Blame modules/aaa/mod_authnz_fcgi.c

Packit 90a5c9
/* Licensed to the Apache Software Foundation (ASF) under one or more
Packit 90a5c9
 * contributor license agreements.  See the NOTICE file distributed with
Packit 90a5c9
 * this work for additional information regarding copyright ownership.
Packit 90a5c9
 * The ASF licenses this file to You under the Apache License, Version 2.0
Packit 90a5c9
 * (the "License"); you may not use this file except in compliance with
Packit 90a5c9
 * the License.  You may obtain a copy of the License at
Packit 90a5c9
 *
Packit 90a5c9
 *     http://www.apache.org/licenses/LICENSE-2.0
Packit 90a5c9
 *
Packit 90a5c9
 * Unless required by applicable law or agreed to in writing, software
Packit 90a5c9
 * distributed under the License is distributed on an "AS IS" BASIS,
Packit 90a5c9
 * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
Packit 90a5c9
 * See the License for the specific language governing permissions and
Packit 90a5c9
 * limitations under the License.
Packit 90a5c9
 */
Packit 90a5c9
Packit 90a5c9
#include "apr_hash.h"
Packit 90a5c9
#include "apr_lib.h"
Packit 90a5c9
#include "apr_strings.h"
Packit 90a5c9
Packit 90a5c9
#include "ap_provider.h"
Packit 90a5c9
#include "httpd.h"
Packit 90a5c9
#include "http_config.h"
Packit 90a5c9
#include "http_core.h"
Packit 90a5c9
#include "http_protocol.h"
Packit 90a5c9
#include "http_request.h"
Packit 90a5c9
#include "http_log.h"
Packit 90a5c9
#include "util_script.h"
Packit 90a5c9
#include "ap_provider.h"
Packit 90a5c9
#include "mod_auth.h"
Packit 90a5c9
#include "util_fcgi.h"
Packit 90a5c9
#include "ap_mmn.h"
Packit 90a5c9
Packit 90a5c9
module AP_MODULE_DECLARE_DATA authnz_fcgi_module;
Packit 90a5c9
Packit 90a5c9
typedef struct {
Packit 90a5c9
    const char *name; /* provider name */
Packit 90a5c9
    const char *backend; /* backend address, as configured */
Packit 90a5c9
    const char *host;
Packit 90a5c9
    apr_port_t port;
Packit 90a5c9
    apr_sockaddr_t *backend_addrs;
Packit 90a5c9
    int is_authn;
Packit 90a5c9
    int is_authz;
Packit 90a5c9
} fcgi_provider_conf;
Packit 90a5c9
Packit 90a5c9
typedef struct {
Packit 90a5c9
    const char *name; /* provider name */
Packit 90a5c9
    const char *default_user; /* this is user if authorizer returns
Packit 90a5c9
                               * success and a user expression yields
Packit 90a5c9
                               * empty string
Packit 90a5c9
                               */
Packit 90a5c9
    ap_expr_info_t *user_expr; /* expr to evaluate to set r->user */
Packit 90a5c9
    char authoritative; /* fail request if user is rejected? */
Packit 90a5c9
    char require_basic_auth; /* fail if client didn't send credentials? */
Packit 90a5c9
} fcgi_dir_conf;
Packit 90a5c9
Packit 90a5c9
typedef struct {
Packit 90a5c9
    /* If an "authnz" provider successfully authenticates, record
Packit 90a5c9
     * the provider name here for checking during authz.
Packit 90a5c9
     */
Packit 90a5c9
    const char *successful_authnz_provider;
Packit 90a5c9
} fcgi_request_notes;
Packit 90a5c9
Packit 90a5c9
static apr_hash_t *fcgi_authn_providers, *fcgi_authz_providers;
Packit 90a5c9
Packit 90a5c9
#define FCGI_IO_TIMEOUT apr_time_from_sec(30)
Packit 90a5c9
Packit 90a5c9
#ifndef NON200_RESPONSE_BUF_LEN
Packit 90a5c9
#define NON200_RESPONSE_BUF_LEN 8192
Packit 90a5c9
#endif
Packit 90a5c9
Packit 90a5c9
/* fcgi://{hostname|IPv4|IPv6}:port[/] */
Packit 90a5c9
#define FCGI_BACKEND_REGEX_STR "m%^fcgi://(.*):(\\d{1,5})/?$%"
Packit 90a5c9
Packit 90a5c9
/*
Packit 90a5c9
 * utility function to connect to a peer; generally useful, but 
Packit 90a5c9
 * wait for AF_UNIX support in this mod before thinking about how
Packit 90a5c9
 * to make it available to other modules
Packit 90a5c9
 */
Packit 90a5c9
static apr_status_t connect_to_peer(apr_socket_t **newsock,
Packit 90a5c9
                                    request_rec *r,
Packit 90a5c9
                                    apr_sockaddr_t *backend_addrs,
Packit 90a5c9
                                    const char *backend_name,
Packit 90a5c9
                                    apr_interval_time_t timeout)
Packit 90a5c9
{
Packit 90a5c9
    apr_status_t rv = APR_EINVAL; /* returned if no backend addr was provided
Packit 90a5c9
                                   */
Packit 90a5c9
    int connected = 0;
Packit 90a5c9
    apr_sockaddr_t *addr = backend_addrs;
Packit 90a5c9
Packit 90a5c9
    while (addr && !connected) {
Packit 90a5c9
        int loglevel = addr->next ? APLOG_DEBUG : APLOG_ERR;
Packit 90a5c9
        rv = apr_socket_create(newsock, addr->family,
Packit 90a5c9
                               SOCK_STREAM, 0, r->pool);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, loglevel, rv, r,
Packit 90a5c9
                          APLOGNO(02494) "error creating family %d socket "
Packit 90a5c9
                          "for target %s",
Packit 90a5c9
                          addr->family, backend_name);
Packit 90a5c9
            addr = addr->next;
Packit 90a5c9
            continue;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        apr_socket_opt_set(*newsock, APR_TCP_NODELAY, 1);
Packit 90a5c9
        apr_socket_timeout_set(*newsock,
Packit 90a5c9
                               timeout ? timeout : r->server->timeout);
Packit 90a5c9
Packit 90a5c9
        rv = apr_socket_connect(*newsock, addr);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            apr_socket_close(*newsock);
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, loglevel, rv, r,
Packit 90a5c9
                          APLOGNO(02495) "attempt to connect to %pI (%s) "
Packit 90a5c9
                          "failed", addr, backend_name);
Packit 90a5c9
            addr = addr->next;
Packit 90a5c9
            continue;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        connected = 1;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return rv;
Packit 90a5c9
#undef FN_LOG_MARK
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void log_provider_info(const fcgi_provider_conf *conf, request_rec *r)
Packit 90a5c9
{
Packit 90a5c9
    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                  APLOGNO(02496) "name %s, backend %s, host %s, port %d, "
Packit 90a5c9
                  "first address %pI, %c%c",
Packit 90a5c9
                  conf->name,
Packit 90a5c9
                  conf->backend,
Packit 90a5c9
                  conf->host,
Packit 90a5c9
                  (int)conf->port,
Packit 90a5c9
                  conf->backend_addrs,
Packit 90a5c9
                  conf->is_authn ? 'N' : '_',
Packit 90a5c9
                  conf->is_authz ? 'Z' : '_');
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void setupenv(request_rec *r, const char *password, const char *apache_role)
Packit 90a5c9
{
Packit 90a5c9
    ap_add_common_vars(r);
Packit 90a5c9
    ap_add_cgi_vars(r);
Packit 90a5c9
    apr_table_setn(r->subprocess_env, "FCGI_ROLE", AP_FCGI_AUTHORIZER_STR);
Packit 90a5c9
    if (apache_role) {
Packit 90a5c9
        apr_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", apache_role);
Packit 90a5c9
    }
Packit 90a5c9
    if (password) {
Packit 90a5c9
        apr_table_setn(r->subprocess_env, "REMOTE_PASSWD", password);
Packit 90a5c9
    }
Packit 90a5c9
    /* Drop the variables CONTENT_LENGTH, PATH_INFO, PATH_TRANSLATED,
Packit 90a5c9
     * SCRIPT_NAME and most Hop-By-Hop headers - EXCEPT we will pass
Packit 90a5c9
     * PROXY_AUTH to allow CGI to perform proxy auth for httpd
Packit 90a5c9
     */
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "CONTENT_LENGTH");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "PATH_INFO");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "PATH_TRANSLATED");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "SCRIPT_NAME");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "HTTP_KEEP_ALIVE");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "HTTP_TE");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "HTTP_TRAILER");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "HTTP_TRANSFER_ENCODING");
Packit 90a5c9
    apr_table_unset(r->subprocess_env, "HTTP_UPGRADE");
Packit 90a5c9
Packit 90a5c9
    /* Connection hop-by-hop header to prevent the CGI from hanging */
Packit 90a5c9
    apr_table_setn(r->subprocess_env, "HTTP_CONNECTION", "close");
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static apr_status_t recv_data(const fcgi_provider_conf *conf,
Packit 90a5c9
                              request_rec *r,
Packit 90a5c9
                              apr_socket_t *s,
Packit 90a5c9
                              char *buf,
Packit 90a5c9
                              apr_size_t *buflen)
Packit 90a5c9
{
Packit 90a5c9
    apr_status_t rv;
Packit 90a5c9
Packit 90a5c9
    rv = apr_socket_recv(s, buf, buflen);
Packit 90a5c9
    if (rv != APR_SUCCESS) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                      APLOGNO(02497) "Couldn't read from backend %s",
Packit 90a5c9
                      conf->backend);
Packit 90a5c9
        return rv;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
#if AP_MODULE_MAGIC_AT_LEAST(20130702,2) 
Packit 90a5c9
    ap_log_rdata(APLOG_MARK, APLOG_TRACE5, r, "FastCGI data received",
Packit 90a5c9
                 buf, *buflen, AP_LOG_DATA_SHOW_OFFSET);
Packit 90a5c9
#endif
Packit 90a5c9
    return APR_SUCCESS;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static apr_status_t recv_data_full(const fcgi_provider_conf *conf,
Packit 90a5c9
                                   request_rec *r,
Packit 90a5c9
                                   apr_socket_t *s,
Packit 90a5c9
                                   char *buf,
Packit 90a5c9
                                   apr_size_t buflen)
Packit 90a5c9
{
Packit 90a5c9
    apr_size_t readlen;
Packit 90a5c9
    apr_size_t cumulative_len = 0;
Packit 90a5c9
    apr_status_t rv;
Packit 90a5c9
Packit 90a5c9
    do {
Packit 90a5c9
        readlen = buflen - cumulative_len;
Packit 90a5c9
        rv = recv_data(conf, r, s, buf + cumulative_len, &readlen);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            return rv;
Packit 90a5c9
        }
Packit 90a5c9
        cumulative_len += readlen;
Packit 90a5c9
    } while (cumulative_len < buflen);
Packit 90a5c9
Packit 90a5c9
    return APR_SUCCESS;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static apr_status_t sendv_data(const fcgi_provider_conf *conf,
Packit 90a5c9
                               request_rec *r,
Packit 90a5c9
                               apr_socket_t *s,
Packit 90a5c9
                               struct iovec *vec,
Packit 90a5c9
                               int nvec,
Packit 90a5c9
                               apr_size_t *len)
Packit 90a5c9
{
Packit 90a5c9
    apr_size_t to_write = 0, written = 0;
Packit 90a5c9
    apr_status_t rv = APR_SUCCESS;
Packit 90a5c9
    int i, offset;
Packit 90a5c9
Packit 90a5c9
    for (i = 0; i < nvec; i++) {
Packit 90a5c9
        to_write += vec[i].iov_len;
Packit 90a5c9
#if AP_MODULE_MAGIC_AT_LEAST(20130702,2) 
Packit 90a5c9
        ap_log_rdata(APLOG_MARK, APLOG_TRACE5, r, "FastCGI data sent",
Packit 90a5c9
                     vec[i].iov_base, vec[i].iov_len, AP_LOG_DATA_SHOW_OFFSET);
Packit 90a5c9
#endif
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    offset = 0;
Packit 90a5c9
    while (to_write) {
Packit 90a5c9
        apr_size_t n = 0;
Packit 90a5c9
        rv = apr_socket_sendv(s, vec + offset, nvec - offset, &n);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                          APLOGNO(02498) "Sending data to %s failed",
Packit 90a5c9
                          conf->backend);
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
        if (n > 0) {
Packit 90a5c9
            written += n;
Packit 90a5c9
            if (written >= to_write)
Packit 90a5c9
                break;                 /* short circuit out */
Packit 90a5c9
            for (i = offset; i < nvec; ) {
Packit 90a5c9
                if (n >= vec[i].iov_len) {
Packit 90a5c9
                    offset++;
Packit 90a5c9
                    n -= vec[i++].iov_len;
Packit 90a5c9
                } else {
Packit 90a5c9
                    vec[i].iov_len -= n;
Packit 90a5c9
                    vec[i].iov_base = (char *) vec[i].iov_base + n;
Packit 90a5c9
                    break;
Packit 90a5c9
                }
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    *len = written;
Packit 90a5c9
Packit 90a5c9
    return rv;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static apr_status_t send_begin_request(request_rec *r,
Packit 90a5c9
                                       const fcgi_provider_conf *conf,
Packit 90a5c9
                                       apr_socket_t *s, int role,
Packit 90a5c9
                                       apr_uint16_t request_id)
Packit 90a5c9
{
Packit 90a5c9
    struct iovec vec[2];
Packit 90a5c9
    ap_fcgi_header header;
Packit 90a5c9
    unsigned char farray[AP_FCGI_HEADER_LEN];
Packit 90a5c9
    ap_fcgi_begin_request_body brb;
Packit 90a5c9
    unsigned char abrb[AP_FCGI_HEADER_LEN];
Packit 90a5c9
    apr_size_t len;
Packit 90a5c9
Packit 90a5c9
    ap_fcgi_fill_in_header(&header, AP_FCGI_BEGIN_REQUEST, request_id,
Packit 90a5c9
                           sizeof(abrb), 0);
Packit 90a5c9
    ap_fcgi_fill_in_request_body(&brb, role, 0 /* *NOT* AP_FCGI_KEEP_CONN */);
Packit 90a5c9
Packit 90a5c9
    ap_fcgi_header_to_array(&header, farray);
Packit 90a5c9
    ap_fcgi_begin_request_body_to_array(&brb, abrb);
Packit 90a5c9
Packit 90a5c9
    vec[0].iov_base = (void *)farray;
Packit 90a5c9
    vec[0].iov_len = sizeof(farray);
Packit 90a5c9
    vec[1].iov_base = (void *)abrb;
Packit 90a5c9
    vec[1].iov_len = sizeof(abrb);
Packit 90a5c9
Packit 90a5c9
    return sendv_data(conf, r, s, vec, 2, &len;;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static apr_status_t send_environment(apr_socket_t *s,
Packit 90a5c9
                                     const fcgi_provider_conf *conf,
Packit 90a5c9
                                     request_rec *r, apr_uint16_t request_id,
Packit 90a5c9
                                     apr_pool_t *temp_pool)
Packit 90a5c9
{
Packit 90a5c9
    const char *fn = "send_environment";
Packit 90a5c9
    const apr_array_header_t *envarr;
Packit 90a5c9
    const apr_table_entry_t *elts;
Packit 90a5c9
    struct iovec vec[2];
Packit 90a5c9
    ap_fcgi_header header;
Packit 90a5c9
    unsigned char farray[AP_FCGI_HEADER_LEN];
Packit 90a5c9
    char *body;
Packit 90a5c9
    apr_status_t rv;
Packit 90a5c9
    apr_size_t avail_len, len, required_len;
Packit 90a5c9
    int i, next_elem, starting_elem;
Packit 90a5c9
Packit 90a5c9
    envarr = apr_table_elts(r->subprocess_env);
Packit 90a5c9
    elts = (const apr_table_entry_t *) envarr->elts;
Packit 90a5c9
Packit 90a5c9
    if (APLOG_R_IS_LEVEL(r, APLOG_TRACE2)) {
Packit 90a5c9
Packit 90a5c9
        for (i = 0; i < envarr->nelts; ++i) {
Packit 90a5c9
            if (!elts[i].key) {
Packit 90a5c9
                continue;
Packit 90a5c9
            }
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_TRACE2, 0, r,
Packit 90a5c9
                          "%s: '%s': '%s'",
Packit 90a5c9
                          fn, elts[i].key, 
Packit 90a5c9
                          !strcmp(elts[i].key, "REMOTE_PASSWD") ?
Packit 90a5c9
                              "XXXXXXXX" : elts[i].val);
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    /* Send envvars over in as many FastCGI records as it takes, */
Packit 90a5c9
    next_elem = 0; /* starting with the first one */
Packit 90a5c9
Packit 90a5c9
    avail_len = 16 * 1024; /* our limit per record, which could have been up
Packit 90a5c9
                            * to AP_FCGI_MAX_CONTENT_LEN
Packit 90a5c9
                            */
Packit 90a5c9
Packit 90a5c9
    while (next_elem < envarr->nelts) {
Packit 90a5c9
        starting_elem = next_elem;
Packit 90a5c9
        required_len = ap_fcgi_encoded_env_len(r->subprocess_env,
Packit 90a5c9
                                               avail_len,
Packit 90a5c9
                                               &next_elem);
Packit 90a5c9
Packit 90a5c9
        if (!required_len) {
Packit 90a5c9
            if (next_elem < envarr->nelts) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
Packit 90a5c9
                              APLOGNO(02499) "couldn't encode envvar '%s' in %"
Packit 90a5c9
                              APR_SIZE_T_FMT " bytes",
Packit 90a5c9
                              elts[next_elem].key, avail_len);
Packit 90a5c9
                /* skip this envvar and continue */
Packit 90a5c9
                ++next_elem;
Packit 90a5c9
                continue;
Packit 90a5c9
            }
Packit 90a5c9
            /* only an unused element at the end of the array */
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                      APLOGNO(02500) "required len for encoding envvars: %"
Packit 90a5c9
                      APR_SIZE_T_FMT ", %d/%d elems processed so far",
Packit 90a5c9
                      required_len, next_elem, envarr->nelts);
Packit 90a5c9
Packit 90a5c9
        body = apr_palloc(temp_pool, required_len);
Packit 90a5c9
        rv = ap_fcgi_encode_env(r, r->subprocess_env, body, required_len,
Packit 90a5c9
                                &starting_elem);
Packit 90a5c9
        /* we pre-compute, so we can't run out of space */
Packit 90a5c9
        ap_assert(rv == APR_SUCCESS);
Packit 90a5c9
        /* compute and encode must be in sync */
Packit 90a5c9
        ap_assert(starting_elem == next_elem);
Packit 90a5c9
Packit 90a5c9
        ap_fcgi_fill_in_header(&header, AP_FCGI_PARAMS, request_id,
Packit 90a5c9
                               (apr_uint16_t)required_len, 0);
Packit 90a5c9
        ap_fcgi_header_to_array(&header, farray);
Packit 90a5c9
Packit 90a5c9
        vec[0].iov_base = (void *)farray;
Packit 90a5c9
        vec[0].iov_len = sizeof(farray);
Packit 90a5c9
        vec[1].iov_base = body;
Packit 90a5c9
        vec[1].iov_len = required_len;
Packit 90a5c9
Packit 90a5c9
        rv = sendv_data(conf, r, s, vec, 2, &len;;
Packit 90a5c9
        apr_pool_clear(temp_pool);
Packit 90a5c9
Packit 90a5c9
        if (rv) {
Packit 90a5c9
            return rv;
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    /* Envvars sent, so say we're done */
Packit 90a5c9
    ap_fcgi_fill_in_header(&header, AP_FCGI_PARAMS, request_id, 0, 0);
Packit 90a5c9
    ap_fcgi_header_to_array(&header, farray);
Packit 90a5c9
Packit 90a5c9
    vec[0].iov_base = (void *)farray;
Packit 90a5c9
    vec[0].iov_len = sizeof(farray);
Packit 90a5c9
Packit 90a5c9
    return sendv_data(conf, r, s, vec, 1, &len;;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
/*
Packit 90a5c9
 * This header-state logic is from mod_proxy_fcgi.
Packit 90a5c9
 */
Packit 90a5c9
enum {
Packit 90a5c9
  HDR_STATE_READING_HEADERS,
Packit 90a5c9
  HDR_STATE_GOT_CR,
Packit 90a5c9
  HDR_STATE_GOT_CRLF,
Packit 90a5c9
  HDR_STATE_GOT_CRLFCR,
Packit 90a5c9
  HDR_STATE_GOT_LF,
Packit 90a5c9
  HDR_STATE_DONE_WITH_HEADERS
Packit 90a5c9
};
Packit 90a5c9
Packit 90a5c9
/* Try to find the end of the script headers in the response from the back
Packit 90a5c9
 * end fastcgi server. STATE holds the current header parsing state for this
Packit 90a5c9
 * request.
Packit 90a5c9
 *
Packit 90a5c9
 * Returns 0 if it can't find the end of the headers, and 1 if it found the
Packit 90a5c9
 * end of the headers. */
Packit 90a5c9
static int handle_headers(request_rec *r, int *state,
Packit 90a5c9
                          const char *readbuf, apr_size_t readlen)
Packit 90a5c9
{
Packit 90a5c9
    const char *itr = readbuf;
Packit 90a5c9
Packit 90a5c9
    while (readlen--) {
Packit 90a5c9
        if (*itr == '\r') {
Packit 90a5c9
            switch (*state) {
Packit 90a5c9
                case HDR_STATE_GOT_CRLF:
Packit 90a5c9
                    *state = HDR_STATE_GOT_CRLFCR;
Packit 90a5c9
                    break;
Packit 90a5c9
Packit 90a5c9
                default:
Packit 90a5c9
                    *state = HDR_STATE_GOT_CR;
Packit 90a5c9
                    break;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        else if (*itr == '\n') {
Packit 90a5c9
            switch (*state) {
Packit 90a5c9
                 case HDR_STATE_GOT_LF:
Packit 90a5c9
                     *state = HDR_STATE_DONE_WITH_HEADERS;
Packit 90a5c9
                     break;
Packit 90a5c9
Packit 90a5c9
                 case HDR_STATE_GOT_CR:
Packit 90a5c9
                     *state = HDR_STATE_GOT_CRLF;
Packit 90a5c9
                     break;
Packit 90a5c9
Packit 90a5c9
                 case HDR_STATE_GOT_CRLFCR:
Packit 90a5c9
                     *state = HDR_STATE_DONE_WITH_HEADERS;
Packit 90a5c9
                     break;
Packit 90a5c9
Packit 90a5c9
                 default:
Packit 90a5c9
                     *state = HDR_STATE_GOT_LF;
Packit 90a5c9
                     break;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        else {
Packit 90a5c9
            *state = HDR_STATE_READING_HEADERS;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        if (*state == HDR_STATE_DONE_WITH_HEADERS)
Packit 90a5c9
            break;
Packit 90a5c9
Packit 90a5c9
        ++itr;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (*state == HDR_STATE_DONE_WITH_HEADERS) {
Packit 90a5c9
        return 1;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return 0;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
/*
Packit 90a5c9
 * handle_response() is based on mod_proxy_fcgi's dispatch()
Packit 90a5c9
 */
Packit 90a5c9
static apr_status_t handle_response(const fcgi_provider_conf *conf,
Packit 90a5c9
                                    request_rec *r, apr_socket_t *s,
Packit 90a5c9
                                    apr_pool_t *temp_pool,
Packit 90a5c9
                                    apr_uint16_t request_id,
Packit 90a5c9
                                    char *rspbuf,
Packit 90a5c9
                                    apr_size_t *rspbuflen)
Packit 90a5c9
{
Packit 90a5c9
    apr_bucket *b;
Packit 90a5c9
    apr_bucket_brigade *ob;
Packit 90a5c9
    apr_size_t orspbuflen = 0;
Packit 90a5c9
    apr_status_t rv = APR_SUCCESS;
Packit 90a5c9
    const char *fn = "handle_response";
Packit 90a5c9
    int header_state = HDR_STATE_READING_HEADERS;
Packit 90a5c9
    int seen_end_of_headers = 0, done = 0;
Packit 90a5c9
Packit 90a5c9
    if (rspbuflen) {
Packit 90a5c9
        orspbuflen = *rspbuflen;
Packit 90a5c9
        *rspbuflen = 0; /* unless we actually read something */
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    ob = apr_brigade_create(r->pool, r->connection->bucket_alloc);
Packit 90a5c9
Packit 90a5c9
    while (!done && rv == APR_SUCCESS) { /* Keep reading FastCGI records until
Packit 90a5c9
                                          * we get AP_FCGI_END_REQUEST (done)
Packit 90a5c9
                                          * or an error occurs.
Packit 90a5c9
                                          */
Packit 90a5c9
        apr_size_t readbuflen;
Packit 90a5c9
        apr_uint16_t clen;
Packit 90a5c9
        apr_uint16_t rid;
Packit 90a5c9
        char readbuf[AP_IOBUFSIZE + 1];
Packit 90a5c9
        unsigned char farray[AP_FCGI_HEADER_LEN];
Packit 90a5c9
        unsigned char plen;
Packit 90a5c9
        unsigned char type;
Packit 90a5c9
        unsigned char version;
Packit 90a5c9
Packit 90a5c9
        rv = recv_data_full(conf, r, s, (char *)farray, AP_FCGI_HEADER_LEN);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                          APLOGNO(02501) "%s: Error occurred before reading "
Packit 90a5c9
                          "entire header", fn);
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        ap_fcgi_header_fields_from_array(&version, &type, &rid, &clen, &plen,
Packit 90a5c9
                                         farray);
Packit 90a5c9
Packit 90a5c9
        if (version != AP_FCGI_VERSION_1) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                          APLOGNO(02502) "%s: Got bogus FastCGI header "
Packit 90a5c9
                          "version %d", fn, (int)version);
Packit 90a5c9
            rv = APR_EINVAL;
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        if (rid != request_id) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                          APLOGNO(02503) "%s: Got bogus FastCGI header "
Packit 90a5c9
                          "request id %d, expected %d",
Packit 90a5c9
                          fn, rid, request_id);
Packit 90a5c9
            rv = APR_EINVAL;
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
    recv_again: /* if we need to keep reading more of a record's content */
Packit 90a5c9
Packit 90a5c9
        if (clen > sizeof(readbuf) - 1) {
Packit 90a5c9
            readbuflen = sizeof(readbuf) - 1;
Packit 90a5c9
        } else {
Packit 90a5c9
            readbuflen = clen;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        /*
Packit 90a5c9
         * Now get the actual content of the record.
Packit 90a5c9
         */
Packit 90a5c9
        if (readbuflen != 0) {
Packit 90a5c9
            rv = recv_data(conf, r, s, readbuf, &readbuflen);
Packit 90a5c9
            if (rv != APR_SUCCESS) {
Packit 90a5c9
                break;
Packit 90a5c9
            }
Packit 90a5c9
            readbuf[readbuflen] = '\0';
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        switch (type) {
Packit 90a5c9
        case AP_FCGI_STDOUT: /* Response headers and optional body */
Packit 90a5c9
            if (clen != 0) {
Packit 90a5c9
                b = apr_bucket_transient_create(readbuf,
Packit 90a5c9
                                                readbuflen,
Packit 90a5c9
                                                r->connection->bucket_alloc);
Packit 90a5c9
Packit 90a5c9
                APR_BRIGADE_INSERT_TAIL(ob, b);
Packit 90a5c9
Packit 90a5c9
                if (!seen_end_of_headers) {
Packit 90a5c9
                    int st = handle_headers(r, &header_state,
Packit 90a5c9
                                            readbuf, readbuflen);
Packit 90a5c9
Packit 90a5c9
                    if (st == 1) {
Packit 90a5c9
                        int status;
Packit 90a5c9
Packit 90a5c9
                        seen_end_of_headers = 1;
Packit 90a5c9
Packit 90a5c9
                        status =
Packit 90a5c9
                            ap_scan_script_header_err_brigade_ex(r, ob,
Packit 90a5c9
                                                                 NULL, 
Packit 90a5c9
                                                                 APLOG_MODULE_INDEX);
Packit 90a5c9
                        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                                      APLOGNO(02504) "%s: script header "
Packit 90a5c9
                                      "parsing -> %d/%d",
Packit 90a5c9
                                      fn, status, r->status);
Packit 90a5c9
Packit 90a5c9
                        if (rspbuf) { /* caller wants to see response body,
Packit 90a5c9
                                       * if any
Packit 90a5c9
                                       */
Packit 90a5c9
                            apr_status_t tmprv;
Packit 90a5c9
Packit 90a5c9
                            if (rspbuflen) {
Packit 90a5c9
                                *rspbuflen = orspbuflen;
Packit 90a5c9
                            }
Packit 90a5c9
                            tmprv = apr_brigade_flatten(ob, rspbuf, rspbuflen);
Packit 90a5c9
                            if (tmprv != APR_SUCCESS) {
Packit 90a5c9
                                /* should not occur for these bucket types;
Packit 90a5c9
                                 * does not indicate overflow
Packit 90a5c9
                                 */
Packit 90a5c9
                                ap_log_rerror(APLOG_MARK, APLOG_ERR, tmprv, r,
Packit 90a5c9
                                              APLOGNO(02505) "%s: error "
Packit 90a5c9
                                              "flattening response body",
Packit 90a5c9
                                              fn);
Packit 90a5c9
                            }
Packit 90a5c9
                        }
Packit 90a5c9
Packit 90a5c9
                        if (status != OK) {
Packit 90a5c9
                            r->status = status;
Packit 90a5c9
                            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                                          APLOGNO(02506) "%s: Error parsing "
Packit 90a5c9
                                          "script headers from %s",
Packit 90a5c9
                                          fn, conf->backend);
Packit 90a5c9
                            rv = APR_EINVAL;
Packit 90a5c9
                            break;
Packit 90a5c9
                        }
Packit 90a5c9
                        apr_pool_clear(temp_pool);
Packit 90a5c9
                    }
Packit 90a5c9
                    else {
Packit 90a5c9
                        /* We're still looking for the end of the
Packit 90a5c9
                         * headers, so this part of the data will need
Packit 90a5c9
                         * to persist. */
Packit 90a5c9
                        apr_bucket_setaside(b, temp_pool);
Packit 90a5c9
                    }
Packit 90a5c9
                }
Packit 90a5c9
Packit 90a5c9
                /* If we didn't read all the data go back and get the
Packit 90a5c9
                 * rest of it. */
Packit 90a5c9
                if (clen > readbuflen) {
Packit 90a5c9
                    clen -= readbuflen;
Packit 90a5c9
                    goto recv_again;
Packit 90a5c9
                }
Packit 90a5c9
            }
Packit 90a5c9
            break;
Packit 90a5c9
Packit 90a5c9
        case AP_FCGI_STDERR: /* Text to log */
Packit 90a5c9
            if (clen) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
Packit 90a5c9
                              APLOGNO(02507) "%s: Logged from %s: '%s'",
Packit 90a5c9
                              fn, conf->backend, readbuf);
Packit 90a5c9
            }
Packit 90a5c9
Packit 90a5c9
            if (clen > readbuflen) {
Packit 90a5c9
                clen -= readbuflen;
Packit 90a5c9
                goto recv_again; /* continue reading this record */
Packit 90a5c9
            }
Packit 90a5c9
            break;
Packit 90a5c9
Packit 90a5c9
        case AP_FCGI_END_REQUEST:
Packit 90a5c9
            done = 1;
Packit 90a5c9
            break;
Packit 90a5c9
Packit 90a5c9
        default:
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                          APLOGNO(02508) "%s: Got bogus FastCGI record type "
Packit 90a5c9
                          "%d", fn, type);
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
        /* Leave on above switch's inner error. */
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            break;
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        /*
Packit 90a5c9
         * Read/discard any trailing padding.
Packit 90a5c9
         */
Packit 90a5c9
        if (plen) {
Packit 90a5c9
            rv = recv_data_full(conf, r, s, readbuf, plen);
Packit 90a5c9
            if (rv != APR_SUCCESS) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                              APLOGNO(02509) "%s: Error occurred reading "
Packit 90a5c9
                              "padding",
Packit 90a5c9
                              fn);
Packit 90a5c9
                break;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    apr_brigade_cleanup(ob);
Packit 90a5c9
Packit 90a5c9
    if (rv == APR_SUCCESS && !seen_end_of_headers) {
Packit 90a5c9
        rv = APR_EINVAL;
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                      APLOGNO(02510) "%s: Never reached end of script headers",
Packit 90a5c9
                      fn);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return rv;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
/* almost from mod_fcgid */
Packit 90a5c9
static int mod_fcgid_modify_auth_header(void *vars,
Packit 90a5c9
                                        const char *key, const char *val)
Packit 90a5c9
{
Packit 90a5c9
    /* When the application gives a 200 response, the server ignores response
Packit 90a5c9
       headers whose names aren't prefixed with Variable- prefix, and ignores
Packit 90a5c9
       any response content */
Packit 90a5c9
    if (strncasecmp(key, "Variable-", 9) == 0)
Packit 90a5c9
        apr_table_setn(vars, key, val);
Packit 90a5c9
    return 1;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static int fix_auth_header(void *vr, const char *key, const char *val)
Packit 90a5c9
{
Packit 90a5c9
    request_rec *r = vr;
Packit 90a5c9
Packit 90a5c9
    ap_log_rerror(APLOG_MARK, APLOG_TRACE2, 0, r, "moving %s->%s", key, val);
Packit 90a5c9
    apr_table_unset(r->err_headers_out, key);
Packit 90a5c9
    apr_table_setn(r->subprocess_env, key + 9, val);
Packit 90a5c9
    return 1;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void req_rsp(request_rec *r, const fcgi_provider_conf *conf,
Packit 90a5c9
                    const char *password, const char *apache_role,
Packit 90a5c9
                    char *rspbuf, apr_size_t *rspbuflen)
Packit 90a5c9
{
Packit 90a5c9
    const char *fn = "req_rsp";
Packit 90a5c9
    apr_pool_t *temp_pool;
Packit 90a5c9
    apr_size_t orspbuflen = 0;
Packit 90a5c9
    apr_socket_t *s;
Packit 90a5c9
    apr_status_t rv;
Packit 90a5c9
    apr_table_t *saved_subprocess_env = 
Packit 90a5c9
      apr_table_copy(r->pool, r->subprocess_env);
Packit 90a5c9
Packit 90a5c9
    if (rspbuflen) {
Packit 90a5c9
        orspbuflen = *rspbuflen;
Packit 90a5c9
        *rspbuflen = 0; /* unless we actually read something */
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    apr_pool_create(&temp_pool, r->pool);
Packit 90a5c9
Packit 90a5c9
    setupenv(r, password, apache_role);
Packit 90a5c9
Packit 90a5c9
    rv = connect_to_peer(&s, r, conf->backend_addrs,
Packit 90a5c9
                         conf->backend, FCGI_IO_TIMEOUT);
Packit 90a5c9
    if (rv == APR_SUCCESS) {
Packit 90a5c9
        apr_uint16_t request_id = 1;
Packit 90a5c9
Packit 90a5c9
        rv = send_begin_request(r, conf, s, AP_FCGI_AUTHORIZER, request_id);
Packit 90a5c9
        if (rv != APR_SUCCESS) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                          APLOGNO(02511) "%s: Failed writing request to %s",
Packit 90a5c9
                          fn, conf->backend);
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        if (rv == APR_SUCCESS) {
Packit 90a5c9
            rv = send_environment(s, conf, r, request_id, temp_pool);
Packit 90a5c9
            if (rv != APR_SUCCESS) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                              APLOGNO(02512) "%s: Failed writing environment "
Packit 90a5c9
                              "to %s", fn, conf->backend);
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        /* The responder owns the request body, not the authorizer.
Packit 90a5c9
         * Don't even send an empty AP_FCGI_STDIN block.  libfcgi doesn't care,
Packit 90a5c9
         * but it wasn't sent to authorizers by mod_fastcgi or mod_fcgi and
Packit 90a5c9
         * may be unhandled by the app.  Additionally, the FastCGI spec does
Packit 90a5c9
         * not mention FCGI_STDIN in the Authorizer description, though it
Packit 90a5c9
         * does describe FCGI_STDIN elsewhere in more general terms than
Packit 90a5c9
         * simply a wrapper for the client's request body.
Packit 90a5c9
         */
Packit 90a5c9
Packit 90a5c9
        if (rv == APR_SUCCESS) {
Packit 90a5c9
            if (rspbuflen) {
Packit 90a5c9
                *rspbuflen = orspbuflen;
Packit 90a5c9
            }
Packit 90a5c9
            rv = handle_response(conf, r, s, temp_pool, request_id, rspbuf,
Packit 90a5c9
                                 rspbuflen);
Packit 90a5c9
            if (rv != APR_SUCCESS) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
Packit 90a5c9
                              APLOGNO(02514) "%s: Failed handling response "
Packit 90a5c9
                              "from %s", fn, conf->backend);
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        apr_socket_close(s);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (rv != APR_SUCCESS) {
Packit 90a5c9
        /* some sort of mechanical problem */
Packit 90a5c9
        r->status = HTTP_INTERNAL_SERVER_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                      APLOGNO(02515) "%s: Received HTTP status %d",
Packit 90a5c9
                      fn, r->status);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    r->subprocess_env = saved_subprocess_env;
Packit 90a5c9
Packit 90a5c9
    if (r->status == HTTP_OK) {
Packit 90a5c9
        /* An Authorizer application's 200 response may include headers
Packit 90a5c9
         * whose names are prefixed with Variable-, and they should be
Packit 90a5c9
         * available to subsequent phases via subprocess_env (and yanked
Packit 90a5c9
         * from the client response).
Packit 90a5c9
         */
Packit 90a5c9
        apr_table_t *vars = apr_table_make(temp_pool, /* not used to allocate
Packit 90a5c9
                                                       * any values that end up
Packit 90a5c9
                                                       * in r->(anything)
Packit 90a5c9
                                                       */
Packit 90a5c9
                                           10);
Packit 90a5c9
        apr_table_do(mod_fcgid_modify_auth_header, vars,
Packit 90a5c9
                     r->err_headers_out, NULL);
Packit 90a5c9
        apr_table_do(fix_auth_header, r, vars, NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    apr_pool_destroy(temp_pool);
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static int fcgi_check_authn(request_rec *r)
Packit 90a5c9
{
Packit 90a5c9
    const char *fn = "fcgi_check_authn";
Packit 90a5c9
    fcgi_dir_conf *dconf = ap_get_module_config(r->per_dir_config,
Packit 90a5c9
                                                &authnz_fcgi_module);
Packit 90a5c9
    const char *password = NULL;
Packit 90a5c9
    const fcgi_provider_conf *conf;
Packit 90a5c9
    const char *prov;
Packit 90a5c9
    const char *auth_type;
Packit 90a5c9
    char rspbuf[NON200_RESPONSE_BUF_LEN + 1]; /* extra byte for '\0' */
Packit 90a5c9
    apr_size_t rspbuflen = sizeof rspbuf - 1;
Packit 90a5c9
    int res;
Packit 90a5c9
Packit 90a5c9
    prov = dconf && dconf->name ? dconf->name : NULL;
Packit 90a5c9
Packit 90a5c9
    if (!prov || !strcasecmp(prov, "None")) {
Packit 90a5c9
        return DECLINED;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    auth_type = ap_auth_type(r);
Packit 90a5c9
Packit 90a5c9
    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                  APLOGNO(02516) "%s, prov %s, authoritative %s, "
Packit 90a5c9
                  "require-basic %s, user expr? %s type %s",
Packit 90a5c9
                  fn, prov,
Packit 90a5c9
                  dconf->authoritative ? "yes" : "no",
Packit 90a5c9
                  dconf->require_basic_auth ? "yes" : "no",
Packit 90a5c9
                  dconf->user_expr ? "yes" : "no",
Packit 90a5c9
                  auth_type);
Packit 90a5c9
Packit 90a5c9
    if (auth_type && !strcasecmp(auth_type, "Basic")) {
Packit 90a5c9
        if ((res = ap_get_basic_auth_pw(r, &password))) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                          APLOGNO(02517) "%s: couldn't retrieve basic auth "
Packit 90a5c9
                          "password", fn);
Packit 90a5c9
            if (dconf->require_basic_auth) {
Packit 90a5c9
                return res;
Packit 90a5c9
            }
Packit 90a5c9
            password = NULL;
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    conf = apr_hash_get(fcgi_authn_providers, prov, APR_HASH_KEY_STRING);
Packit 90a5c9
    if (!conf) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
Packit 90a5c9
                      APLOGNO(02518) "%s: can't find config for provider %s",
Packit 90a5c9
                      fn, prov);
Packit 90a5c9
        return HTTP_INTERNAL_SERVER_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (APLOGrdebug(r)) {
Packit 90a5c9
        log_provider_info(conf, r);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    req_rsp(r, conf, password, AP_FCGI_APACHE_ROLE_AUTHENTICATOR_STR,
Packit 90a5c9
            rspbuf, &rspbuflen);
Packit 90a5c9
Packit 90a5c9
    if (r->status == HTTP_OK) {
Packit 90a5c9
        if (dconf->user_expr) {
Packit 90a5c9
            const char *err;
Packit 90a5c9
            const char *user = ap_expr_str_exec(r, dconf->user_expr,
Packit 90a5c9
                                                &err;;
Packit 90a5c9
            if (user && strlen(user)) {
Packit 90a5c9
                r->user = apr_pstrdup(r->pool, user);
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                              APLOGNO(02519) "%s: Setting user to '%s'",
Packit 90a5c9
                              fn, r->user);
Packit 90a5c9
            }
Packit 90a5c9
            else if (user && dconf->default_user) {
Packit 90a5c9
                r->user = apr_pstrdup(r->pool, dconf->default_user);
Packit 90a5c9
            }
Packit 90a5c9
            else if (user) {
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                              APLOGNO(02520) "%s: Failure extracting user "
Packit 90a5c9
                              "after calling authorizer: user expression "
Packit 90a5c9
                              "yielded empty string (variable not set?)",
Packit 90a5c9
                              fn);
Packit 90a5c9
                r->status = HTTP_INTERNAL_SERVER_ERROR;
Packit 90a5c9
            }
Packit 90a5c9
            else {
Packit 90a5c9
                /* unexpected error, not even an empty string was returned */
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
Packit 90a5c9
                              APLOGNO(02521) "%s: Failure extracting user "
Packit 90a5c9
                              "after calling authorizer: %s",
Packit 90a5c9
                              fn, err);
Packit 90a5c9
                r->status = HTTP_INTERNAL_SERVER_ERROR;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        if (conf->is_authz) {
Packit 90a5c9
            /* combined authn/authz phase, so app won't be invoked for authz
Packit 90a5c9
             *
Packit 90a5c9
             * Remember that the request was successfully authorized by this
Packit 90a5c9
             * provider.
Packit 90a5c9
             */
Packit 90a5c9
            fcgi_request_notes *rnotes = apr_palloc(r->pool, sizeof(*rnotes));
Packit 90a5c9
            rnotes->successful_authnz_provider = conf->name;
Packit 90a5c9
            ap_set_module_config(r->request_config, &authnz_fcgi_module,
Packit 90a5c9
                                 rnotes);
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        /* From the spec:
Packit 90a5c9
         *   For Authorizer response status values other than "200" (OK), the 
Packit 90a5c9
         *   Web server denies access and sends the response status, headers,
Packit 90a5c9
         *   and content back to the HTTP client.
Packit 90a5c9
         * But:
Packit 90a5c9
         *   This only makes sense if this authorizer is authoritative.
Packit 90a5c9
         */
Packit 90a5c9
        if (rspbuflen > 0 && !dconf->authoritative) {
Packit 90a5c9
            ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
Packit 90a5c9
                          APLOGNO(02522) "%s: Ignoring response body from non-"
Packit 90a5c9
                          "authoritative authorizer", fn);
Packit 90a5c9
        }
Packit 90a5c9
        else if (rspbuflen > 0) {
Packit 90a5c9
            if (rspbuflen == sizeof rspbuf - 1) {
Packit 90a5c9
                /* apr_brigade_flatten() interface :( */
Packit 90a5c9
                ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
Packit 90a5c9
                              APLOGNO(02523) "%s: possible overflow handling "
Packit 90a5c9
                              "response body", fn);
Packit 90a5c9
            }
Packit 90a5c9
            rspbuf[rspbuflen] = '\0'; /* we reserved an extra byte for '\0' */
Packit 90a5c9
            ap_custom_response(r, r->status, rspbuf); /* API makes a copy */
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return r->status == HTTP_OK ? 
Packit 90a5c9
        OK : dconf->authoritative ? r->status : DECLINED;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static authn_status fcgi_check_password(request_rec *r, const char *user,
Packit 90a5c9
                                        const char *password)
Packit 90a5c9
{
Packit 90a5c9
    const char *fn = "fcgi_check_password";
Packit 90a5c9
    const char *prov = apr_table_get(r->notes, AUTHN_PROVIDER_NAME_NOTE);
Packit 90a5c9
    const fcgi_provider_conf *conf;
Packit 90a5c9
Packit 90a5c9
    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                  APLOGNO(02524) "%s(%s, XXX): provider %s",
Packit 90a5c9
                  fn, user, prov);
Packit 90a5c9
Packit 90a5c9
    if (!prov) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
Packit 90a5c9
                      APLOGNO(02525) "%s: provider note isn't set", fn);
Packit 90a5c9
        return AUTH_GENERAL_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    conf = apr_hash_get(fcgi_authn_providers, prov, APR_HASH_KEY_STRING);
Packit 90a5c9
    if (!conf) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
Packit 90a5c9
                      APLOGNO(02526) "%s: can't find config for provider %s",
Packit 90a5c9
                      fn, prov);
Packit 90a5c9
        return AUTH_GENERAL_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (APLOGrdebug(r)) {
Packit 90a5c9
        log_provider_info(conf, r);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    req_rsp(r, conf, password, 
Packit 90a5c9
            /* combined authn and authz: FCGI_APACHE_ROLE not set */
Packit 90a5c9
            conf->is_authz ? NULL : AP_FCGI_APACHE_ROLE_AUTHENTICATOR_STR,
Packit 90a5c9
            NULL, NULL);
Packit 90a5c9
Packit 90a5c9
    if (r->status == HTTP_OK) {
Packit 90a5c9
        if (conf->is_authz) {
Packit 90a5c9
            /* combined authn/authz phase, so app won't be invoked for authz
Packit 90a5c9
             *
Packit 90a5c9
             * Remember that the request was successfully authorized by this
Packit 90a5c9
             * provider.
Packit 90a5c9
             */
Packit 90a5c9
            fcgi_request_notes *rnotes = apr_palloc(r->pool, sizeof(*rnotes));
Packit 90a5c9
            rnotes->successful_authnz_provider = conf->name;
Packit 90a5c9
            ap_set_module_config(r->request_config, &authnz_fcgi_module,
Packit 90a5c9
                                 rnotes);
Packit 90a5c9
        }
Packit 90a5c9
        return AUTH_GRANTED;
Packit 90a5c9
    }
Packit 90a5c9
    else if (r->status == HTTP_INTERNAL_SERVER_ERROR) {
Packit 90a5c9
        return AUTH_GENERAL_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        return AUTH_DENIED;
Packit 90a5c9
    }
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static const authn_provider fcgi_authn_provider = {
Packit 90a5c9
    &fcgi_check_password,
Packit 90a5c9
    NULL /* get-realm-hash not supported */
Packit 90a5c9
};
Packit 90a5c9
Packit 90a5c9
static authz_status fcgi_authz_check(request_rec *r,
Packit 90a5c9
                                     const char *require_line,
Packit 90a5c9
                                     const void *parsed_require_line)
Packit 90a5c9
{
Packit 90a5c9
    const char *fn = "fcgi_authz_check";
Packit 90a5c9
    const char *prov = apr_table_get(r->notes, AUTHZ_PROVIDER_NAME_NOTE);
Packit 90a5c9
    const fcgi_provider_conf *conf;
Packit 90a5c9
Packit 90a5c9
    ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
Packit 90a5c9
                  APLOGNO(02527) "%s(%s)", fn, require_line);
Packit 90a5c9
Packit 90a5c9
    if (!prov) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
Packit 90a5c9
                      APLOGNO(02528) "%s: provider note isn't set", fn);
Packit 90a5c9
        return AUTHZ_GENERAL_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    conf = apr_hash_get(fcgi_authz_providers, prov, APR_HASH_KEY_STRING);
Packit 90a5c9
    if (!conf) {
Packit 90a5c9
        ap_log_rerror(APLOG_MARK, APLOG_CRIT, 0, r,
Packit 90a5c9
                      APLOGNO(02529) "%s: can't find config for provider %s",
Packit 90a5c9
                      fn, prov);
Packit 90a5c9
        return AUTHZ_GENERAL_ERROR;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (APLOGrdebug(r)) {
Packit 90a5c9
        log_provider_info(conf, r);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (!r->user) {
Packit 90a5c9
        return AUTHZ_DENIED_NO_USER;
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (conf->is_authn) {
Packit 90a5c9
        /* combined authn/authz phase, so app won't be invoked for authz
Packit 90a5c9
         *
Packit 90a5c9
         * If the provider already successfully authorized this request, 
Packit 90a5c9
         * success.
Packit 90a5c9
         */
Packit 90a5c9
        fcgi_request_notes *rnotes = ap_get_module_config(r->request_config,
Packit 90a5c9
                                                        &authnz_fcgi_module);
Packit 90a5c9
        if (rnotes
Packit 90a5c9
            && rnotes->successful_authnz_provider
Packit 90a5c9
            && !strcmp(rnotes->successful_authnz_provider, conf->name)) {
Packit 90a5c9
            return AUTHZ_GRANTED;
Packit 90a5c9
        }
Packit 90a5c9
        else {
Packit 90a5c9
            return AUTHZ_DENIED;
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        req_rsp(r, conf, NULL, AP_FCGI_APACHE_ROLE_AUTHORIZER_STR, NULL, NULL);
Packit 90a5c9
Packit 90a5c9
        if (r->status == HTTP_OK) {
Packit 90a5c9
            return AUTHZ_GRANTED;
Packit 90a5c9
        }
Packit 90a5c9
        else if (r->status == HTTP_INTERNAL_SERVER_ERROR) {
Packit 90a5c9
            return AUTHZ_GENERAL_ERROR;
Packit 90a5c9
        }
Packit 90a5c9
        else {
Packit 90a5c9
            return AUTHZ_DENIED;
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static const char *fcgi_authz_parse(cmd_parms *cmd, const char *require_line,
Packit 90a5c9
                                    const void **parsed_require_line)
Packit 90a5c9
{
Packit 90a5c9
    /* Allowed form: Require [not] registered-provider-name<EOS>
Packit 90a5c9
     */
Packit 90a5c9
    if (strcmp(require_line, "")) {
Packit 90a5c9
        return "mod_authnz_fcgi doesn't support restrictions on providers "
Packit 90a5c9
               "(i.e., multiple require args)";
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return NULL;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static const authz_provider fcgi_authz_provider = {
Packit 90a5c9
    &fcgi_authz_check,
Packit 90a5c9
    &fcgi_authz_parse,
Packit 90a5c9
};
Packit 90a5c9
Packit 90a5c9
static const char *fcgi_check_authn_provider(cmd_parms *cmd,
Packit 90a5c9
                                        void *d,
Packit 90a5c9
                                        int argc,
Packit 90a5c9
                                        char *const argv[])
Packit 90a5c9
{
Packit 90a5c9
    const char *dname = "AuthnzFcgiCheckAuthnProvider";
Packit 90a5c9
    fcgi_dir_conf *dc = d;
Packit 90a5c9
    int ca = 0;
Packit 90a5c9
Packit 90a5c9
    if (ca >= argc) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool, dname, ": No provider given", NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    dc->name = argv[ca];
Packit 90a5c9
    ca++;
Packit 90a5c9
Packit 90a5c9
    if (!strcasecmp(dc->name, "None")) {
Packit 90a5c9
        if (ca < argc) {
Packit 90a5c9
            return "Options aren't supported with \"None\"";
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    while (ca < argc) {
Packit 90a5c9
        const char *var = argv[ca], *val;
Packit 90a5c9
        int badarg = 0;
Packit 90a5c9
Packit 90a5c9
        ca++;
Packit 90a5c9
Packit 90a5c9
        /* at present, everything needs an argument */
Packit 90a5c9
        if (ca >= argc) {
Packit 90a5c9
            return apr_pstrcat(cmd->pool, dname, ": ", var,
Packit 90a5c9
                               "needs an argument", NULL);
Packit 90a5c9
        }
Packit 90a5c9
Packit 90a5c9
        val = argv[ca];
Packit 90a5c9
        ca++;
Packit 90a5c9
Packit 90a5c9
        if (!strcasecmp(var, "Authoritative")) {
Packit 90a5c9
            if (!strcasecmp(val, "On")) {
Packit 90a5c9
                dc->authoritative = 1;
Packit 90a5c9
            }
Packit 90a5c9
            else if (!strcasecmp(val, "Off")) {
Packit 90a5c9
                dc->authoritative = 0;
Packit 90a5c9
            }
Packit 90a5c9
            else {
Packit 90a5c9
                badarg = 1;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        else if (!strcasecmp(var, "DefaultUser")) {
Packit 90a5c9
            dc->default_user = val;
Packit 90a5c9
        }
Packit 90a5c9
        else if (!strcasecmp(var, "RequireBasicAuth")) {
Packit 90a5c9
            if (!strcasecmp(val, "On")) {
Packit 90a5c9
                dc->require_basic_auth = 1;
Packit 90a5c9
            }
Packit 90a5c9
            else if (!strcasecmp(val, "Off")) {
Packit 90a5c9
                dc->require_basic_auth = 0;
Packit 90a5c9
            }
Packit 90a5c9
            else {
Packit 90a5c9
                badarg = 1;
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        else if (!strcasecmp(var, "UserExpr")) {
Packit 90a5c9
            const char *err;
Packit 90a5c9
            int flags = AP_EXPR_FLAG_DONT_VARY | AP_EXPR_FLAG_RESTRICTED
Packit 90a5c9
                | AP_EXPR_FLAG_STRING_RESULT;
Packit 90a5c9
Packit 90a5c9
            dc->user_expr = ap_expr_parse_cmd(cmd, val,
Packit 90a5c9
                                              flags, &err, NULL);
Packit 90a5c9
            if (err) {
Packit 90a5c9
                return apr_psprintf(cmd->pool, "%s: Error parsing '%s': '%s'",
Packit 90a5c9
                                    dname, val, err);
Packit 90a5c9
            }
Packit 90a5c9
        }
Packit 90a5c9
        else {
Packit 90a5c9
            return apr_pstrcat(cmd->pool, dname, ": Unexpected option '",
Packit 90a5c9
                               var, "'", NULL);
Packit 90a5c9
        }
Packit 90a5c9
        if (badarg) {
Packit 90a5c9
            return apr_pstrcat(cmd->pool, dname, ": Bad argument '",
Packit 90a5c9
                               val, "' to option '", var, "'", NULL);
Packit 90a5c9
        }
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return NULL;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
/* AuthnzFcgiAuthDefineProvider {authn|authz|authnz} provider-name \
Packit 90a5c9
 *   fcgi://backendhost:backendport/
Packit 90a5c9
 */
Packit 90a5c9
static const char *fcgi_define_provider(cmd_parms *cmd,
Packit 90a5c9
                                        void *d,
Packit 90a5c9
                                        int argc,
Packit 90a5c9
                                        char *const argv[])
Packit 90a5c9
{
Packit 90a5c9
    const char *dname = "AuthnzFcgiDefineProvider";
Packit 90a5c9
    ap_rxplus_t *fcgi_backend_regex;
Packit 90a5c9
    apr_status_t rv;
Packit 90a5c9
    char *host;
Packit 90a5c9
    const char *err, *stype;
Packit 90a5c9
    fcgi_provider_conf *conf = apr_pcalloc(cmd->pool, sizeof(*conf));
Packit 90a5c9
    int ca = 0, rc, port;
Packit 90a5c9
Packit 90a5c9
    fcgi_backend_regex = ap_rxplus_compile(cmd->pool, FCGI_BACKEND_REGEX_STR);
Packit 90a5c9
    if (!fcgi_backend_regex) {
Packit 90a5c9
        return apr_psprintf(cmd->pool,
Packit 90a5c9
                            "%s: failed to compile regexec '%s'",
Packit 90a5c9
                            dname, FCGI_BACKEND_REGEX_STR);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    err = ap_check_cmd_context(cmd, GLOBAL_ONLY);
Packit 90a5c9
    if (err)
Packit 90a5c9
        return err;
Packit 90a5c9
Packit 90a5c9
    if (ca >= argc) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool, dname, ": No type given", NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    stype = argv[ca];
Packit 90a5c9
    ca++;
Packit 90a5c9
Packit 90a5c9
    if (!strcasecmp(stype, "authn")) {
Packit 90a5c9
        conf->is_authn = 1;
Packit 90a5c9
    }
Packit 90a5c9
    else if (!strcasecmp(stype, "authz")) {
Packit 90a5c9
        conf->is_authz = 1;
Packit 90a5c9
    }
Packit 90a5c9
    else if (!strcasecmp(stype, "authnz")) {
Packit 90a5c9
        conf->is_authn = conf->is_authz = 1;
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        return apr_pstrcat(cmd->pool,
Packit 90a5c9
                           dname,
Packit 90a5c9
                           ": Invalid provider type ",
Packit 90a5c9
                           stype,
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (ca >= argc) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool, dname, ": No provider name given", NULL);
Packit 90a5c9
    }
Packit 90a5c9
    conf->name = argv[ca];
Packit 90a5c9
    ca++;
Packit 90a5c9
Packit 90a5c9
    if (ca >= argc) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool, dname, ": No backend-address given",
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    rc = ap_rxplus_exec(cmd->pool, fcgi_backend_regex, argv[ca], NULL);
Packit 90a5c9
    if (!rc || ap_rxplus_nmatch(fcgi_backend_regex) != 3) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool,
Packit 90a5c9
                           dname, ": backend-address '",
Packit 90a5c9
                           argv[ca],
Packit 90a5c9
                           "' has invalid form",
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    host = ap_rxplus_pmatch(cmd->pool, fcgi_backend_regex, 1);
Packit 90a5c9
    if (host[0] == '[' && host[strlen(host) - 1] == ']') {
Packit 90a5c9
        host += 1;
Packit 90a5c9
        host[strlen(host) - 1] = '\0';
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    port = atoi(ap_rxplus_pmatch(cmd->pool, fcgi_backend_regex, 2));
Packit 90a5c9
    if (port > 65535) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool,
Packit 90a5c9
                           dname, ": backend-address '",
Packit 90a5c9
                           argv[ca],
Packit 90a5c9
                           "' has invalid port",
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    conf->backend = argv[ca];
Packit 90a5c9
    conf->host = host;
Packit 90a5c9
    conf->port = port;
Packit 90a5c9
    ca++;
Packit 90a5c9
Packit 90a5c9
    rv = apr_sockaddr_info_get(&conf->backend_addrs, conf->host,
Packit 90a5c9
                               APR_UNSPEC, conf->port, 0, cmd->pool);
Packit 90a5c9
    if (rv != APR_SUCCESS) {
Packit 90a5c9
        ap_log_error(APLOG_MARK, APLOG_STARTUP|APLOG_CRIT, rv, NULL,
Packit 90a5c9
                     APLOGNO(02530) "Address %s could not be resolved",
Packit 90a5c9
                     conf->backend);
Packit 90a5c9
        return apr_pstrcat(cmd->pool,
Packit 90a5c9
                           dname,
Packit 90a5c9
                           ": Error resolving backend address",
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (ca != argc) {
Packit 90a5c9
        return apr_pstrcat(cmd->pool,
Packit 90a5c9
                           dname,
Packit 90a5c9
                           ": Unexpected parameter ",
Packit 90a5c9
                           argv[ca],
Packit 90a5c9
                           NULL);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (conf->is_authn) {
Packit 90a5c9
        apr_hash_set(fcgi_authn_providers, conf->name, APR_HASH_KEY_STRING,
Packit 90a5c9
                     conf);
Packit 90a5c9
        ap_register_auth_provider(cmd->pool, AUTHN_PROVIDER_GROUP,
Packit 90a5c9
                                  conf->name,
Packit 90a5c9
                                  AUTHN_PROVIDER_VERSION,
Packit 90a5c9
                                  &fcgi_authn_provider,
Packit 90a5c9
                                  AP_AUTH_INTERNAL_PER_CONF);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    if (conf->is_authz) {
Packit 90a5c9
        apr_hash_set(fcgi_authz_providers, conf->name, APR_HASH_KEY_STRING,
Packit 90a5c9
                     conf);
Packit 90a5c9
        ap_register_auth_provider(cmd->pool, AUTHZ_PROVIDER_GROUP,
Packit 90a5c9
                                  conf->name,
Packit 90a5c9
                                  AUTHZ_PROVIDER_VERSION,
Packit 90a5c9
                                  &fcgi_authz_provider,
Packit 90a5c9
                                  AP_AUTH_INTERNAL_PER_CONF);
Packit 90a5c9
    }
Packit 90a5c9
Packit 90a5c9
    return NULL;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static const command_rec fcgi_cmds[] = {
Packit 90a5c9
    AP_INIT_TAKE_ARGV("AuthnzFcgiDefineProvider", 
Packit 90a5c9
                      fcgi_define_provider,
Packit 90a5c9
                      NULL,
Packit 90a5c9
                      RSRC_CONF,
Packit 90a5c9
                      "Define a FastCGI authn and/or authz provider"),
Packit 90a5c9
Packit 90a5c9
    AP_INIT_TAKE_ARGV("AuthnzFcgiCheckAuthnProvider",
Packit 90a5c9
                      fcgi_check_authn_provider,
Packit 90a5c9
                      NULL,
Packit 90a5c9
                      OR_FILEINFO,
Packit 90a5c9
                      "Enable/disable a FastCGI authorizer to handle "
Packit 90a5c9
                      "check_authn phase"),
Packit 90a5c9
Packit 90a5c9
    {NULL}
Packit 90a5c9
};
Packit 90a5c9
Packit 90a5c9
static int fcgi_pre_config(apr_pool_t *pconf, apr_pool_t *plog,
Packit 90a5c9
                           apr_pool_t *ptemp)
Packit 90a5c9
{
Packit 90a5c9
    fcgi_authn_providers = apr_hash_make(pconf);
Packit 90a5c9
    fcgi_authz_providers = apr_hash_make(pconf);
Packit 90a5c9
Packit 90a5c9
    return OK;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void fcgi_register_hooks(apr_pool_t *p)
Packit 90a5c9
{
Packit 90a5c9
    static const char * const auth_basic_runs_after_me[] = 
Packit 90a5c9
        {"mod_auth_basic.c", NULL}; /* to allow for custom response */
Packit 90a5c9
Packit 90a5c9
    ap_hook_pre_config(fcgi_pre_config, NULL, NULL, APR_HOOK_MIDDLE);
Packit 90a5c9
    ap_hook_check_authn(fcgi_check_authn, NULL, auth_basic_runs_after_me,
Packit 90a5c9
                        APR_HOOK_MIDDLE, AP_AUTH_INTERNAL_PER_CONF);
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void *create_dir_conf(apr_pool_t *p, char *dummy)
Packit 90a5c9
{
Packit 90a5c9
    fcgi_dir_conf *dconf = apr_pcalloc(p, sizeof(fcgi_dir_conf));
Packit 90a5c9
Packit 90a5c9
    dconf->authoritative = 1;
Packit 90a5c9
    return dconf;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
static void *merge_dir_conf(apr_pool_t *p, void *basev, void *overridesv)
Packit 90a5c9
{
Packit 90a5c9
    fcgi_dir_conf *a = (fcgi_dir_conf *)apr_pcalloc(p, sizeof(*a));
Packit 90a5c9
    fcgi_dir_conf *base = (fcgi_dir_conf *)basev, 
Packit 90a5c9
        *over = (fcgi_dir_conf *)overridesv;
Packit 90a5c9
Packit 90a5c9
    /* currently we just have a single directive applicable to a 
Packit 90a5c9
     * directory, so if it is set then grab all fields from fcgi_dir_conf
Packit 90a5c9
     */
Packit 90a5c9
    if (over->name) {
Packit 90a5c9
        memcpy(a, over, sizeof(*a));
Packit 90a5c9
    }
Packit 90a5c9
    else {
Packit 90a5c9
        memcpy(a, base, sizeof(*a));
Packit 90a5c9
    }
Packit 90a5c9
    
Packit 90a5c9
    return a;
Packit 90a5c9
}
Packit 90a5c9
Packit 90a5c9
AP_DECLARE_MODULE(authnz_fcgi) =
Packit 90a5c9
{
Packit 90a5c9
    STANDARD20_MODULE_STUFF,
Packit 90a5c9
    create_dir_conf,                 /* dir config creater */
Packit 90a5c9
    merge_dir_conf,                  /* dir merger */
Packit 90a5c9
    NULL,                            /* server config */
Packit 90a5c9
    NULL,                            /* merge server config */
Packit 90a5c9
    fcgi_cmds,                       /* command apr_table_t */
Packit 90a5c9
    fcgi_register_hooks              /* register hooks */
Packit 90a5c9
};