp_file_size"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_size_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.max_temp_file_size_conf), |
| NULL }, |
| |
| { ngx_string("uwsgi_temp_file_write_size"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_size_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.temp_file_write_size_conf), |
| NULL }, |
| |
| { ngx_string("uwsgi_next_upstream"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_conf_set_bitmask_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream), |
| &ngx_http_uwsgi_next_upstream_masks }, |
| |
| { ngx_string("uwsgi_next_upstream_tries"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_num_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream_tries), |
| NULL }, |
| |
| { ngx_string("uwsgi_next_upstream_timeout"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_msec_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.next_upstream_timeout), |
| NULL }, |
| |
| { ngx_string("uwsgi_param"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE23, |
| ngx_http_upstream_param_set_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, params_source), |
| NULL }, |
| |
| { ngx_string("uwsgi_string"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, uwsgi_string), |
| NULL }, |
| |
| { ngx_string("uwsgi_pass_header"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_array_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.pass_headers), |
| NULL }, |
| |
| { ngx_string("uwsgi_hide_header"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_array_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.hide_headers), |
| NULL }, |
| |
| { ngx_string("uwsgi_ignore_headers"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_conf_set_bitmask_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ignore_headers), |
| &ngx_http_upstream_ignore_headers_masks }, |
| |
| #if (NGX_HTTP_SSL) |
| |
| { ngx_string("uwsgi_ssl_session_reuse"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_session_reuse), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_protocols"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_1MORE, |
| ngx_conf_set_bitmask_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_protocols), |
| &ngx_http_uwsgi_ssl_protocols }, |
| |
| { ngx_string("uwsgi_ssl_ciphers"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_ciphers), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_name"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_http_set_complex_value_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_name), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_server_name"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_server_name), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_verify"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_FLAG, |
| ngx_conf_set_flag_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, upstream.ssl_verify), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_verify_depth"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_num_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_verify_depth), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_trusted_certificate"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_trusted_certificate), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_crl"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_crl), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_certificate"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_certificate), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_certificate_key"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_conf_set_str_slot, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| offsetof(ngx_http_uwsgi_loc_conf_t, ssl_certificate_key), |
| NULL }, |
| |
| { ngx_string("uwsgi_ssl_password_file"), |
| NGX_HTTP_MAIN_CONF|NGX_HTTP_SRV_CONF|NGX_HTTP_LOC_CONF|NGX_CONF_TAKE1, |
| ngx_http_uwsgi_ssl_password_file, |
| NGX_HTTP_LOC_CONF_OFFSET, |
| 0, |
| NULL }, |
| |
| #endif |
| |
| ngx_null_command |
| }; |
| |
| |
| static ngx_http_module_t ngx_http_uwsgi_module_ctx = { |
| NULL, /* preconfiguration */ |
| NULL, /* postconfiguration */ |
| |
| ngx_http_uwsgi_create_main_conf, /* create main configuration */ |
| NULL, /* init main configuration */ |
| |
| NULL, /* create server configuration */ |
| NULL, /* merge server configuration */ |
| |
| ngx_http_uwsgi_create_loc_conf, /* create location configuration */ |
| ngx_http_uwsgi_merge_loc_conf /* merge location configuration */ |
| }; |
| |
| |
| ngx_module_t ngx_http_uwsgi_module = { |
| NGX_MODULE_V1, |
| &ngx_http_uwsgi_module_ctx, /* module context */ |
| ngx_http_uwsgi_commands, /* module directives */ |
| NGX_HTTP_MODULE, /* module type */ |
| NULL, /* init master */ |
| NULL, /* init module */ |
| NULL, /* init process */ |
| NULL, /* init thread */ |
| NULL, /* exit thread */ |
| NULL, /* exit process */ |
| NULL, /* exit master */ |
| NGX_MODULE_V1_PADDING |
| }; |
| |
| |
| static ngx_str_t ngx_http_uwsgi_hide_headers[] = { |
| ngx_string("X-Accel-Expires"), |
| ngx_string("X-Accel-Redirect"), |
| ngx_string("X-Accel-Limit-Rate"), |
| ngx_string("X-Accel-Buffering"), |
| ngx_string("X-Accel-Charset"), |
| ngx_null_string |
| }; |
| |
| |
| #if (NGX_HTTP_CACHE) |
| |
| static ngx_keyval_t ngx_http_uwsgi_cache_headers[] = { |
| { ngx_string("HTTP_IF_MODIFIED_SINCE"), |
| ngx_string("$upstream_cache_last_modified") }, |
| { ngx_string("HTTP_IF_UNMODIFIED_SINCE"), ngx_string("") }, |
| { ngx_string("HTTP_IF_NONE_MATCH"), ngx_string("$upstream_cache_etag") }, |
| { ngx_string("HTTP_IF_MATCH"), ngx_string("") }, |
| { ngx_string("HTTP_RANGE"), ngx_string("") }, |
| { ngx_string("HTTP_IF_RANGE"), ngx_string("") }, |
| { ngx_null_string, ngx_null_string } |
| }; |
| |
| #endif |
| |
| |
| static ngx_path_init_t ngx_http_uwsgi_temp_path = { |
| ngx_string(NGX_HTTP_UWSGI_TEMP_PATH), { 1, 2, 0 } |
| }; |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_handler(ngx_http_request_t *r) |
| { |
| ngx_int_t rc; |
| ngx_http_status_t *status; |
| ngx_http_upstream_t *u; |
| ngx_http_uwsgi_loc_conf_t *uwcf; |
| #if (NGX_HTTP_CACHE) |
| ngx_http_uwsgi_main_conf_t *uwmcf; |
| #endif |
| |
| if (ngx_http_upstream_create(r) != NGX_OK) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| status = ngx_pcalloc(r->pool, sizeof(ngx_http_status_t)); |
| if (status == NULL) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| ngx_http_set_ctx(r, status, ngx_http_uwsgi_module); |
| |
| uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); |
| |
| u = r->upstream; |
| |
| if (uwcf->uwsgi_lengths == NULL) { |
| |
| #if (NGX_HTTP_SSL) |
| u->ssl = (uwcf->upstream.ssl != NULL); |
| |
| if (u->ssl) { |
| ngx_str_set(&u->schema, "suwsgi://"); |
| |
| } else { |
| ngx_str_set(&u->schema, "uwsgi://"); |
| } |
| #else |
| ngx_str_set(&u->schema, "uwsgi://"); |
| #endif |
| |
| } else { |
| if (ngx_http_uwsgi_eval(r, uwcf) != NGX_OK) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| } |
| |
| u->output.tag = (ngx_buf_tag_t) &ngx_http_uwsgi_module; |
| |
| u->conf = &uwcf->upstream; |
| |
| #if (NGX_HTTP_CACHE) |
| uwmcf = ngx_http_get_module_main_conf(r, ngx_http_uwsgi_module); |
| |
| u->caches = &uwmcf->caches; |
| u->create_key = ngx_http_uwsgi_create_key; |
| #endif |
| |
| u->create_request = ngx_http_uwsgi_create_request; |
| u->reinit_request = ngx_http_uwsgi_reinit_request; |
| u->process_header = ngx_http_uwsgi_process_status_line; |
| u->abort_request = ngx_http_uwsgi_abort_request; |
| u->finalize_request = ngx_http_uwsgi_finalize_request; |
| r->state = 0; |
| |
| u->buffering = uwcf->upstream.buffering; |
| |
| u->pipe = ngx_pcalloc(r->pool, sizeof(ngx_event_pipe_t)); |
| if (u->pipe == NULL) { |
| return NGX_HTTP_INTERNAL_SERVER_ERROR; |
| } |
| |
| u->pipe->input_filter = ngx_event_pipe_copy_input_filter; |
| u->pipe->input_ctx = r; |
| |
| if (!uwcf->upstream.request_buffering |
| && uwcf->upstream.pass_request_body |
| && !r->headers_in.chunked) |
| { |
| r->request_body_no_buffering = 1; |
| } |
| |
| rc = ngx_http_read_client_request_body(r, ngx_http_upstream_init); |
| |
| if (rc >= NGX_HTTP_SPECIAL_RESPONSE) { |
| return rc; |
| } |
| |
| return NGX_DONE; |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_eval(ngx_http_request_t *r, ngx_http_uwsgi_loc_conf_t * uwcf) |
| { |
| size_t add; |
| ngx_url_t url; |
| ngx_http_upstream_t *u; |
| |
| ngx_memzero(&url, sizeof(ngx_url_t)); |
| |
| if (ngx_http_script_run(r, &url.url, uwcf->uwsgi_lengths->elts, 0, |
| uwcf->uwsgi_values->elts) |
| == NULL) |
| { |
| return NGX_ERROR; |
| } |
| |
| if (url.url.len > 8 |
| && ngx_strncasecmp(url.url.data, (u_char *) "uwsgi://", 8) == 0) |
| { |
| add = 8; |
| |
| } else if (url.url.len > 9 |
| && ngx_strncasecmp(url.url.data, (u_char *) "suwsgi://", 9) == 0) |
| { |
| |
| #if (NGX_HTTP_SSL) |
| add = 9; |
| r->upstream->ssl = 1; |
| #else |
| ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, |
| "suwsgi protocol requires SSL support"); |
| return NGX_ERROR; |
| #endif |
| |
| } else { |
| add = 0; |
| } |
| |
| u = r->upstream; |
| |
| if (add) { |
| u->schema.len = add; |
| u->schema.data = url.url.data; |
| |
| url.url.data += add; |
| url.url.len -= add; |
| |
| } else { |
| ngx_str_set(&u->schema, "uwsgi://"); |
| } |
| |
| url.no_resolve = 1; |
| |
| if (ngx_parse_url(r->pool, &url) != NGX_OK) { |
| if (url.err) { |
| ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, |
| "%s in upstream \"%V\"", url.err, &url.url); |
| } |
| |
| return NGX_ERROR; |
| } |
| |
| u->resolved = ngx_pcalloc(r->pool, sizeof(ngx_http_upstream_resolved_t)); |
| if (u->resolved == NULL) { |
| return NGX_ERROR; |
| } |
| |
| if (url.addrs) { |
| u->resolved->sockaddr = url.addrs[0].sockaddr; |
| u->resolved->socklen = url.addrs[0].socklen; |
| u->resolved->name = url.addrs[0].name; |
| u->resolved->naddrs = 1; |
| } |
| |
| u->resolved->host = url.host; |
| u->resolved->port = url.port; |
| u->resolved->no_port = url.no_port; |
| |
| return NGX_OK; |
| } |
| |
| |
| #if (NGX_HTTP_CACHE) |
| |
| static ngx_int_t |
| ngx_http_uwsgi_create_key(ngx_http_request_t *r) |
| { |
| ngx_str_t *key; |
| ngx_http_uwsgi_loc_conf_t *uwcf; |
| |
| key = ngx_array_push(&r->cache->keys); |
| if (key == NULL) { |
| return NGX_ERROR; |
| } |
| |
| uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); |
| |
| if (ngx_http_complex_value(r, &uwcf->cache_key, key) != NGX_OK) { |
| return NGX_ERROR; |
| } |
| |
| return NGX_OK; |
| } |
| |
| #endif |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_create_request(ngx_http_request_t *r) |
| { |
| u_char ch, *lowcase_key; |
| size_t key_len, val_len, len, allocated; |
| ngx_uint_t i, n, hash, skip_empty, header_params; |
| ngx_buf_t *b; |
| ngx_chain_t *cl, *body; |
| ngx_list_part_t *part; |
| ngx_table_elt_t *header, **ignored; |
| ngx_http_uwsgi_params_t *params; |
| ngx_http_script_code_pt code; |
| ngx_http_script_engine_t e, le; |
| ngx_http_uwsgi_loc_conf_t *uwcf; |
| ngx_http_script_len_code_pt lcode; |
| |
| len = 0; |
| header_params = 0; |
| ignored = NULL; |
| |
| uwcf = ngx_http_get_module_loc_conf(r, ngx_http_uwsgi_module); |
| |
| #if (NGX_HTTP_CACHE) |
| params = r->upstream->cacheable ? &uwcf->params_cache : &uwcf->params; |
| #else |
| params = &uwcf->params; |
| #endif |
| |
| if (params->lengths) { |
| ngx_memzero(&le, sizeof(ngx_http_script_engine_t)); |
| |
| ngx_http_script_flush_no_cacheable_variables(r, params->flushes); |
| le.flushed = 1; |
| |
| le.ip = params->lengths->elts; |
| le.request = r; |
| |
| while (*(uintptr_t *) le.ip) { |
| |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| key_len = lcode(&le); |
| |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| skip_empty = lcode(&le); |
| |
| for (val_len = 0; *(uintptr_t *) le.ip; val_len += lcode(&le)) { |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| } |
| le.ip += sizeof(uintptr_t); |
| |
| if (skip_empty && val_len == 0) { |
| continue; |
| } |
| |
| len += 2 + key_len + 2 + val_len; |
| } |
| } |
| |
| if (uwcf->upstream.pass_request_headers) { |
| |
| allocated = 0; |
| lowcase_key = NULL; |
| |
| if (params->number) { |
| n = 0; |
| part = &r->headers_in.headers.part; |
| |
| while (part) { |
| n += part->nelts; |
| part = part->next; |
| } |
| |
| ignored = ngx_palloc(r->pool, n * sizeof(void *)); |
| if (ignored == NULL) { |
| return NGX_ERROR; |
| } |
| } |
| |
| part = &r->headers_in.headers.part; |
| header = part->elts; |
| |
| for (i = 0; /* void */ ; i++) { |
| |
| if (i >= part->nelts) { |
| if (part->next == NULL) { |
| break; |
| } |
| |
| part = part->next; |
| header = part->elts; |
| i = 0; |
| } |
| |
| if (params->number) { |
| if (allocated < header[i].key.len) { |
| allocated = header[i].key.len + 16; |
| lowcase_key = ngx_pnalloc(r->pool, allocated); |
| if (lowcase_key == NULL) { |
| return NGX_ERROR; |
| } |
| } |
| |
| hash = 0; |
| |
| for (n = 0; n < header[i].key.len; n++) { |
| ch = header[i].key.data[n]; |
| |
| if (ch >= 'A' && ch <= 'Z') { |
| ch |= 0x20; |
| |
| } else if (ch == '-') { |
| ch = '_'; |
| } |
| |
| hash = ngx_hash(hash, ch); |
| lowcase_key[n] = ch; |
| } |
| |
| if (ngx_hash_find(¶ms->hash, hash, lowcase_key, n)) { |
| ignored[header_params++] = &header[i]; |
| continue; |
| } |
| } |
| |
| len += 2 + sizeof("HTTP_") - 1 + header[i].key.len |
| + 2 + header[i].value.len; |
| } |
| } |
| |
| len += uwcf->uwsgi_string.len; |
| |
| #if 0 |
| /* allow custom uwsgi packet */ |
| if (len > 0 && len < 2) { |
| ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0, |
| "uwsgi request is too little: %uz", len); |
| return NGX_ERROR; |
| } |
| #endif |
| |
| if (len > 65535) { |
| ngx_log_error(NGX_LOG_ALERT, r->connection->log, 0, |
| "uwsgi request is too big: %uz", len); |
| return NGX_ERROR; |
| } |
| |
| b = ngx_create_temp_buf(r->pool, len + 4); |
| if (b == NULL) { |
| return NGX_ERROR; |
| } |
| |
| cl = ngx_alloc_chain_link(r->pool); |
| if (cl == NULL) { |
| return NGX_ERROR; |
| } |
| |
| cl->buf = b; |
| |
| *b->last++ = (u_char) uwcf->modifier1; |
| *b->last++ = (u_char) (len & 0xff); |
| *b->last++ = (u_char) ((len >> 8) & 0xff); |
| *b->last++ = (u_char) uwcf->modifier2; |
| |
| if (params->lengths) { |
| ngx_memzero(&e, sizeof(ngx_http_script_engine_t)); |
| |
| e.ip = params->values->elts; |
| e.pos = b->last; |
| e.request = r; |
| e.flushed = 1; |
| |
| le.ip = params->lengths->elts; |
| |
| while (*(uintptr_t *) le.ip) { |
| |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| key_len = (u_char) lcode(&le); |
| |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| skip_empty = lcode(&le); |
| |
| for (val_len = 0; *(uintptr_t *) le.ip; val_len += lcode(&le)) { |
| lcode = *(ngx_http_script_len_code_pt *) le.ip; |
| } |
| le.ip += sizeof(uintptr_t); |
| |
| if (skip_empty && val_len == 0) { |
| e.skip = 1; |
| |
| while (*(uintptr_t *) e.ip) { |
| code = *(ngx_http_script_code_pt *) e.ip; |
| code((ngx_http_script_engine_t *) &e); |
| } |
| e.ip += sizeof(uintptr_t); |
| |
| e.skip = 0; |
| |
| continue; |
| } |
| |
| *e.pos++ = (u_char) (key_len & 0xff); |
| *e.pos++ = (u_char) ((key_len >> 8) & 0xff); |
| |
| code = *(ngx_http_script_code_pt *) e.ip; |
| code((ngx_http_script_engine_t *) &e); |
| |
| *e.pos++ = (u_char) (val_len & 0xff); |
| *e.pos++ = (u_char) ((val_len >> 8) & 0xff); |
| |
| while (*(uintptr_t *) e.ip) { |
| code = *(ngx_http_script_code_pt *) e.ip; |
| code((ngx_http_script_engine_t *) &e); |
| } |
| |
| e.ip += sizeof(uintptr_t); |
| |
| ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "uwsgi param: \"%*s: %*s\"", |
| key_len, e.pos - (key_len + 2 + val_len), |
| val_len, e.pos - val_len); |
| } |
| |
| b->last = e.pos; |
| } |
| |
| if (uwcf->upstream.pass_request_headers) { |
| |
| part = &r->headers_in.headers.part; |
| header = part->elts; |
| |
| for (i = 0; /* void */ ; i++) { |
| |
| if (i >= part->nelts) { |
| if (part->next == NULL) { |
| break; |
| } |
| |
| part = part->next; |
| header = part->elts; |
| i = 0; |
| } |
| |
| for (n = 0; n < header_params; n++) { |
| if (&header[i] == ignored[n]) { |
| goto next; |
| } |
| } |
| |
| key_len = sizeof("HTTP_") - 1 + header[i].key.len; |
| *b->last++ = (u_char) (key_len & 0xff); |
| *b->last++ = (u_char) ((key_len >> 8) & 0xff); |
| |
| b->last = ngx_cpymem(b->last, "HTTP_", sizeof("HTTP_") - 1); |
| for (n = 0; n < header[i].key.len; n++) { |
| ch = header[i].key.data[n]; |
| |
| if (ch >= 'a' && ch <= 'z') { |
| ch &= ~0x20; |
| |
| } else if (ch == '-') { |
| ch = '_'; |
| } |
| |
| *b->last++ = ch; |
| } |
| |
| val_len = header[i].value.len; |
| *b->last++ = (u_char) (val_len & 0xff); |
| *b->last++ = (u_char) ((val_len >> 8) & 0xff); |
| b->last = ngx_copy(b->last, header[i].value.data, val_len); |
| |
| ngx_log_debug4(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "uwsgi param: \"%*s: %*s\"", |
| key_len, b->last - (key_len + 2 + val_len), |
| val_len, b->last - val_len); |
| next: |
| |
| continue; |
| } |
| } |
| |
| b->last = ngx_copy(b->last, uwcf->uwsgi_string.data, |
| uwcf->uwsgi_string.len); |
| |
| if (r->request_body_no_buffering) { |
| r->upstream->request_bufs = cl; |
| |
| } else if (uwcf->upstream.pass_request_body) { |
| body = r->upstream->request_bufs; |
| r->upstream->request_bufs = cl; |
| |
| while (body) { |
| b = ngx_alloc_buf(r->pool); |
| if (b == NULL) { |
| return NGX_ERROR; |
| } |
| |
| ngx_memcpy(b, body->buf, sizeof(ngx_buf_t)); |
| |
| cl->next = ngx_alloc_chain_link(r->pool); |
| if (cl->next == NULL) { |
| return NGX_ERROR; |
| } |
| |
| cl = cl->next; |
| cl->buf = b; |
| |
| body = body->next; |
| } |
| |
| } else { |
| r->upstream->request_bufs = cl; |
| } |
| |
| cl->next = NULL; |
| |
| return NGX_OK; |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_reinit_request(ngx_http_request_t *r) |
| { |
| ngx_http_status_t *status; |
| |
| status = ngx_http_get_module_ctx(r, ngx_http_uwsgi_module); |
| |
| if (status == NULL) { |
| return NGX_OK; |
| } |
| |
| status->code = 0; |
| status->count = 0; |
| status->start = NULL; |
| status->end = NULL; |
| |
| r->upstream->process_header = ngx_http_uwsgi_process_status_line; |
| r->state = 0; |
| |
| return NGX_OK; |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_process_status_line(ngx_http_request_t *r) |
| { |
| size_t len; |
| ngx_int_t rc; |
| ngx_http_status_t *status; |
| ngx_http_upstream_t *u; |
| |
| status = ngx_http_get_module_ctx(r, ngx_http_uwsgi_module); |
| |
| if (status == NULL) { |
| return NGX_ERROR; |
| } |
| |
| u = r->upstream; |
| |
| rc = ngx_http_parse_status_line(r, &u->buffer, status); |
| |
| if (rc == NGX_AGAIN) { |
| return rc; |
| } |
| |
| if (rc == NGX_ERROR) { |
| u->process_header = ngx_http_uwsgi_process_header; |
| return ngx_http_uwsgi_process_header(r); |
| } |
| |
| if (u->state && u->state->status == 0) { |
| u->state->status = status->code; |
| } |
| |
| u->headers_in.status_n = status->code; |
| |
| len = status->end - status->start; |
| u->headers_in.status_line.len = len; |
| |
| u->headers_in.status_line.data = ngx_pnalloc(r->pool, len); |
| if (u->headers_in.status_line.data == NULL) { |
| return NGX_ERROR; |
| } |
| |
| ngx_memcpy(u->headers_in.status_line.data, status->start, len); |
| |
| ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "http uwsgi status %ui \"%V\"", |
| u->headers_in.status_n, &u->headers_in.status_line); |
| |
| u->process_header = ngx_http_uwsgi_process_header; |
| |
| return ngx_http_uwsgi_process_header(r); |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_process_header(ngx_http_request_t *r) |
| { |
| ngx_str_t *status_line; |
| ngx_int_t rc, status; |
| ngx_table_elt_t *h; |
| ngx_http_upstream_t *u; |
| ngx_http_upstream_header_t *hh; |
| ngx_http_upstream_main_conf_t *umcf; |
| |
| umcf = ngx_http_get_module_main_conf(r, ngx_http_upstream_module); |
| |
| for ( ;; ) { |
| |
| rc = ngx_http_parse_header_line(r, &r->upstream->buffer, 1); |
| |
| if (rc == NGX_OK) { |
| |
| /* a header line has been parsed successfully */ |
| |
| h = ngx_list_push(&r->upstream->headers_in.headers); |
| if (h == NULL) { |
| return NGX_ERROR; |
| } |
| |
| h->hash = r->header_hash; |
| |
| h->key.len = r->header_name_end - r->header_name_start; |
| h->value.len = r->header_end - r->header_start; |
| |
| h->key.data = ngx_pnalloc(r->pool, |
| h->key.len + 1 + h->value.len + 1 |
| + h->key.len); |
| if (h->key.data == NULL) { |
| h->hash = 0; |
| return NGX_ERROR; |
| } |
| |
| h->value.data = h->key.data + h->key.len + 1; |
| h->lowcase_key = h->key.data + h->key.len + 1 + h->value.len + 1; |
| |
| ngx_memcpy(h->key.data, r->header_name_start, h->key.len); |
| h->key.data[h->key.len] = '\0'; |
| ngx_memcpy(h->value.data, r->header_start, h->value.len); |
| h->value.data[h->value.len] = '\0'; |
| |
| if (h->key.len == r->lowcase_index) { |
| ngx_memcpy(h->lowcase_key, r->lowcase_header, h->key.len); |
| |
| } else { |
| ngx_strlow(h->lowcase_key, h->key.data, h->key.len); |
| } |
| |
| hh = ngx_hash_find(&umcf->headers_in_hash, h->hash, |
| h->lowcase_key, h->key.len); |
| |
| if (hh && hh->handler(r, h, hh->offset) != NGX_OK) { |
| return NGX_ERROR; |
| } |
| |
| ngx_log_debug2(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "http uwsgi header: \"%V: %V\"", &h->key, &h->value); |
| |
| continue; |
| } |
| |
| if (rc == NGX_HTTP_PARSE_HEADER_DONE) { |
| |
| /* a whole header has been parsed successfully */ |
| |
| ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "http uwsgi header done"); |
| |
| u = r->upstream; |
| |
| if (u->headers_in.status_n) { |
| goto done; |
| } |
| |
| if (u->headers_in.status) { |
| status_line = &u->headers_in.status->value; |
| |
| status = ngx_atoi(status_line->data, 3); |
| if (status == NGX_ERROR) { |
| ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, |
| "upstream sent invalid status \"%V\"", |
| status_line); |
| return NGX_HTTP_UPSTREAM_INVALID_HEADER; |
| } |
| |
| u->headers_in.status_n = status; |
| u->headers_in.status_line = *status_line; |
| |
| } else if (u->headers_in.location) { |
| u->headers_in.status_n = 302; |
| ngx_str_set(&u->headers_in.status_line, |
| "302 Moved Temporarily"); |
| |
| } else { |
| u->headers_in.status_n = 200; |
| ngx_str_set(&u->headers_in.status_line, "200 OK"); |
| } |
| |
| if (u->state && u->state->status == 0) { |
| u->state->status = u->headers_in.status_n; |
| } |
| |
| done: |
| |
| if (u->headers_in.status_n == NGX_HTTP_SWITCHING_PROTOCOLS |
| && r->headers_in.upgrade) |
| { |
| u->upgrade = 1; |
| } |
| |
| return NGX_OK; |
| } |
| |
| if (rc == NGX_AGAIN) { |
| return NGX_AGAIN; |
| } |
| |
| /* there was error while a header line parsing */ |
| |
| ngx_log_error(NGX_LOG_ERR, r->connection->log, 0, |
| "upstream sent invalid header"); |
| |
| return NGX_HTTP_UPSTREAM_INVALID_HEADER; |
| } |
| } |
| |
| |
| static void |
| ngx_http_uwsgi_abort_request(ngx_http_request_t *r) |
| { |
| ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "abort http uwsgi request"); |
| |
| return; |
| } |
| |
| |
| static void |
| ngx_http_uwsgi_finalize_request(ngx_http_request_t *r, ngx_int_t rc) |
| { |
| ngx_log_debug0(NGX_LOG_DEBUG_HTTP, r->connection->log, 0, |
| "finalize http uwsgi request"); |
| |
| return; |
| } |
| |
| |
| static void * |
| ngx_http_uwsgi_create_main_conf(ngx_conf_t *cf) |
| { |
| ngx_http_uwsgi_main_conf_t *conf; |
| |
| conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_uwsgi_main_conf_t)); |
| if (conf == NULL) { |
| return NULL; |
| } |
| |
| #if (NGX_HTTP_CACHE) |
| if (ngx_array_init(&conf->caches, cf->pool, 4, |
| sizeof(ngx_http_file_cache_t *)) |
| != NGX_OK) |
| { |
| return NULL; |
| } |
| #endif |
| |
| return conf; |
| } |
| |
| |
| static void * |
| ngx_http_uwsgi_create_loc_conf(ngx_conf_t *cf) |
| { |
| ngx_http_uwsgi_loc_conf_t *conf; |
| |
| conf = ngx_pcalloc(cf->pool, sizeof(ngx_http_uwsgi_loc_conf_t)); |
| if (conf == NULL) { |
| return NULL; |
| } |
| |
| conf->modifier1 = NGX_CONF_UNSET_UINT; |
| conf->modifier2 = NGX_CONF_UNSET_UINT; |
| |
| conf->upstream.store = NGX_CONF_UNSET; |
| conf->upstream.store_access = NGX_CONF_UNSET_UINT; |
| conf->upstream.next_upstream_tries = NGX_CONF_UNSET_UINT; |
| conf->upstream.buffering = NGX_CONF_UNSET; |
| conf->upstream.request_buffering = NGX_CONF_UNSET; |
| conf->upstream.ignore_client_abort = NGX_CONF_UNSET; |
| conf->upstream.force_ranges = NGX_CONF_UNSET; |
| |
| conf->upstream.local = NGX_CONF_UNSET_PTR; |
| conf->upstream.socket_keepalive = NGX_CONF_UNSET; |
| |
| conf->upstream.connect_timeout = NGX_CONF_UNSET_MSEC; |
| conf->upstream.send_timeout = NGX_CONF_UNSET_MSEC; |
| conf->upstream.read_timeout = NGX_CONF_UNSET_MSEC; |
| conf->upstream.next_upstream_timeout = NGX_CONF_UNSET_MSEC; |
| |
| conf->upstream.send_lowat = NGX_CONF_UNSET_SIZE; |
| conf->upstream.buffer_size = NGX_CONF_UNSET_SIZE; |
| conf->upstream.limit_rate = NGX_CONF_UNSET_SIZE; |
| |
| conf->upstream.busy_buffers_size_conf = NGX_CONF_UNSET_SIZE; |
| conf->upstream.max_temp_file_size_conf = NGX_CONF_UNSET_SIZE; |
| conf->upstream.temp_file_write_size_conf = NGX_CONF_UNSET_SIZE; |
| |
| conf->upstream.pass_request_headers = NGX_CONF_UNSET; |
| conf->upstream.pass_request_body = NGX_CONF_UNSET; |
| |
| #if (NGX_HTTP_CACHE) |
| conf->upstream.cache = NGX_CONF_UNSET; |
| conf->upstream.cache_min_uses = NGX_CONF_UNSET_UINT; |
| conf->upstream.cache_max_range_offset = NGX_CONF_UNSET; |
| conf->upstream.cache_bypass = NGX_CONF_UNSET_PTR; |
| conf->upstream.no_cache = NGX_CONF_UNSET_PTR; |
| conf->upstream.cache_valid = NGX_CONF_UNSET_PTR; |
| conf->upstream.cache_lock = NGX_CONF_UNSET; |
| conf->upstream.cache_lock_timeout = NGX_CONF_UNSET_MSEC; |
| conf->upstream.cache_lock_age = NGX_CONF_UNSET_MSEC; |
| conf->upstream.cache_revalidate = NGX_CONF_UNSET; |
| conf->upstream.cache_background_update = NGX_CONF_UNSET; |
| #endif |
| |
| conf->upstream.hide_headers = NGX_CONF_UNSET_PTR; |
| conf->upstream.pass_headers = NGX_CONF_UNSET_PTR; |
| |
| conf->upstream.intercept_errors = NGX_CONF_UNSET; |
| |
| #if (NGX_HTTP_SSL) |
| conf->upstream.ssl_session_reuse = NGX_CONF_UNSET; |
| conf->upstream.ssl_server_name = NGX_CONF_UNSET; |
| conf->upstream.ssl_verify = NGX_CONF_UNSET; |
| conf->ssl_verify_depth = NGX_CONF_UNSET_UINT; |
| conf->ssl_passwords = NGX_CONF_UNSET_PTR; |
| #endif |
| |
| /* "uwsgi_cyclic_temp_file" is disabled */ |
| conf->upstream.cyclic_temp_file = 0; |
| |
| conf->upstream.change_buffering = 1; |
| |
| ngx_str_set(&conf->upstream.module, "uwsgi"); |
| |
| return conf; |
| } |
| |
| |
| static char * |
| ngx_http_uwsgi_merge_loc_conf(ngx_conf_t *cf, void *parent, void *child) |
| { |
| ngx_http_uwsgi_loc_conf_t *prev = parent; |
| ngx_http_uwsgi_loc_conf_t *conf = child; |
| |
| size_t size; |
| ngx_int_t rc; |
| ngx_hash_init_t hash; |
| ngx_http_core_loc_conf_t *clcf; |
| |
| #if (NGX_HTTP_CACHE) |
| |
| if (conf->upstream.store > 0) { |
| conf->upstream.cache = 0; |
| } |
| |
| if (conf->upstream.cache > 0) { |
| conf->upstream.store = 0; |
| } |
| |
| #endif |
| |
| if (conf->upstream.store == NGX_CONF_UNSET) { |
| ngx_conf_merge_value(conf->upstream.store, prev->upstream.store, 0); |
| |
| conf->upstream.store_lengths = prev->upstream.store_lengths; |
| conf->upstream.store_values = prev->upstream.store_values; |
| } |
| |
| ngx_conf_merge_uint_value(conf->upstream.store_access, |
| prev->upstream.store_access, 0600); |
| |
| ngx_conf_merge_uint_value(conf->upstream.next_upstream_tries, |
| prev->upstream.next_upstream_tries, 0); |
| |
| ngx_conf_merge_value(conf->upstream.buffering, |
| prev->upstream.buffering, 1); |
| |
| ngx_conf_merge_value(conf->upstream.request_buffering, |
| prev->upstream.request_buffering, 1); |
| |
| ngx_conf_merge_value(conf->upstream.ignore_client_abort, |
| prev->upstream.ignore_client_abort, 0); |
| |
| ngx_conf_merge_value(conf->upstream.force_ranges, |
| prev->upstream.force_ranges, 0); |
| |
| ngx_conf_merge_ptr_value(conf->upstream.local, |
| prev->upstream.local, NULL); |
| |
| ngx_conf_merge_value(conf->upstream.socket_keepalive, |
| prev->upstream.socket_keepalive, 0); |
| |
| ngx_conf_merge_msec_value(conf->upstream.connect_timeout, |
| prev->upstream.connect_timeout, 60000); |
| |
| ngx_conf_merge_msec_value(conf->upstream.send_timeout, |
| prev->upstream.send_timeout, 60000); |
| |
| ngx_conf_merge_msec_value(conf->upstream.read_timeout, |
| prev->upstream.read_timeout, 60000); |
| |
| ngx_conf_merge_msec_value(conf->upstream.next_upstream_timeout, |
| prev->upstream.next_upstream_timeout, 0); |
| |
| ngx_conf_merge_size_value(conf->upstream.send_lowat, |
| prev->upstream.send_lowat, 0); |
| |
| ngx_conf_merge_size_value(conf->upstream.buffer_size, |
| prev->upstream.buffer_size, |
| (size_t) ngx_pagesize); |
| |
| ngx_conf_merge_size_value(conf->upstream.limit_rate, |
| prev->upstream.limit_rate, 0); |
| |
| |
| ngx_conf_merge_bufs_value(conf->upstream.bufs, prev->upstream.bufs, |
| 8, ngx_pagesize); |
| |
| if (conf->upstream.bufs.num < 2) { |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "there must be at least 2 \"uwsgi_buffers\""); |
| return NGX_CONF_ERROR; |
| } |
| |
| |
| size = conf->upstream.buffer_size; |
| if (size < conf->upstream.bufs.size) { |
| size = conf->upstream.bufs.size; |
| } |
| |
| |
| ngx_conf_merge_size_value(conf->upstream.busy_buffers_size_conf, |
| prev->upstream.busy_buffers_size_conf, |
| NGX_CONF_UNSET_SIZE); |
| |
| if (conf->upstream.busy_buffers_size_conf == NGX_CONF_UNSET_SIZE) { |
| conf->upstream.busy_buffers_size = 2 * size; |
| } else { |
| conf->upstream.busy_buffers_size = |
| conf->upstream.busy_buffers_size_conf; |
| } |
| |
| if (conf->upstream.busy_buffers_size < size) { |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "\"uwsgi_busy_buffers_size\" must be equal to or greater " |
| "than the maximum of the value of \"uwsgi_buffer_size\" and " |
| "one of the \"uwsgi_buffers\""); |
| |
| return NGX_CONF_ERROR; |
| } |
| |
| if (conf->upstream.busy_buffers_size |
| > (conf->upstream.bufs.num - 1) * conf->upstream.bufs.size) |
| { |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "\"uwsgi_busy_buffers_size\" must be less than " |
| "the size of all \"uwsgi_buffers\" minus one buffer"); |
| |
| return NGX_CONF_ERROR; |
| } |
| |
| |
| ngx_conf_merge_size_value(conf->upstream.temp_file_write_size_conf, |
| prev->upstream.temp_file_write_size_conf, |
| NGX_CONF_UNSET_SIZE); |
| |
| if (conf->upstream.temp_file_write_size_conf == NGX_CONF_UNSET_SIZE) { |
| conf->upstream.temp_file_write_size = 2 * size; |
| } else { |
| conf->upstream.temp_file_write_size = |
| conf->upstream.temp_file_write_size_conf; |
| } |
| |
| if (conf->upstream.temp_file_write_size < size) { |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "\"uwsgi_temp_file_write_size\" must be equal to or greater than " |
| "the maximum of the value of \"uwsgi_buffer_size\" and " |
| "one of the \"uwsgi_buffers\""); |
| |
| return NGX_CONF_ERROR; |
| } |
| |
| |
| ngx_conf_merge_size_value(conf->upstream.max_temp_file_size_conf, |
| prev->upstream.max_temp_file_size_conf, |
| NGX_CONF_UNSET_SIZE); |
| |
| if (conf->upstream.max_temp_file_size_conf == NGX_CONF_UNSET_SIZE) { |
| conf->upstream.max_temp_file_size = 1024 * 1024 * 1024; |
| } else { |
| conf->upstream.max_temp_file_size = |
| conf->upstream.max_temp_file_size_conf; |
| } |
| |
| if (conf->upstream.max_temp_file_size != 0 |
| && conf->upstream.max_temp_file_size < size) |
| { |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "\"uwsgi_max_temp_file_size\" must be equal to zero to disable " |
| "temporary files usage or must be equal to or greater than " |
| "the maximum of the value of \"uwsgi_buffer_size\" and " |
| "one of the \"uwsgi_buffers\""); |
| |
| return NGX_CONF_ERROR; |
| } |
| |
| |
| ngx_conf_merge_bitmask_value(conf->upstream.ignore_headers, |
| prev->upstream.ignore_headers, |
| NGX_CONF_BITMASK_SET); |
| |
| |
| ngx_conf_merge_bitmask_value(conf->upstream.next_upstream, |
| prev->upstream.next_upstream, |
| (NGX_CONF_BITMASK_SET |
| |NGX_HTTP_UPSTREAM_FT_ERROR |
| |NGX_HTTP_UPSTREAM_FT_TIMEOUT)); |
| |
| if (conf->upstream.next_upstream & NGX_HTTP_UPSTREAM_FT_OFF) { |
| conf->upstream.next_upstream = NGX_CONF_BITMASK_SET |
| |NGX_HTTP_UPSTREAM_FT_OFF; |
| } |
| |
| if (ngx_conf_merge_path_value(cf, &conf->upstream.temp_path, |
| prev->upstream.temp_path, |
| &ngx_http_uwsgi_temp_path) |
| != NGX_OK) |
| { |
| return NGX_CONF_ERROR; |
| } |
| |
| #if (NGX_HTTP_CACHE) |
| |
| if (conf->upstream.cache == NGX_CONF_UNSET) { |
| ngx_conf_merge_value(conf->upstream.cache, |
| prev->upstream.cache, 0); |
| |
| conf->upstream.cache_zone = prev->upstream.cache_zone; |
| conf->upstream.cache_value = prev->upstream.cache_value; |
| } |
| |
| if (conf->upstream.cache_zone && conf->upstream.cache_zone->data == NULL) { |
| ngx_shm_zone_t *shm_zone; |
| |
| shm_zone = conf->upstream.cache_zone; |
| |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "\"uwsgi_cache\" zone \"%V\" is unknown", |
| &shm_zone->shm.name); |
| |
| return NGX_CONF_ERROR; |
| } |
| |
| ngx_conf_merge_uint_value(conf->upstream.cache_min_uses, |
| prev->upstream.cache_min_uses, 1); |
| |
| ngx_conf_merge_off_value(conf->upstream.cache_max_range_offset, |
| prev->upstream.cache_max_range_offset, |
| NGX_MAX_OFF_T_VALUE); |
| |
| ngx_conf_merge_bitmask_value(conf->upstream.cache_use_stale, |
| prev->upstream.cache_use_stale, |
| (NGX_CONF_BITMASK_SET |
| |NGX_HTTP_UPSTREAM_FT_OFF)); |
| |
| if (conf->upstream.cache_use_stale & NGX_HTTP_UPSTREAM_FT_OFF) { |
| conf->upstream.cache_use_stale = NGX_CONF_BITMASK_SET |
| |NGX_HTTP_UPSTREAM_FT_OFF; |
| } |
| |
| if (conf->upstream.cache_use_stale & NGX_HTTP_UPSTREAM_FT_ERROR) { |
| conf->upstream.cache_use_stale |= NGX_HTTP_UPSTREAM_FT_NOLIVE; |
| } |
| |
| if (conf->upstream.cache_methods == 0) { |
| conf->upstream.cache_methods = prev->upstream.cache_methods; |
| } |
| |
| conf->upstream.cache_methods |= NGX_HTTP_GET|NGX_HTTP_HEAD; |
| |
| ngx_conf_merge_ptr_value(conf->upstream.cache_bypass, |
| prev->upstream.cache_bypass, NULL); |
| |
| ngx_conf_merge_ptr_value(conf->upstream.no_cache, |
| prev->upstream.no_cache, NULL); |
| |
| ngx_conf_merge_ptr_value(conf->upstream.cache_valid, |
| prev->upstream.cache_valid, NULL); |
| |
| if (conf->cache_key.value.data == NULL) { |
| conf->cache_key = prev->cache_key; |
| } |
| |
| if (conf->upstream.cache && conf->cache_key.value.data == NULL) { |
| ngx_conf_log_error(NGX_LOG_WARN, cf, 0, |
| "no \"uwsgi_cache_key\" for \"uwsgi_cache\""); |
| } |
| |
| ngx_conf_merge_value(conf->upstream.cache_lock, |
| prev->upstream.cache_lock, 0); |
| |
| ngx_conf_merge_msec_value(conf->upstream.cache_lock_timeout, |
| prev->upstream.cache_lock_timeout, 5000); |
| |
| ngx_conf_merge_msec_value(conf->upstream.cache_lock_age, |
| prev->upstream.cache_lock_age, 5000); |
| |
| ngx_conf_merge_value(conf->upstream.cache_revalidate, |
| prev->upstream.cache_revalidate, 0); |
| |
| ngx_conf_merge_value(conf->upstream.cache_background_update, |
| prev->upstream.cache_background_update, 0); |
| |
| #endif |
| |
| ngx_conf_merge_value(conf->upstream.pass_request_headers, |
| prev->upstream.pass_request_headers, 1); |
| ngx_conf_merge_value(conf->upstream.pass_request_body, |
| prev->upstream.pass_request_body, 1); |
| |
| ngx_conf_merge_value(conf->upstream.intercept_errors, |
| prev->upstream.intercept_errors, 0); |
| |
| #if (NGX_HTTP_SSL) |
| |
| ngx_conf_merge_value(conf->upstream.ssl_session_reuse, |
| prev->upstream.ssl_session_reuse, 1); |
| |
| ngx_conf_merge_bitmask_value(conf->ssl_protocols, prev->ssl_protocols, |
| (NGX_CONF_BITMASK_SET|NGX_SSL_TLSv1 |
| |NGX_SSL_TLSv1_1|NGX_SSL_TLSv1_2)); |
| |
| ngx_conf_merge_str_value(conf->ssl_ciphers, prev->ssl_ciphers, |
| "DEFAULT"); |
| |
| if (conf->upstream.ssl_name == NULL) { |
| conf->upstream.ssl_name = prev->upstream.ssl_name; |
| } |
| |
| ngx_conf_merge_value(conf->upstream.ssl_server_name, |
| prev->upstream.ssl_server_name, 0); |
| ngx_conf_merge_value(conf->upstream.ssl_verify, |
| prev->upstream.ssl_verify, 0); |
| ngx_conf_merge_uint_value(conf->ssl_verify_depth, |
| prev->ssl_verify_depth, 1); |
| ngx_conf_merge_str_value(conf->ssl_trusted_certificate, |
| prev->ssl_trusted_certificate, ""); |
| ngx_conf_merge_str_value(conf->ssl_crl, prev->ssl_crl, ""); |
| |
| ngx_conf_merge_str_value(conf->ssl_certificate, |
| prev->ssl_certificate, ""); |
| ngx_conf_merge_str_value(conf->ssl_certificate_key, |
| prev->ssl_certificate_key, ""); |
| ngx_conf_merge_ptr_value(conf->ssl_passwords, prev->ssl_passwords, NULL); |
| |
| if (conf->ssl && ngx_http_uwsgi_set_ssl(cf, conf) != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| #endif |
| |
| ngx_conf_merge_str_value(conf->uwsgi_string, prev->uwsgi_string, ""); |
| |
| hash.max_size = 512; |
| hash.bucket_size = ngx_align(64, ngx_cacheline_size); |
| hash.name = "uwsgi_hide_headers_hash"; |
| |
| if (ngx_http_upstream_hide_headers_hash(cf, &conf->upstream, |
| &prev->upstream, ngx_http_uwsgi_hide_headers, &hash) |
| != NGX_OK) |
| { |
| return NGX_CONF_ERROR; |
| } |
| |
| clcf = ngx_http_conf_get_module_loc_conf(cf, ngx_http_core_module); |
| |
| if (clcf->noname |
| && conf->upstream.upstream == NULL && conf->uwsgi_lengths == NULL) |
| { |
| conf->upstream.upstream = prev->upstream.upstream; |
| |
| conf->uwsgi_lengths = prev->uwsgi_lengths; |
| conf->uwsgi_values = prev->uwsgi_values; |
| |
| #if (NGX_HTTP_SSL) |
| conf->upstream.ssl = prev->upstream.ssl; |
| #endif |
| } |
| |
| if (clcf->lmt_excpt && clcf->handler == NULL |
| && (conf->upstream.upstream || conf->uwsgi_lengths)) |
| { |
| clcf->handler = ngx_http_uwsgi_handler; |
| } |
| |
| ngx_conf_merge_uint_value(conf->modifier1, prev->modifier1, 0); |
| ngx_conf_merge_uint_value(conf->modifier2, prev->modifier2, 0); |
| |
| if (conf->params_source == NULL) { |
| conf->params = prev->params; |
| #if (NGX_HTTP_CACHE) |
| conf->params_cache = prev->params_cache; |
| #endif |
| conf->params_source = prev->params_source; |
| } |
| |
| rc = ngx_http_uwsgi_init_params(cf, conf, &conf->params, NULL); |
| if (rc != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| #if (NGX_HTTP_CACHE) |
| |
| if (conf->upstream.cache) { |
| rc = ngx_http_uwsgi_init_params(cf, conf, &conf->params_cache, |
| ngx_http_uwsgi_cache_headers); |
| if (rc != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| } |
| |
| #endif |
| |
| /* |
| * special handling to preserve conf->params in the "http" section |
| * to inherit it to all servers |
| */ |
| |
| if (prev->params.hash.buckets == NULL |
| && conf->params_source == prev->params_source) |
| { |
| prev->params = conf->params; |
| #if (NGX_HTTP_CACHE) |
| prev->params_cache = conf->params_cache; |
| #endif |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_init_params(ngx_conf_t *cf, ngx_http_uwsgi_loc_conf_t *conf, |
| ngx_http_uwsgi_params_t *params, ngx_keyval_t *default_params) |
| { |
| u_char *p; |
| size_t size; |
| uintptr_t *code; |
| ngx_uint_t i, nsrc; |
| ngx_array_t headers_names, params_merged; |
| ngx_keyval_t *h; |
| ngx_hash_key_t *hk; |
| ngx_hash_init_t hash; |
| ngx_http_upstream_param_t *src, *s; |
| ngx_http_script_compile_t sc; |
| ngx_http_script_copy_code_t *copy; |
| |
| if (params->hash.buckets) { |
| return NGX_OK; |
| } |
| |
| if (conf->params_source == NULL && default_params == NULL) { |
| params->hash.buckets = (void *) 1; |
| return NGX_OK; |
| } |
| |
| params->lengths = ngx_array_create(cf->pool, 64, 1); |
| if (params->lengths == NULL) { |
| return NGX_ERROR; |
| } |
| |
| params->values = ngx_array_create(cf->pool, 512, 1); |
| if (params->values == NULL) { |
| return NGX_ERROR; |
| } |
| |
| if (ngx_array_init(&headers_names, cf->temp_pool, 4, sizeof(ngx_hash_key_t)) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| if (conf->params_source) { |
| src = conf->params_source->elts; |
| nsrc = conf->params_source->nelts; |
| |
| } else { |
| src = NULL; |
| nsrc = 0; |
| } |
| |
| if (default_params) { |
| if (ngx_array_init(¶ms_merged, cf->temp_pool, 4, |
| sizeof(ngx_http_upstream_param_t)) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| for (i = 0; i < nsrc; i++) { |
| |
| s = ngx_array_push(¶ms_merged); |
| if (s == NULL) { |
| return NGX_ERROR; |
| } |
| |
| *s = src[i]; |
| } |
| |
| h = default_params; |
| |
| while (h->key.len) { |
| |
| src = params_merged.elts; |
| nsrc = params_merged.nelts; |
| |
| for (i = 0; i < nsrc; i++) { |
| if (ngx_strcasecmp(h->key.data, src[i].key.data) == 0) { |
| goto next; |
| } |
| } |
| |
| s = ngx_array_push(¶ms_merged); |
| if (s == NULL) { |
| return NGX_ERROR; |
| } |
| |
| s->key = h->key; |
| s->value = h->value; |
| s->skip_empty = 1; |
| |
| next: |
| |
| h++; |
| } |
| |
| src = params_merged.elts; |
| nsrc = params_merged.nelts; |
| } |
| |
| for (i = 0; i < nsrc; i++) { |
| |
| if (src[i].key.len > sizeof("HTTP_") - 1 |
| && ngx_strncmp(src[i].key.data, "HTTP_", sizeof("HTTP_") - 1) == 0) |
| { |
| hk = ngx_array_push(&headers_names); |
| if (hk == NULL) { |
| return NGX_ERROR; |
| } |
| |
| hk->key.len = src[i].key.len - 5; |
| hk->key.data = src[i].key.data + 5; |
| hk->key_hash = ngx_hash_key_lc(hk->key.data, hk->key.len); |
| hk->value = (void *) 1; |
| |
| if (src[i].value.len == 0) { |
| continue; |
| } |
| } |
| |
| copy = ngx_array_push_n(params->lengths, |
| sizeof(ngx_http_script_copy_code_t)); |
| if (copy == NULL) { |
| return NGX_ERROR; |
| } |
| |
| copy->code = (ngx_http_script_code_pt) (void *) |
| ngx_http_script_copy_len_code; |
| copy->len = src[i].key.len; |
| |
| copy = ngx_array_push_n(params->lengths, |
| sizeof(ngx_http_script_copy_code_t)); |
| if (copy == NULL) { |
| return NGX_ERROR; |
| } |
| |
| copy->code = (ngx_http_script_code_pt) (void *) |
| ngx_http_script_copy_len_code; |
| copy->len = src[i].skip_empty; |
| |
| |
| size = (sizeof(ngx_http_script_copy_code_t) |
| + src[i].key.len + sizeof(uintptr_t) - 1) |
| & ~(sizeof(uintptr_t) - 1); |
| |
| copy = ngx_array_push_n(params->values, size); |
| if (copy == NULL) { |
| return NGX_ERROR; |
| } |
| |
| copy->code = ngx_http_script_copy_code; |
| copy->len = src[i].key.len; |
| |
| p = (u_char *) copy + sizeof(ngx_http_script_copy_code_t); |
| ngx_memcpy(p, src[i].key.data, src[i].key.len); |
| |
| |
| ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); |
| |
| sc.cf = cf; |
| sc.source = &src[i].value; |
| sc.flushes = ¶ms->flushes; |
| sc.lengths = ¶ms->lengths; |
| sc.values = ¶ms->values; |
| |
| if (ngx_http_script_compile(&sc) != NGX_OK) { |
| return NGX_ERROR; |
| } |
| |
| code = ngx_array_push_n(params->lengths, sizeof(uintptr_t)); |
| if (code == NULL) { |
| return NGX_ERROR; |
| } |
| |
| *code = (uintptr_t) NULL; |
| |
| |
| code = ngx_array_push_n(params->values, sizeof(uintptr_t)); |
| if (code == NULL) { |
| return NGX_ERROR; |
| } |
| |
| *code = (uintptr_t) NULL; |
| } |
| |
| code = ngx_array_push_n(params->lengths, sizeof(uintptr_t)); |
| if (code == NULL) { |
| return NGX_ERROR; |
| } |
| |
| *code = (uintptr_t) NULL; |
| |
| params->number = headers_names.nelts; |
| |
| hash.hash = ¶ms->hash; |
| hash.key = ngx_hash_key_lc; |
| hash.max_size = 512; |
| hash.bucket_size = 64; |
| hash.name = "uwsgi_params_hash"; |
| hash.pool = cf->pool; |
| hash.temp_pool = NULL; |
| |
| return ngx_hash_init(&hash, headers_names.elts, headers_names.nelts); |
| } |
| |
| |
| static char * |
| ngx_http_uwsgi_pass(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) |
| { |
| ngx_http_uwsgi_loc_conf_t *uwcf = conf; |
| |
| size_t add; |
| ngx_url_t u; |
| ngx_str_t *value, *url; |
| ngx_uint_t n; |
| ngx_http_core_loc_conf_t *clcf; |
| ngx_http_script_compile_t sc; |
| |
| if (uwcf->upstream.upstream || uwcf->uwsgi_lengths) { |
| return "is duplicate"; |
| } |
| |
| clcf = ngx_http_conf_get_module_loc_conf(cf, ngx_http_core_module); |
| clcf->handler = ngx_http_uwsgi_handler; |
| |
| value = cf->args->elts; |
| |
| url = &value[1]; |
| |
| n = ngx_http_script_variables_count(url); |
| |
| if (n) { |
| |
| ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); |
| |
| sc.cf = cf; |
| sc.source = url; |
| sc.lengths = &uwcf->uwsgi_lengths; |
| sc.values = &uwcf->uwsgi_values; |
| sc.variables = n; |
| sc.complete_lengths = 1; |
| sc.complete_values = 1; |
| |
| if (ngx_http_script_compile(&sc) != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| #if (NGX_HTTP_SSL) |
| uwcf->ssl = 1; |
| #endif |
| |
| return NGX_CONF_OK; |
| } |
| |
| if (ngx_strncasecmp(url->data, (u_char *) "uwsgi://", 8) == 0) { |
| add = 8; |
| |
| } else if (ngx_strncasecmp(url->data, (u_char *) "suwsgi://", 9) == 0) { |
| |
| #if (NGX_HTTP_SSL) |
| add = 9; |
| uwcf->ssl = 1; |
| #else |
| ngx_conf_log_error(NGX_LOG_EMERG, cf, 0, |
| "suwsgi protocol requires SSL support"); |
| return NGX_CONF_ERROR; |
| #endif |
| |
| } else { |
| add = 0; |
| } |
| |
| ngx_memzero(&u, sizeof(ngx_url_t)); |
| |
| u.url.len = url->len - add; |
| u.url.data = url->data + add; |
| u.no_resolve = 1; |
| |
| uwcf->upstream.upstream = ngx_http_upstream_add(cf, &u, 0); |
| if (uwcf->upstream.upstream == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| if (clcf->name.len && clcf->name.data[clcf->name.len - 1] == '/') { |
| clcf->auto_redirect = 1; |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| |
| static char * |
| ngx_http_uwsgi_store(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) |
| { |
| ngx_http_uwsgi_loc_conf_t *uwcf = conf; |
| |
| ngx_str_t *value; |
| ngx_http_script_compile_t sc; |
| |
| if (uwcf->upstream.store != NGX_CONF_UNSET) { |
| return "is duplicate"; |
| } |
| |
| value = cf->args->elts; |
| |
| if (ngx_strcmp(value[1].data, "off") == 0) { |
| uwcf->upstream.store = 0; |
| return NGX_CONF_OK; |
| } |
| |
| #if (NGX_HTTP_CACHE) |
| |
| if (uwcf->upstream.cache > 0) { |
| return "is incompatible with \"uwsgi_cache\""; |
| } |
| |
| #endif |
| |
| uwcf->upstream.store = 1; |
| |
| if (ngx_strcmp(value[1].data, "on") == 0) { |
| return NGX_CONF_OK; |
| } |
| |
| /* include the terminating '\0' into script */ |
| value[1].len++; |
| |
| ngx_memzero(&sc, sizeof(ngx_http_script_compile_t)); |
| |
| sc.cf = cf; |
| sc.source = &value[1]; |
| sc.lengths = &uwcf->upstream.store_lengths; |
| sc.values = &uwcf->upstream.store_values; |
| sc.variables = ngx_http_script_variables_count(&value[1]); |
| sc.complete_lengths = 1; |
| sc.complete_values = 1; |
| |
| if (ngx_http_script_compile(&sc) != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| |
| #if (NGX_HTTP_CACHE) |
| |
| static char * |
| ngx_http_uwsgi_cache(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) |
| { |
| ngx_http_uwsgi_loc_conf_t *uwcf = conf; |
| |
| ngx_str_t *value; |
| ngx_http_complex_value_t cv; |
| ngx_http_compile_complex_value_t ccv; |
| |
| value = cf->args->elts; |
| |
| if (uwcf->upstream.cache != NGX_CONF_UNSET) { |
| return "is duplicate"; |
| } |
| |
| if (ngx_strcmp(value[1].data, "off") == 0) { |
| uwcf->upstream.cache = 0; |
| return NGX_CONF_OK; |
| } |
| |
| if (uwcf->upstream.store > 0) { |
| return "is incompatible with \"uwsgi_store\""; |
| } |
| |
| uwcf->upstream.cache = 1; |
| |
| ngx_memzero(&ccv, sizeof(ngx_http_compile_complex_value_t)); |
| |
| ccv.cf = cf; |
| ccv.value = &value[1]; |
| ccv.complex_value = &cv; |
| |
| if (ngx_http_compile_complex_value(&ccv) != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| if (cv.lengths != NULL) { |
| |
| uwcf->upstream.cache_value = ngx_palloc(cf->pool, |
| sizeof(ngx_http_complex_value_t)); |
| if (uwcf->upstream.cache_value == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| *uwcf->upstream.cache_value = cv; |
| |
| return NGX_CONF_OK; |
| } |
| |
| uwcf->upstream.cache_zone = ngx_shared_memory_add(cf, &value[1], 0, |
| &ngx_http_uwsgi_module); |
| if (uwcf->upstream.cache_zone == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| |
| static char * |
| ngx_http_uwsgi_cache_key(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) |
| { |
| ngx_http_uwsgi_loc_conf_t *uwcf = conf; |
| |
| ngx_str_t *value; |
| ngx_http_compile_complex_value_t ccv; |
| |
| value = cf->args->elts; |
| |
| if (uwcf->cache_key.value.data) { |
| return "is duplicate"; |
| } |
| |
| ngx_memzero(&ccv, sizeof(ngx_http_compile_complex_value_t)); |
| |
| ccv.cf = cf; |
| ccv.value = &value[1]; |
| ccv.complex_value = &uwcf->cache_key; |
| |
| if (ngx_http_compile_complex_value(&ccv) != NGX_OK) { |
| return NGX_CONF_ERROR; |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| #endif |
| |
| |
| #if (NGX_HTTP_SSL) |
| |
| static char * |
| ngx_http_uwsgi_ssl_password_file(ngx_conf_t *cf, ngx_command_t *cmd, void *conf) |
| { |
| ngx_http_uwsgi_loc_conf_t *uwcf = conf; |
| |
| ngx_str_t *value; |
| |
| if (uwcf->ssl_passwords != NGX_CONF_UNSET_PTR) { |
| return "is duplicate"; |
| } |
| |
| value = cf->args->elts; |
| |
| uwcf->ssl_passwords = ngx_ssl_read_password_file(cf, &value[1]); |
| |
| if (uwcf->ssl_passwords == NULL) { |
| return NGX_CONF_ERROR; |
| } |
| |
| return NGX_CONF_OK; |
| } |
| |
| |
| static ngx_int_t |
| ngx_http_uwsgi_set_ssl(ngx_conf_t *cf, ngx_http_uwsgi_loc_conf_t *uwcf) |
| { |
| ngx_pool_cleanup_t *cln; |
| |
| uwcf->upstream.ssl = ngx_pcalloc(cf->pool, sizeof(ngx_ssl_t)); |
| if (uwcf->upstream.ssl == NULL) { |
| return NGX_ERROR; |
| } |
| |
| uwcf->upstream.ssl->log = cf->log; |
| |
| if (ngx_ssl_create(uwcf->upstream.ssl, uwcf->ssl_protocols, NULL) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| cln = ngx_pool_cleanup_add(cf->pool, 0); |
| if (cln == NULL) { |
| return NGX_ERROR; |
| } |
| |
| cln->handler = ngx_ssl_cleanup_ctx; |
| cln->data = uwcf->upstream.ssl; |
| |
| if (uwcf->ssl_certificate.len) { |
| |
| if (uwcf->ssl_certificate_key.len == 0) { |
| ngx_log_error(NGX_LOG_EMERG, cf->log, 0, |
| "no \"uwsgi_ssl_certificate_key\" is defined " |
| "for certificate \"%V\"", &uwcf->ssl_certificate); |
| return NGX_ERROR; |
| } |
| |
| if (ngx_ssl_certificate(cf, uwcf->upstream.ssl, &uwcf->ssl_certificate, |
| &uwcf->ssl_certificate_key, uwcf->ssl_passwords) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| } |
| |
| if (ngx_ssl_ciphers(cf, uwcf->upstream.ssl, &uwcf->ssl_ciphers, 0) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| if (uwcf->upstream.ssl_verify) { |
| if (uwcf->ssl_trusted_certificate.len == 0) { |
| ngx_log_error(NGX_LOG_EMERG, cf->log, 0, |
| "no uwsgi_ssl_trusted_certificate for uwsgi_ssl_verify"); |
| return NGX_ERROR; |
| } |
| |
| if (ngx_ssl_trusted_certificate(cf, uwcf->upstream.ssl, |
| &uwcf->ssl_trusted_certificate, |
| uwcf->ssl_verify_depth) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| if (ngx_ssl_crl(cf, uwcf->upstream.ssl, &uwcf->ssl_crl) != NGX_OK) { |
| return NGX_ERROR; |
| } |
| } |
| |
| if (ngx_ssl_client_session_cache(cf, uwcf->upstream.ssl, |
| uwcf->upstream.ssl_session_reuse) |
| != NGX_OK) |
| { |
| return NGX_ERROR; |
| } |
| |
| return NGX_OK; |
| } |
| |
| #endif |