/* * Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License. */ #include "ap_config.h" #include "ap_mmn.h" #include "apr_strings.h" #include "apr_hash.h" #include "apr_lib.h" #include "apr_tables.h" #include "apr_version.h" #include "http_main.h" #include "httpd.h" #include "http_config.h" #include "fcgid_global.h" #include "fcgid_conf.h" #ifndef DEFAULT_REL_RUNTIMEDIR /* Win32, etc. */ #define DEFAULT_REL_RUNTIMEDIR "logs" #endif #define DEFAULT_IDLE_TIMEOUT 300 #define DEFAULT_IDLE_SCAN_INTERVAL 120 #define DEFAULT_BUSY_TIMEOUT 300 #define DEFAULT_BUSY_SCAN_INTERVAL 120 #define DEFAULT_ERROR_SCAN_INTERVAL 3 #define DEFAULT_ZOMBIE_SCAN_INTERVAL 3 #define DEFAULT_PROC_LIFETIME (60*60) #define DEFAULT_SOCKET_PREFIX DEFAULT_REL_RUNTIMEDIR "/fcgidsock" #define DEFAULT_SHM_PATH DEFAULT_REL_RUNTIMEDIR "/fcgid_shm" #define DEFAULT_SPAWNSOCRE_UPLIMIT 10 #define DEFAULT_SPAWN_SCORE 1 #define DEFAULT_TERMINATION_SCORE 2 #define DEFAULT_TIME_SCORE 1 #define DEFAULT_MAX_PROCESS_COUNT 1000 #define DEFAULT_MAX_CLASS_PROCESS_COUNT 100 #define DEFAULT_MIN_CLASS_PROCESS_COUNT 3 #define DEFAULT_IPC_CONNECT_TIMEOUT 3 #define DEFAULT_IPC_COMM_TIMEOUT 40 #define DEFAULT_OUTPUT_BUFFERSIZE 65536 #define DEFAULT_MAX_REQUESTS_PER_PROCESS 0 /* by default, allow spooling of request bodies up to * 128k (first 64k in memory) */ #define DEFAULT_MAX_REQUEST_LEN (1024*128) #define DEFAULT_MAX_MEM_REQUEST_LEN (1024*64) #define DEFAULT_WRAPPER_KEY "ALL" #define WRAPPER_FLAG_VIRTUAL "virtual" void *create_fcgid_server_config(apr_pool_t * p, server_rec * s) { fcgid_server_conf *config = apr_pcalloc(p, sizeof(*config)); static int vhost_id = 0; /* allow vhost comparison even when some mass-vhost module * makes a copy of the server_rec to override docroot or * other such settings */ ++vhost_id; config->vhost_id = vhost_id; if (!s->is_virtual) { config->busy_scan_interval = DEFAULT_BUSY_SCAN_INTERVAL; config->error_scan_interval = DEFAULT_ERROR_SCAN_INTERVAL; config->idle_scan_interval = DEFAULT_IDLE_SCAN_INTERVAL; config->max_process_count = DEFAULT_MAX_PROCESS_COUNT; config->shmname_path = ap_server_root_relative(p, DEFAULT_SHM_PATH); config->sockname_prefix = ap_server_root_relative(p, DEFAULT_SOCKET_PREFIX); config->spawn_score = DEFAULT_SPAWN_SCORE; config->spawnscore_uplimit = DEFAULT_SPAWNSOCRE_UPLIMIT; config->termination_score = DEFAULT_TERMINATION_SCORE; config->time_score = DEFAULT_TIME_SCORE; config->zombie_scan_interval = DEFAULT_ZOMBIE_SCAN_INTERVAL; } /* Redundant; pcalloc creates this structure; * config->default_init_env = NULL; * config->pass_headers = NULL; * config->php_fix_pathinfo_enable = 0; * config->*_set = 0; */ config->cmdopts_hash = apr_hash_make(p); config->ipc_comm_timeout = DEFAULT_IPC_COMM_TIMEOUT; config->ipc_connect_timeout = DEFAULT_IPC_CONNECT_TIMEOUT; config->max_mem_request_len = DEFAULT_MAX_MEM_REQUEST_LEN; config->max_request_len = DEFAULT_MAX_REQUEST_LEN; config->max_requests_per_process = DEFAULT_MAX_REQUESTS_PER_PROCESS; config->output_buffersize = DEFAULT_OUTPUT_BUFFERSIZE; config->max_class_process_count = DEFAULT_MAX_CLASS_PROCESS_COUNT; config->min_class_process_count = DEFAULT_MIN_CLASS_PROCESS_COUNT; config->busy_timeout = DEFAULT_BUSY_TIMEOUT; config->idle_timeout = DEFAULT_IDLE_TIMEOUT; config->proc_lifetime = DEFAULT_PROC_LIFETIME; return config; } #define MERGE_SCALAR(base, local, merged, field) \ if (!(local)->field##_set) { \ merged->field = base->field; \ } void *merge_fcgid_server_config(apr_pool_t * p, void *basev, void *locv) { fcgid_server_conf *base = (fcgid_server_conf *) basev; fcgid_server_conf *local = (fcgid_server_conf *) locv; fcgid_server_conf *merged = (fcgid_server_conf *) apr_pmemdup(p, local, sizeof(fcgid_server_conf)); merged->cmdopts_hash = apr_hash_overlay(p, local->cmdopts_hash, base->cmdopts_hash); /* Merge environment variables */ if (base->default_init_env == NULL) { /* merged already set to local */ } else if (local->default_init_env == NULL) { merged->default_init_env = base->default_init_env; } else { merged->default_init_env = apr_table_copy(p, base->default_init_env); apr_table_overlap(merged->default_init_env, local->default_init_env, APR_OVERLAP_TABLES_SET); } /* Merge pass headers */ if (base->pass_headers == NULL) { /* merged already set to local */ } else if (local->pass_headers == NULL) { merged->pass_headers = base->pass_headers; } else { merged->pass_headers = apr_array_append(p, base->pass_headers, local->pass_headers); } /* Merge the scalar settings */ MERGE_SCALAR(base, local, merged, ipc_comm_timeout); MERGE_SCALAR(base, local, merged, ipc_connect_timeout); MERGE_SCALAR(base, local, merged, max_mem_request_len); MERGE_SCALAR(base, local, merged, max_request_len); MERGE_SCALAR(base, local, merged, max_requests_per_process); MERGE_SCALAR(base, local, merged, output_buffersize); MERGE_SCALAR(base, local, merged, max_class_process_count); MERGE_SCALAR(base, local, merged, min_class_process_count); MERGE_SCALAR(base, local, merged, busy_timeout); MERGE_SCALAR(base, local, merged, idle_timeout); MERGE_SCALAR(base, local, merged, proc_lifetime); return merged; } void *create_fcgid_dir_config(apr_pool_t * p, char *dummy) { fcgid_dir_conf *config = apr_pcalloc(p, sizeof(fcgid_dir_conf)); config->wrapper_info_hash = apr_hash_make(p); /* config->authenticator_info = NULL; */ config->authenticator_authoritative = 1; /* config->authorizer_info = NULL; */ config->authorizer_authoritative = 1; /* config->access_info = NULL; */ config->access_authoritative = 1; return (void *) config; } void *merge_fcgid_dir_config(apr_pool_t *p, void *basev, void *locv) { fcgid_dir_conf *base = (fcgid_dir_conf *) basev; fcgid_dir_conf *local = (fcgid_dir_conf *) locv; fcgid_dir_conf *merged = (fcgid_dir_conf *) apr_pmemdup(p, local, sizeof(fcgid_dir_conf)); merged->wrapper_info_hash = apr_hash_overlay(p, local->wrapper_info_hash, base->wrapper_info_hash); if (!local->authenticator_info) { merged->authenticator_info = base->authenticator_info; } if (!local->authorizer_info) { merged->authorizer_info = base->authorizer_info; } if (!local->access_info) { merged->access_info = base->access_info; } MERGE_SCALAR(base, local, merged, authenticator_authoritative); MERGE_SCALAR(base, local, merged, authorizer_authoritative); MERGE_SCALAR(base, local, merged, access_authoritative); return merged; } const char *set_idle_timeout(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->idle_timeout = atol(arg); config->idle_timeout_set = 1; return NULL; } const char *set_idle_scan_interval(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->idle_scan_interval = atol(arg); return NULL; } const char *set_busy_timeout(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->busy_timeout = atol(arg); config->busy_timeout_set = 1; return NULL; } const char *set_busy_scan_interval(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->busy_scan_interval = atol(arg); return NULL; } const char *set_proc_lifetime(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->proc_lifetime = atol(arg); config->proc_lifetime_set = 1; return NULL; } const char *set_error_scan_interval(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->error_scan_interval = atol(arg); return NULL; } const char *set_zombie_scan_interval(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->zombie_scan_interval = atol(arg); return NULL; } const char *set_socketpath(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->sockname_prefix = ap_server_root_relative(cmd->pool, arg); if (!config->sockname_prefix) return "Invalid socket path"; return NULL; } const char *set_shmpath(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->shmname_path = ap_server_root_relative(cmd->pool, arg); if (!config->shmname_path) return "Invalid shmname path"; return NULL; } const char *set_spawnscore_uplimit(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->spawnscore_uplimit = atol(arg); return NULL; } static int strtoff(apr_off_t *val, const char *arg) { char *errp; #if APR_MAJOR_VERSION < 1 *val = (apr_off_t)strtol(arg, &errp, 10); if (*errp) { return 1; } #else if (APR_SUCCESS != apr_strtoff(val, arg, &errp, 10) || *errp) { return 1; } #endif return 0; } const char *set_max_request_len(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); if (strtoff(&config->max_request_len, arg) || config->max_request_len < 0) { return "FcgidMaxRequestLen requires a non-negative integer."; } config->max_request_len_set = 1; return NULL; } const char *set_max_mem_request_len(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->max_mem_request_len = atol(arg); config->max_mem_request_len_set = 1; return NULL; } const char *set_spawn_score(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->spawn_score = atol(arg); return NULL; } const char *set_time_score(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->time_score = atol(arg); return NULL; } const char *set_termination_score(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->termination_score = atol(arg); return NULL; } const char *set_max_process(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->max_process_count = atol(arg); return NULL; } const char *set_output_buffersize(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->output_buffersize = atol(arg); config->output_buffersize_set = 1; return NULL; } const char *set_max_class_process(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->max_class_process_count = atol(arg); config->max_class_process_count_set = 1; return NULL; } const char *set_min_class_process(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->min_class_process_count = atol(arg); config->min_class_process_count_set = 1; return NULL; } const char *set_php_fix_pathinfo_enable(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } config->php_fix_pathinfo_enable = atol(arg); return NULL; } const char *set_max_requests_per_process(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); if ((config->max_requests_per_process = atol(arg)) == -1) { config->max_requests_per_process = 0; } config->max_requests_per_process_set = 1; return NULL; } const char *set_ipc_connect_timeout(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->ipc_connect_timeout = atol(arg); config->ipc_connect_timeout_set = 1; return NULL; } const char *set_ipc_comm_timeout(cmd_parms * cmd, void *dummy, const char *arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); config->ipc_comm_timeout = atol(arg); if (config->ipc_comm_timeout <= 0) { return "FcgidIOTimeout must be greater than 0"; } config->ipc_comm_timeout_set = 1; return NULL; } static void add_envvar_to_table(apr_table_t *t, apr_pool_t *p, const char *name, const char *value) { #if defined(WIN32) || defined(OS2) || defined(NETWARE) /* Case insensitive environment platforms */ char *pstr; for (name = pstr = apr_pstrdup(p, name); *pstr; ++pstr) { *pstr = apr_toupper(*pstr); } #endif apr_table_set(t, name, value ? value : ""); } const char *add_default_env_vars(cmd_parms * cmd, void *dummy, const char *name, const char *value) { fcgid_server_conf *config = ap_get_module_config(cmd->server->module_config, &fcgid_module); if (config->default_init_env == NULL) config->default_init_env = apr_table_make(cmd->pool, 20); add_envvar_to_table(config->default_init_env, cmd->pool, name, value); return NULL; } const char *add_pass_headers(cmd_parms * cmd, void *dummy, const char *names) { const char **header; fcgid_server_conf *config = ap_get_module_config(cmd->server->module_config, &fcgid_module); if (config->pass_headers == NULL) config->pass_headers = apr_array_make(cmd->pool, 10, sizeof(const char *)); header = (const char **) apr_array_push(config->pass_headers); *header = ap_getword_conf(cmd->pool, &names); return header ? NULL : "Invalid PassHeaders"; } apr_array_header_t *get_pass_headers(request_rec * r) { fcgid_server_conf *config = ap_get_module_config(r->server->module_config, &fcgid_module); return config->pass_headers; } static const char *missing_file_msg(apr_pool_t *p, const char *filetype, const char *filename, apr_status_t rv) { char errbuf[120]; apr_strerror(rv, errbuf, sizeof errbuf); return apr_psprintf(p, "%s %s cannot be accessed: (%d)%s", filetype, filename, rv, errbuf); } const char *set_authenticator_info(cmd_parms * cmd, void *config, const char *authenticator) { apr_status_t rv; apr_finfo_t finfo; fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; char **args; /* Get wrapper path */ apr_tokenize_to_argv(authenticator, &args, cmd->temp_pool); if (*args == NULL || **args == '\0') return "Invalid authenticator config"; /* Fetch only required file details inode + device */ if ((rv = apr_stat(&finfo, args[0], APR_FINFO_IDENT, cmd->temp_pool)) != APR_SUCCESS) { return missing_file_msg(cmd->pool, "Authenticator", authenticator, rv); } /* Create the wrapper node */ dirconfig->authenticator_info = apr_pcalloc(cmd->server->process->pconf, sizeof(*dirconfig->authenticator_info)); dirconfig->authenticator_info->cgipath = apr_pstrdup(cmd->pool, args[0]); dirconfig->authenticator_info->cmdline = authenticator; dirconfig->authenticator_info->inode = finfo.inode; dirconfig->authenticator_info->deviceid = finfo.device; return NULL; } const char *set_authenticator_authoritative(cmd_parms * cmd, void *config, int arg) { fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; dirconfig->authenticator_authoritative = arg; dirconfig->authenticator_authoritative_set = 1; return NULL; } fcgid_cmd_conf *get_authenticator_info(request_rec * r, int *authoritative) { fcgid_dir_conf *config = ap_get_module_config(r->per_dir_config, &fcgid_module); if (config != NULL && config->authenticator_info != NULL) { *authoritative = config->authenticator_authoritative; return config->authenticator_info; } return NULL; } const char *set_authorizer_info(cmd_parms * cmd, void *config, const char *authorizer) { apr_status_t rv; apr_finfo_t finfo; fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; char **args; /* Get wrapper path */ apr_tokenize_to_argv(authorizer, &args, cmd->temp_pool); if (*args == NULL || **args == '\0') return "Invalid authorizer config"; /* Fetch only required file details inode + device */ if ((rv = apr_stat(&finfo, args[0], APR_FINFO_IDENT, cmd->temp_pool)) != APR_SUCCESS) { return missing_file_msg(cmd->pool, "Authorizer", authorizer, rv); } /* Create the wrapper node */ dirconfig->authorizer_info = apr_pcalloc(cmd->server->process->pconf, sizeof(*dirconfig->authorizer_info)); dirconfig->authorizer_info->cgipath = apr_pstrdup(cmd->pool, args[0]); dirconfig->authorizer_info->cmdline = authorizer; dirconfig->authorizer_info->inode = finfo.inode; dirconfig->authorizer_info->deviceid = finfo.device; return NULL; } const char *set_authorizer_authoritative(cmd_parms * cmd, void *config, int arg) { fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; dirconfig->authorizer_authoritative = arg; dirconfig->authorizer_authoritative_set = 1; return NULL; } fcgid_cmd_conf *get_authorizer_info(request_rec * r, int *authoritative) { fcgid_dir_conf *config = ap_get_module_config(r->per_dir_config, &fcgid_module); if (config != NULL && config->authorizer_info != NULL) { *authoritative = config->authorizer_authoritative; return config->authorizer_info; } return NULL; } const char *set_access_info(cmd_parms * cmd, void *config, const char *access) { apr_status_t rv; apr_finfo_t finfo; fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; char **args; /* Get wrapper path */ apr_tokenize_to_argv(access, &args, cmd->temp_pool); if (*args == NULL || **args == '\0') return "Invalid access config"; /* Fetch only required file details inode + device */ if ((rv = apr_stat(&finfo, args[0], APR_FINFO_IDENT, cmd->temp_pool)) != APR_SUCCESS) { return missing_file_msg(cmd->pool, "Access checker", access, rv); } /* Create the wrapper node */ dirconfig->access_info = apr_pcalloc(cmd->server->process->pconf, sizeof(*dirconfig->access_info)); dirconfig->access_info->cgipath = apr_pstrdup(cmd->pool, args[0]); dirconfig->access_info->cmdline = access; dirconfig->access_info->inode = finfo.inode; dirconfig->access_info->deviceid = finfo.device; return NULL; } const char *set_access_authoritative(cmd_parms * cmd, void *config, int arg) { fcgid_dir_conf *dirconfig = (fcgid_dir_conf *) config; dirconfig->access_authoritative = arg; dirconfig->access_authoritative_set = 1; return NULL; } fcgid_cmd_conf *get_access_info(request_rec * r, int *authoritative) { fcgid_dir_conf *config = ap_get_module_config(r->per_dir_config, &fcgid_module); if (config != NULL && config->access_info != NULL) { *authoritative = config->access_authoritative; return config->access_info; } return NULL; } #ifdef WIN32 /* FcgidWin32PreventOrphans * * When Apache process gets recycled or shutdown abruptly, CGI processes * spawned by mod_fcgid will get orphaned. Orphaning happens mostly when * Apache worker threads take more than 30 seconds to exit gracefully. * * Apache when run as windows service during shutdown/restart of service * process (master/parent) will terminate child httpd process within 30 * seconds (refer \server\mpm\winnt\mpm_winnt.c:master_main() * int timeout = 30000; ~line#1142), therefore if Apache worker threads * are too busy to react to Master's graceful exit signal within 30 seconds * mod_fcgid cleanup routines will not get invoked (refer child_main() * \server\mpm\winnt\child.c: apr_pool_destroy(pchild); ~line#2275) * thereby orphaning all mod_fcgid spwaned CGI processes. Therefore we utilize * Win32 JobObjects to clean up child processes automatically so that CGI * processes are force-killed by win32 during abnormal mod_fcgid termination. * */ const char *set_win32_prevent_process_orphans(cmd_parms *cmd, void *dummy, int arg) { server_rec *s = cmd->server; fcgid_server_conf *config = ap_get_module_config(s->module_config, &fcgid_module); const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); #define SETUP_ERR_MSG "Error enabling CGI process orphan prevention" if (err != NULL) { return err; } if (arg && config->hJobObjectForAutoCleanup == NULL) { /* Create Win32 job object to prevent CGI process oprhaning */ JOBOBJECT_EXTENDED_LIMIT_INFORMATION job_info = { 0 }; config->hJobObjectForAutoCleanup = CreateJobObject(NULL, NULL); if (config->hJobObjectForAutoCleanup == NULL) { ap_log_perror(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, apr_get_os_error(), cmd->pool, "mod_fcgid: unable to create job object."); return SETUP_ERR_MSG; } /* Set job info so that all spawned CGI processes are associated * with mod_fcgid */ job_info.BasicLimitInformation.LimitFlags = JOB_OBJECT_LIMIT_KILL_ON_JOB_CLOSE; if (SetInformationJobObject(config->hJobObjectForAutoCleanup, JobObjectExtendedLimitInformation, &job_info, sizeof(job_info)) == 0) { ap_log_perror(APLOG_MARK, APLOG_STARTUP|APLOG_ERR, apr_get_os_error(), cmd->pool, "mod_fcgid: unable to set job object information."); CloseHandle(config->hJobObjectForAutoCleanup); config->hJobObjectForAutoCleanup = NULL; return SETUP_ERR_MSG; } } return NULL; } #endif /* WIN32*/ const char *set_wrapper_config(cmd_parms * cmd, void *dirconfig, const char *wrapper_cmdline, const char *extension, const char *virtual) { const char *path; apr_status_t rv; apr_finfo_t finfo; fcgid_cmd_conf *wrapper = NULL; fcgid_dir_conf *config = (fcgid_dir_conf *) dirconfig; char **args; /* Sanity checks */ if (virtual == NULL && extension != NULL && !strcasecmp(extension, WRAPPER_FLAG_VIRTUAL)) { virtual = WRAPPER_FLAG_VIRTUAL; extension = NULL; } if (virtual != NULL && strcasecmp(virtual, WRAPPER_FLAG_VIRTUAL)) { return "Invalid wrapper flag"; } if (extension != NULL && (*extension != '.' || *(extension + 1) == '\0' || ap_strchr_c(extension, '/') || ap_strchr_c(extension, '\\'))) return "Invalid wrapper file extension"; /* Get wrapper path */ apr_tokenize_to_argv(wrapper_cmdline, &args, cmd->temp_pool); path = apr_pstrdup(cmd->pool, args[0]); if (path == NULL || *path == '\0') return "Invalid wrapper config"; /* Fetch only required file details inode + device */ if ((rv = apr_stat(&finfo, path, APR_FINFO_IDENT, cmd->temp_pool)) != APR_SUCCESS) { return missing_file_msg(cmd->pool, "Wrapper", path, rv); } wrapper = apr_pcalloc(cmd->pool, sizeof(*wrapper)); if (strlen(path) >= FCGID_PATH_MAX) { return "Executable path length exceeds compiled-in limit"; } wrapper->cgipath = apr_pstrdup(cmd->pool, path); if (strlen(wrapper_cmdline) >= FCGID_CMDLINE_MAX) { return "Command line length exceeds compiled-in limit"; } wrapper->cmdline = apr_pstrdup(cmd->pool, wrapper_cmdline); wrapper->inode = finfo.inode; wrapper->deviceid = finfo.device; wrapper->virtual = (virtual != NULL && !strcasecmp(virtual, WRAPPER_FLAG_VIRTUAL)); if (extension == NULL) extension = DEFAULT_WRAPPER_KEY; /* Add the node now */ /* If an extension is configured multiple times, the last directive wins. */ apr_hash_set(config->wrapper_info_hash, extension, strlen(extension), wrapper); return NULL; } fcgid_cmd_conf *get_wrapper_info(const char *cgipath, request_rec * r) { const char *extension; fcgid_cmd_conf *wrapper; fcgid_dir_conf *config = ap_get_module_config(r->per_dir_config, &fcgid_module); /* Get file name extension */ extension = ap_strrchr_c(cgipath, '.'); if (extension == NULL) extension = DEFAULT_WRAPPER_KEY; /* Search file name extension in per_dir_config */ if (config) { wrapper = apr_hash_get(config->wrapper_info_hash, extension, strlen(extension)); if (wrapper == NULL) wrapper = apr_hash_get(config->wrapper_info_hash, DEFAULT_WRAPPER_KEY, strlen(DEFAULT_WRAPPER_KEY)); return wrapper; } return NULL; } static int set_cmd_envvars(fcgid_cmd_env *cmdenv, apr_table_t *envvars) { const apr_array_header_t *envvars_arr; const apr_table_entry_t *envvars_entry; int i; int overflow = 0; if (envvars) { envvars_arr = apr_table_elts(envvars); envvars_entry = (apr_table_entry_t *) envvars_arr->elts; if (envvars_arr->nelts > INITENV_CNT) { overflow = envvars_arr->nelts - INITENV_CNT; } for (i = 0; i < envvars_arr->nelts && i < INITENV_CNT; ++i) { if (envvars_entry[i].key == NULL || envvars_entry[i].key[0] == '\0') break; apr_cpystrn(cmdenv->initenv_key[i], envvars_entry[i].key, INITENV_KEY_LEN); apr_cpystrn(cmdenv->initenv_val[i], envvars_entry[i].val, INITENV_VAL_LEN); } if (i < INITENV_CNT) { cmdenv->initenv_key[i][0] = '\0'; } } else { cmdenv->initenv_key[0][0] = '\0'; } return overflow; } const char *set_cmd_options(cmd_parms *cmd, void *dummy, const char *args) { server_rec *s = cmd->server; fcgid_server_conf *sconf = ap_get_module_config(s->module_config, &fcgid_module); const char *cmdname; fcgid_cmd_options *cmdopts; apr_table_t *envvars = NULL; int overflow; apr_finfo_t finfo; apr_status_t rv; cmdopts = apr_pcalloc(cmd->pool, sizeof *cmdopts); cmdopts->cmdenv = apr_pcalloc(cmd->pool, sizeof *cmdopts->cmdenv); cmdopts->busy_timeout = DEFAULT_BUSY_TIMEOUT; cmdopts->idle_timeout = DEFAULT_IDLE_TIMEOUT; cmdopts->ipc_comm_timeout = DEFAULT_IPC_COMM_TIMEOUT; cmdopts->ipc_connect_timeout = DEFAULT_IPC_CONNECT_TIMEOUT; cmdopts->max_class_process_count = DEFAULT_MAX_CLASS_PROCESS_COUNT; cmdopts->max_requests_per_process = DEFAULT_MAX_REQUESTS_PER_PROCESS; cmdopts->min_class_process_count = DEFAULT_MIN_CLASS_PROCESS_COUNT; cmdopts->proc_lifetime = DEFAULT_PROC_LIFETIME; /* via pcalloc: cmdopts->initenv_key[0][0] = '\0'; */ cmdname = ap_getword_conf(cmd->pool, &args); if (!strlen(cmdname)) { return "A command must be specified for FcgidCmdOptions"; } /* Test only for file existence */ rv = apr_stat(&finfo, cmdname, APR_FINFO_MIN, cmd->temp_pool); if (rv != APR_SUCCESS) { return missing_file_msg(cmd->pool, "Command", cmdname, rv); } if (!*args) { return "At least one option must be specified for FcgidCmdOptions"; } while (*args) { const char *option = ap_getword_conf(cmd->pool, &args); const char *val; /* TODO: Consider supporting BusyTimeout. */ if (!strcasecmp(option, "ConnectTimeout")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "ConnectTimeout must have an argument"; } cmdopts->ipc_connect_timeout = atoi(val); continue; } if (!strcasecmp(option, "IdleTimeout")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "IdleTimeout must have an argument"; } cmdopts->idle_timeout = atoi(val); continue; } if (!strcasecmp(option, "InitialEnv")) { char *name; char *eql; name = ap_getword_conf(cmd->pool, &args); if (!strlen(name)) { return "InitialEnv must have an argument"; } eql = strchr(name, '='); if (eql) { *eql = '\0'; ++eql; } if (!envvars) { envvars = apr_table_make(cmd->pool, 20); } add_envvar_to_table(envvars, cmd->pool, name, eql); continue; } if (!strcasecmp(option, "IOTimeout")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "IOTimeout must have an argument"; } cmdopts->ipc_comm_timeout = atoi(val); continue; } if (!strcasecmp(option, "MaxProcesses")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "MaxProcesses must have an argument"; } cmdopts->max_class_process_count = atoi(val); continue; } if (!strcasecmp(option, "MaxProcessLifetime")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "MaxProcessLifetime must have an argument"; } cmdopts->proc_lifetime = atoi(val); continue; } if (!strcasecmp(option, "MaxRequestsPerProcess")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "MaxRequestsPerProcess must have an argument"; } cmdopts->max_requests_per_process = atoi(val); continue; } if (!strcasecmp(option, "MinProcesses")) { val = ap_getword_conf(cmd->pool, &args); if (!strlen(val)) { return "MinProcesses must have an argument"; } cmdopts->min_class_process_count = atoi(val); continue; } return apr_psprintf(cmd->pool, "Invalid option for FcgidCmdOptions: %s", option); } if ((overflow = set_cmd_envvars(cmdopts->cmdenv, envvars)) != 0) { return apr_psprintf(cmd->pool, "mod_fcgid: environment variable table " "overflow; increase INITENV_CNT in fcgid_pm.h from" " %d to at least %d", INITENV_CNT, INITENV_CNT + overflow); } apr_hash_set(sconf->cmdopts_hash, cmdname, strlen(cmdname), cmdopts); return NULL; } void get_cmd_options(request_rec *r, const char *cmdpath, fcgid_cmd_options *cmdopts, fcgid_cmd_env *cmdenv) { fcgid_server_conf *sconf = ap_get_module_config(r->server->module_config, &fcgid_module); fcgid_cmd_options *cmd_specific = apr_hash_get(sconf->cmdopts_hash, cmdpath, strlen(cmdpath)); int overflow; if (cmd_specific) { /* ignore request context configuration */ *cmdopts = *cmd_specific; *cmdenv = *cmdopts->cmdenv; cmdopts->cmdenv = NULL; /* pick up configuration for values that can't be configured * on FcgidCmdOptions */ cmdopts->busy_timeout = sconf->busy_timeout; return; } cmdopts->busy_timeout = sconf->busy_timeout; cmdopts->idle_timeout = sconf->idle_timeout; cmdopts->ipc_comm_timeout = sconf->ipc_comm_timeout; cmdopts->ipc_connect_timeout = sconf->ipc_connect_timeout; cmdopts->max_class_process_count = sconf->max_class_process_count; cmdopts->max_requests_per_process = sconf->max_requests_per_process; cmdopts->min_class_process_count = sconf->min_class_process_count; cmdopts->proc_lifetime = sconf->proc_lifetime; if ((overflow = set_cmd_envvars(cmdenv, sconf->default_init_env)) != 0) { ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r, "mod_fcgid: %d environment variables dropped; increase " "INITENV_CNT in fcgid_pm.h from %d to at least %d", overflow, INITENV_CNT, INITENV_CNT + overflow); } cmdopts->cmdenv = NULL; }