/* Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License.
*/
/* * mod_dir.c: handle default index files, and trailing-/ redirects
*/
if (!d->index_names) {
d->index_names = apr_array_make(cmd->pool, 2, sizeof(char *));
}
t = arg; while ((w = ap_getword_conf(cmd->pool, &t)) && w[0]) { if (count == 0 && !strcasecmp(w, "disabled")) { /* peek to see if "disabled" is first in a series of arguments */ constchar *tt = t; constchar *ww = ap_getword_conf(cmd->temp_pool, &tt); if (ww[0] == '\0') { /* "disabled" is first, and alone */
apr_array_clear(d->index_names); break;
}
}
*(constchar **)apr_array_push(d->index_names) = w;
count++;
}
if (!strcasecmp(arg1, "ON"))
status = HTTP_MOVED_TEMPORARILY; elseif (!strcasecmp(arg1, "OFF"))
status = REDIRECT_OFF; elseif (!strcasecmp(arg1, "permanent"))
status = HTTP_MOVED_PERMANENTLY; elseif (!strcasecmp(arg1, "temp"))
status = HTTP_MOVED_TEMPORARILY; elseif (!strcasecmp(arg1, "seeother"))
status = HTTP_SEE_OTHER; elseif (apr_isdigit(*arg1)) {
status = atoi(arg1); if (!ap_is_HTTP_REDIRECT(status)) { return"DirectoryIndexRedirect only accepts values between 300 and 399";
}
} else { return"DirectoryIndexRedirect ON|OFF|permanent|temp|seeother|3xx";
}
d->redirect_index = status; return NULL;
} staticconst command_rec dir_cmds[] =
{
AP_INIT_TAKE1("FallbackResource", ap_set_string_slot,
(void*)APR_OFFSETOF(dir_config_rec, dflt),
DIR_CMD_PERMS, "Set a default handler"),
AP_INIT_RAW_ARGS("DirectoryIndex", add_index, NULL, DIR_CMD_PERMS, "a list of file names"),
AP_INIT_FLAG("DirectorySlash", configure_slash, NULL, DIR_CMD_PERMS, "On or Off"),
AP_INIT_FLAG("DirectoryCheckHandler", configure_checkhandler, NULL, DIR_CMD_PERMS, "On or Off"),
AP_INIT_TAKE1("DirectoryIndexRedirect", configure_redirect,
NULL, DIR_CMD_PERMS, "On, Off, or a 3xx status code."),
name_ptr = d->dflt; if ((name_ptr == NULL) || !(strcasecmp(name_ptr,"disabled"))){ return DECLINED;
} /* XXX: if FallbackResource points to something that doesn't exist, * this may recurse until it hits the limit for internal redirects * before returning an Internal Server Error.
*/
/* The logic of this function is basically cloned and simplified * from fixup_dir below. See the comments there.
*/ if (r->args != NULL) {
name_ptr = apr_pstrcat(r->pool, name_ptr, "?", r->args, NULL);
}
rr = ap_sub_req_lookup_uri(name_ptr, r, r->output_filters); if (rr->status == HTTP_OK
&& ( (rr->handler && !strcmp(rr->handler, "proxy-server"))
|| rr->finfo.filetype == APR_REG)) {
ap_internal_fast_redirect(rr, r); return OK;
} elseif (ap_is_HTTP_REDIRECT(rr->status)) {
ap_destroy_sub_req(rr); if (error_notfound) { return error_notfound;
}
/* nothing for us to do, pass on through */ return DECLINED;
}
staticint fixup_dir(request_rec *r)
{
dir_config_rec *d; char *dummy_ptr[1]; char **names_ptr; int num_names; int error_notfound = 0;
/* In case mod_mime wasn't present, and no handler was assigned. */ if (!r->handler) {
r->handler = DIR_MAGIC_TYPE;
}
/* Never tolerate path_info on dir requests */ if (r->path_info && *r->path_info) { return DECLINED;
}
d = (dir_config_rec *)ap_get_module_config(r->per_dir_config,
&dir_module);
/* Redirect requests that are not '/' terminated */ if (r->uri[0] == '\0' || r->uri[strlen(r->uri) - 1] != '/')
{ char *ifile;
if (!d->do_slash) { return DECLINED;
}
/* Only redirect non-get requests if we have no note to warn * that this browser cannot handle redirs on non-GET requests * (such as Microsoft's WebFolders).
*/ if ((r->method_number != M_GET)
&& apr_table_get(r->subprocess_env, "redirect-carefully")) { return DECLINED;
}
/* we're running between mod_rewrites fixup and its internal redirect handler, step aside */ if (!strcmp(r->handler, REWRITE_REDIRECT_HANDLER_NAME)) { /* Prevent DIR_MAGIC_TYPE from leaking out when someone has taken over */ if (!strcmp(r->content_type, DIR_MAGIC_TYPE)) {
r->content_type = NULL;
} return DECLINED;
}
if (d->checkhandler == MODDIR_ON && strcmp(r->handler, DIR_MAGIC_TYPE)) { /* Prevent DIR_MAGIC_TYPE from leaking out when someone has taken over */ if (!strcmp(r->content_type, DIR_MAGIC_TYPE)) {
r->content_type = NULL;
} return DECLINED;
}
for (; num_names; ++names_ptr, --num_names) { /* XXX: Is this name_ptr considered escaped yet, or not??? */ char *name_ptr = *names_ptr;
request_rec *rr;
/* Once upon a time args were handled _after_ the successful redirect. * But that redirect might then _refuse_ the given r->args, creating * a nasty tangle. It seems safer to consider the r->args while we * determine if name_ptr is our viable index, and therefore set them * up correctly on redirect.
*/ if (r->args != NULL) {
name_ptr = apr_pstrcat(r->pool, name_ptr, "?", r->args, NULL);
}
/* The sub request lookup is very liberal, and the core map_to_storage * handler will almost always result in HTTP_OK as /foo/index.html * may be /foo with PATH_INFO="/index.html", or even / with * PATH_INFO="/foo/index.html". To get around this we insist that the * the index be a regular filetype. * * Another reason is that the core handler also makes the assumption * that if r->finfo is still NULL by the time it gets called, the * file does not exist.
*/ if (rr->status == HTTP_OK
&& ( (rr->handler && !strcmp(rr->handler, "proxy-server"))
|| rr->finfo.filetype == APR_REG)) {
/* If the request returned something other than 404 (or 200), * it means the module encountered some sort of problem. To be * secure, we should return the error, rather than allow autoindex * to create a (possibly unsafe) directory index. * * So we store the error, and if none of the listed files * exist, we return the last error response we got, instead * of a directory listing.
*/ if (rr->status && rr->status != HTTP_NOT_FOUND
&& rr->status != HTTP_OK) {
error_notfound = rr->status;
}
ap_destroy_sub_req(rr);
}
if (error_notfound) { return error_notfound;
}
/* record what we tried, mostly for the benefit of mod_autoindex */
apr_table_setn(r->notes, "dir-index-names",
d->index_names ?
apr_array_pstrcat(r->pool, d->index_names, ',') :
AP_DEFAULT_INDEX);
/* nothing for us to do, pass on through */ return DECLINED;
}
staticint dir_fixups(request_rec *r)
{ if (r->finfo.filetype == APR_DIR) { /* serve up a directory */ return fixup_dir(r);
} elseif ((r->finfo.filetype == APR_NOFILE) && (r->handler == NULL)) { /* No handler and nothing in the filesystem - use fallback */ return fixup_dflt(r);
} return DECLINED;
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.