/* Licensed to the Apache Software Foundation (ASF) under one or more * contributor license agreements. See the NOTICE file distributed with * this work for additional information regarding copyright ownership. * The ASF licenses this file to You under the Apache License, Version 2.0 * (the "License"); you may not use this file except in compliance with * the License. You may obtain a copy of the License at * * http://www.apache.org/licenses/LICENSE-2.0 * * Unless required by applicable law or agreed to in writing, software * distributed under the License is distributed on an "AS IS" BASIS, * WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied. * See the License for the specific language governing permissions and * limitations under the License.
*/
/** * Determine the priority order of streams. * - if both stream depend on the same one, compare weights * - if one stream is closer to the root, prioritize that one * - if both are on the same level, use the weight of their root * level ancestors
*/ staticint spri_cmp(int sid1, nghttp2_stream *s1, int sid2, nghttp2_stream *s2, h2_session *session)
{
nghttp2_stream *p1, *p2;
if (status != APR_SUCCESS) { /* count this as consumed explicitly as no one will read it */
nghttp2_session_consume(session->ngh2, stream_id, len);
} return rv;
}
/* We may see HEADERs at the start of a stream or after all DATA
* streams to carry trailers. */
(void)ngh2;
s = get_stream(session, frame->hd.stream_id); if (s) { /* nop */
} elseif (session->local.accepting) {
s = h2_session_open_stream(userp, frame->hd.stream_id, 0);
} return s? 0 : NGHTTP2_ERR_START_STREAM_NOT_ALLOWED;
}
status = h2_stream_add_header(stream, (constchar *)name, namelen,
(constchar *)value, valuelen); if (status != APR_SUCCESS &&
(!stream->rtmp ||
stream->rtmp->http_status == H2_HTTP_STATUS_UNSET || /* We accept a certain amount of failures in order to reply * with an informative HTTP error response like 413. But of the
* client is too wrong, we RESET the stream */
stream->request_headers_failed > 100)) {
ap_log_cerror(APLOG_MARK, APLOG_TRACE1, 0, session->c1,
H2_SSSN_STRM_MSG(session, frame->hd.stream_id, "RST stream, header failures: %d"),
(int)stream->request_headers_failed); return NGHTTP2_ERR_TEMPORAL_CALLBACK_FAILURE;
} return 0;
}
/** * nghttp2 session has received a complete frame. Most are used by nghttp2 * for processing of internal state. Some, like HEADER and DATA frames, * we need to act on.
*/ staticint on_frame_recv_cb(nghttp2_session *ng2s, const nghttp2_frame *frame, void *userp)
{
h2_session *session = (h2_session *)userp;
h2_stream *stream;
apr_status_t rv = APR_SUCCESS;
++session->frames_received; switch (frame->hd.type) { case NGHTTP2_HEADERS: /* This can be HEADERS for a new stream, defining the request, * or HEADER may come after DATA at the end of a stream as in
* trailers */ if (stream) {
rv = h2_stream_recv_frame(stream, NGHTTP2_HEADERS, frame->hd.flags,
frame->hd.length + H2_FRAME_HDR_LEN);
} break; case NGHTTP2_DATA: if (stream) {
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_STRM_LOG(APLOGNO(02923), stream, "DATA, len=%ld, flags=%d"),
(long)frame->hd.length, frame->hd.flags);
rv = h2_stream_recv_frame(stream, NGHTTP2_DATA, frame->hd.flags,
frame->hd.length + H2_FRAME_HDR_LEN);
} break; case NGHTTP2_PRIORITY:
session->reprioritize = 1;
ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_SSSN_STRM_MSG(session, frame->hd.stream_id, "PRIORITY frame " " weight=%d, dependsOn=%d, exclusive=%d"),
frame->priority.pri_spec.weight,
frame->priority.pri_spec.stream_id,
frame->priority.pri_spec.exclusive); break; case NGHTTP2_WINDOW_UPDATE:
ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_SSSN_STRM_MSG(session, frame->hd.stream_id, "WINDOW_UPDATE incr=%d"),
frame->window_update.window_size_increment); break; case NGHTTP2_RST_STREAM:
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1, APLOGNO(03067)
H2_SSSN_STRM_MSG(session, frame->hd.stream_id, "RST_STREAM by client, error=%d"),
(int)frame->rst_stream.error_code); if (stream) {
rv = h2_stream_recv_frame(stream, NGHTTP2_RST_STREAM, frame->hd.flags,
frame->hd.length + H2_FRAME_HDR_LEN);
} if (stream && stream->initiated_on) { /* A stream reset on a request we sent it. Normal, when the
* client does not want it. */
++session->pushes_reset;
} else { /* A stream reset on a request it sent us. Could happen in a browser
* when the user navigates away or cancels loading - maybe. */
h2_mplx_c1_client_rst(session->mplx, frame->hd.stream_id,
stream);
}
++session->streams_reset; break; case NGHTTP2_GOAWAY: if (frame->goaway.error_code == 0
&& frame->goaway.last_stream_id == ((1u << 31) - 1)) { /* shutdown notice. Should not come from a client... */
session->remote.accepting = 0;
} else {
session->remote.accepted_max = frame->goaway.last_stream_id;
h2_session_dispatch_event(session, H2_SESSION_EV_REMOTE_GOAWAY,
frame->goaway.error_code, NULL);
} break; case NGHTTP2_SETTINGS:
ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_SSSN_MSG(session, "SETTINGS, len=%ld"), (long)frame->hd.length); break; default: if (APLOGctrace2(session->c1)) { char buffer[256];
if (session->state == H2_SESSION_ST_IDLE) { /* We received a frame, but session is in state IDLE. That means the frame * did not really progress any of the (possibly) open streams. It was a meta * frame, e.g. SETTINGS/WINDOW_UPDATE/unknown/etc. * Remember: IDLE means we cannot send because either there are no streams open or * all open streams are blocked on exhausted WINDOWs for outgoing data. * The more frames we receive that do not change this, the less interested we * become in serving this connection. This is expressed in increasing "idle_delays".
* Eventually, the connection will timeout and we'll close it. */
session->idle_frames = H2MIN(session->idle_frames + 1, session->frames_received);
ap_log_cerror( APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_SSSN_MSG(session, "session has %ld idle frames"),
(long)session->idle_frames); if (session->idle_frames > 10) {
apr_size_t busy_frames = H2MAX(session->frames_received - session->idle_frames, 1); int idle_ratio = (int)(session->idle_frames / busy_frames); if (idle_ratio > 100) {
session->idle_delay = apr_time_from_msec(H2MIN(1000, idle_ratio));
} elseif (idle_ratio > 10) {
session->idle_delay = apr_time_from_msec(10);
} elseif (idle_ratio > 1) {
session->idle_delay = apr_time_from_msec(1);
} else {
session->idle_delay = 0;
}
}
}
if (APR_SUCCESS != rv) return NGHTTP2_ERR_PROTO; return 0;
}
staticchar immortal_zeros[H2_MAX_PADLEN];
staticint on_send_data_cb(nghttp2_session *ngh2,
nghttp2_frame *frame, const uint8_t *framehd,
size_t length,
nghttp2_data_source *source, void *userp)
{
apr_status_t status = APR_SUCCESS;
h2_session *session = (h2_session *)userp; int stream_id = (int)frame->hd.stream_id; unsignedchar padlen; int eos;
h2_stream *stream;
apr_bucket *b;
apr_off_t len = length;
/* Determine # of padding bytes to append to frame. Unless session->padding_always * the number my be capped by the ui.write_size that currently applies.
*/ if (session->padding_max) { int n = ap_random_pick(0, session->padding_max);
padded_len = H2MIN(max_payloadlen + H2_FRAME_HDR_LEN, frame_len + n);
}
ap_assert(session); if (!session->local.accepting) { return APR_SUCCESS;
}
nghttp2_submit_shutdown_notice(session->ngh2);
session->local.accepting = 0;
status = nghttp2_session_send(session->ngh2); if (status == APR_SUCCESS) {
status = h2_c1_io_assure_flushed(&session->io);
}
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_SSSN_LOG(APLOGNO(03457), session, "sent shutdown notice")); return status;
}
static apr_status_t h2_session_shutdown(h2_session *session, int error, constchar *msg, int force_close)
{
apr_status_t status = APR_SUCCESS;
ap_assert(session); if (session->local.shutdown) { return APR_SUCCESS;
}
if (error && !msg) { if (APR_STATUS_IS_EPIPE(error)) {
msg = "remote close";
}
}
if (error || force_close) { /* not a graceful shutdown, we want to leave... * Do not start further streams that are waiting to be scheduled. * Find out the max stream id that we habe been processed or * are still actively working on. * Remove all streams greater than this number without submitting * a RST_STREAM frame, since that should be clear from the GOAWAY
* we send. */
session->local.accepted_max = h2_mplx_c1_shutdown(session->mplx);
session->local.error = error;
session->local.error_msg = msg;
} else { /* graceful shutdown. we will continue processing all streams * we have, but no longer accept new ones. Report the max stream
* we have received and discard all new ones. */
}
if (session->state != H2_SESSION_ST_DONE
&& session->state != H2_SESSION_ST_INIT) { /* Not good. The connection is being torn down and we have * not sent a goaway. This is considered a protocol error and * the client has to assume that any streams "in flight" may have * been processed and are not safe to retry. * As clients with idle connection may only learn about a closed * connection when sending the next request, this has the effect * that at least this one request will fail.
*/
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, c,
H2_SSSN_LOG(APLOGNO(03199), session, "connection disappeared without proper " "goodbye, clients will be confused, should not happen"));
}
if (!h2_iq_empty(session->ready_to_process)) { int sid;
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, c,
H2_SSSN_LOG(APLOGNO(10485), session, "cleanup, resetting %d streams in ready-to-process"),
h2_iq_count(session->ready_to_process)); while ((sid = h2_iq_shift(session->ready_to_process)) > 0) {
h2_mplx_c1_client_rst(session->mplx, sid, get_stream(session, sid));
}
}
ap_mpm_query(AP_MPMQ_MPM_STATE, &mpm_state);
level = (AP_MPMQ_STOPPING == mpm_state)? APLOG_DEBUG : APLOG_WARNING; /* if the session is still there, now is the last chance * to perform cleanup. Normally, cleanup should have happened * earlier in the connection pre_close. * However, when the server is stopping, it may shutdown connections
* without running the pre_close hooks. Do not want about that. */
ap_log_cerror(APLOG_MARK, level, 0, c,
H2_SSSN_LOG(APLOGNO(10020), session, "session cleanup triggered by pool cleanup. " "this should have happened earlier already.")); return session_cleanup(session, "pool cleanup");
} return APR_SUCCESS;
}
*psession = session; /* c->id does not give a unique id for the lifetime of the session. * mpms like event change c->id when re-activating a keepalive * connection based on the child_num+thread_num of the worker * processing it. * We'd like to have an id that remains constant and unique bc * h2 streams can live through keepalive periods. While double id * will not lead to processing failures, it will confuse log analysis.
*/ #if AP_MODULE_MAGIC_AT_LEAST(20211221, 8)
ap_sb_get_child_thread(c->sbh, &session->child_num, &thread_num); #else
(void)thread_num;
session->child_num = (int)getpid(); #endif
session->id = apr_atomic_inc32(&next_id);
session->c1 = c;
session->r = r;
session->s = s;
session->pool = pool;
session->workers = workers;
status = init_callbacks(c, &callbacks); if (status != APR_SUCCESS) {
ap_log_cerror(APLOG_MARK, APLOG_ERR, status, c, APLOGNO(02927) "nghttp2: error in init_callbacks");
apr_pool_destroy(pool); return status;
}
rv = nghttp2_option_new(&options); if (rv != 0) {
ap_log_cerror(APLOG_MARK, APLOG_ERR, APR_EGENERAL, c,
APLOGNO(02928) "nghttp2_option_new: %s",
nghttp2_strerror(rv));
apr_pool_destroy(pool); return status;
}
nghttp2_option_set_peer_max_concurrent_streams(options, (uint32_t)session->max_stream_count); /* We need to handle window updates ourself, otherwise we
* get flooded by nghttp2. */
nghttp2_option_set_no_auto_window_update(options, 1); #ifdef H2_NG2_NO_CLOSED_STREAMS /* We do not want nghttp2 to keep information about closed streams as * that accumulates memory on long connections. This makes PRIORITY
* setting in relation to older streams non-working. */
nghttp2_option_set_no_closed_streams(options, 1); #endif #ifdef H2_NG2_RFC9113_STRICTNESS /* nghttp2 v1.50.0 introduces the strictness checks on leading/trailing * whitespace of RFC 9113 for fields. But, by default, it RST streams * carrying such. We do not want that. We want to strip the ws and
* handle them, just like the HTTP/1.1 parser does. */
nghttp2_option_set_no_rfc9113_leading_and_trailing_ws_validation(options, 1); #endif
/* Now we need to auto-open stream 1 for the request we got. */
stream = h2_session_open_stream(session, 1, 0); if (!stream) {
status = APR_EGENERAL;
ap_log_rerror(APLOG_MARK, APLOG_ERR, status, session->r,
APLOGNO(02933) "open stream 1: %s",
nghttp2_strerror(*rv)); return status;
}
status = h2_stream_set_request_rec(stream, session->r, 1); if (status != APR_SUCCESS) { return status;
}
}
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, status, session->c1,
H2_SSSN_LOG(APLOGNO(03201), session, "start, INITIAL_WINDOW_SIZE=%ld, MAX_CONCURRENT_STREAMS=%d"),
(long)win_size, (int)session->max_stream_count);
*rv = nghttp2_submit_settings(session->ngh2, NGHTTP2_FLAG_NONE,
settings, slen); if (*rv != 0) {
status = APR_EGENERAL;
ap_log_cerror(APLOG_MARK, APLOG_ERR, status, session->c1,
H2_SSSN_LOG(APLOGNO(02935), session, "nghttp2_submit_settings: %s"), nghttp2_strerror(*rv));
} else { /* use maximum possible value for connection window size. We are only * interested in per stream flow control. which have the initial window * size configured above. * Therefore, for our use, the connection window can only get in the * way. Example: if we allow 100 streams with a 32KB window each, we * buffer up to 3.2 MB of data. Unless we do separate connection window * interim updates, any smaller connection window will lead to blocking * in DATA flow.
*/
*rv = nghttp2_session_set_local_window_size(
session->ngh2, NGHTTP2_FLAG_NONE, 0, NGHTTP2_MAX_WINDOW_SIZE); if (*rv != 0) {
status = APR_EGENERAL;
ap_log_cerror(APLOG_MARK, APLOG_ERR, status, session->c1,
H2_SSSN_LOG(APLOGNO(02970), session, "nghttp2_session_set_local_window_size: %s"),
nghttp2_strerror(*rv));
}
}
return status;
}
struct h2_stream *h2_session_push(h2_session *session, h2_stream *is,
h2_push *push)
{
h2_stream *stream;
h2_ngheader *ngh;
apr_status_t status; int nid = 0;
status = h2_req_create_ngheader(&ngh, is->pool, push->req); if (status == APR_SUCCESS) {
nid = nghttp2_submit_push_promise(session->ngh2, 0, is->id,
ngh->nv, ngh->nvlen, NULL);
} if (status != APR_SUCCESS || nid <= 0) {
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, status, session->c1,
H2_STRM_LOG(APLOGNO(03075), is, "submitting push promise fail: %s"), nghttp2_strerror(nid)); return NULL;
}
++session->pushes_promised;
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_STRM_LOG(APLOGNO(03076), is, "SERVER_PUSH %d for %s %s on %d"),
nid, push->req->method, push->req->path, is->id);
stream = h2_session_open_stream(session, nid, is->id); if (!stream) {
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_STRM_LOG(APLOGNO(03077), is, "failed to create stream obj %d"), nid); /* kill the push_promise */
nghttp2_submit_rst_stream(session->ngh2, NGHTTP2_FLAG_NONE, nid,
NGHTTP2_INTERNAL_ERROR); return NULL;
}
if (prio == NULL) { /* we treat this as a NOP */ return APR_SUCCESS;
}
s = nghttp2_session_find_stream(session->ngh2, stream->id); if (!s) {
ap_log_cerror(APLOG_MARK, APLOG_TRACE1, 0, session->c1,
H2_STRM_MSG(stream, "lookup of nghttp2_stream failed")); return APR_EINVAL;
}
s_parent = nghttp2_stream_get_parent(s); if (s_parent) {
nghttp2_priority_spec ps; int id_parent, id_grandpa, w_parent, w; int rv = 0; constchar *ptype = "AFTER";
h2_dependency dep = prio->dependency;
id_parent = nghttp2_stream_get_stream_id(s_parent);
s_grandpa = nghttp2_stream_get_parent(s_parent); if (s_grandpa) {
id_grandpa = nghttp2_stream_get_stream_id(s_grandpa);
} else { /* parent of parent does not exist,
* only possible if parent == root */
dep = H2_DEPENDANT_AFTER;
}
switch (dep) { case H2_DEPENDANT_INTERLEAVED: /* PUSHed stream is to be interleaved with initiating stream. * It is made a sibling of the initiating stream and gets a * proportional weight [1, MAX_WEIGHT] of the initiaing * stream weight.
*/
ptype = "INTERLEAVED";
w_parent = nghttp2_stream_get_weight(s_parent);
w = valid_weight(w_parent * ((float)prio->weight / NGHTTP2_MAX_WEIGHT));
nghttp2_priority_spec_init(&ps, id_grandpa, w, 0); break;
case H2_DEPENDANT_BEFORE: /* PUSHed stream os to be sent BEFORE the initiating stream. * It gets the same weight as the initiating stream, replaces * that stream in the dependency tree and has the initiating * stream as child.
*/
ptype = "BEFORE";
w = w_parent = nghttp2_stream_get_weight(s_parent);
nghttp2_priority_spec_init(&ps, stream->id, w_parent, 0);
id_grandpa = nghttp2_stream_get_stream_id(s_grandpa);
rv = nghttp2_session_change_stream_priority(session->ngh2, id_parent, &ps); if (rv < 0) {
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1, APLOGNO(03202)
H2_SSSN_STRM_MSG(session, id_parent, "PUSH BEFORE, weight=%d, depends=%d, returned=%d"),
ps.weight, ps.stream_id, rv); return APR_EGENERAL;
}
nghttp2_priority_spec_init(&ps, id_grandpa, w, 0); break;
case H2_DEPENDANT_AFTER: /* The PUSHed stream is to be sent after the initiating stream. * Give if the specified weight and let it depend on the intiating * stream.
*/ /* fall through, it's the default */ default:
nghttp2_priority_spec_init(&ps, id_parent, valid_weight(prio->weight), 0); break;
}
int h2_session_push_enabled(h2_session *session)
{ /* iff we can and they can and want */ return (session->remote.accepting /* remote GOAWAY received */
&& h2_config_sgeti(session->s, H2_CONF_PUSH)
&& nghttp2_session_get_remote_settings(session->ngh2,
NGHTTP2_SETTINGS_ENABLE_PUSH));
}
switch (session->state) { case H2_SESSION_ST_IDLE: if (!session->remote.emitted_count) { /* on fresh connections, with async mpm, do not return * to mpm for a second. This gives the first request a better * chance to arrive (und connection leaving IDLE state). * If we return to mpm right away, this connection has the * same chance of being cleaned up by the mpm as connections
* that already served requests - not fair. */
ap_log_cerror(APLOG_MARK, APLOG_TRACE1, 0, session->c1,
H2_SSSN_LOG("", session, "enter idle"));
} else { /* normal keepalive setup */
ap_log_cerror(APLOG_MARK, APLOG_TRACE1, 0, session->c1,
H2_SSSN_LOG("", session, "enter keepalive"));
}
session->state = nstate; break; case H2_SESSION_ST_DONE: break; default: /* nop */
session->state = nstate; break;
}
}
}
staticvoid h2_session_ev_no_more_streams(h2_session *session)
{
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_SSSN_LOG(APLOGNO(10304), session, "no more streams")); switch (session->state) { case H2_SESSION_ST_BUSY: case H2_SESSION_ST_WAIT: if (!h2_session_want_send(session)) { if (session->local.accepting) { /* We wait for new frames on c1 only. */
transit(session, "all streams done", H2_SESSION_ST_IDLE);
} else { /* We are no longer accepting new streams.
* Time to leave. */
h2_session_shutdown(session, 0, "done", 0);
transit(session, "c1 done after goaway", H2_SESSION_ST_DONE);
}
} else {
transit(session, "no more streams", H2_SESSION_ST_WAIT);
} break; default: /* nop */ break;
}
}
staticvoid ev_stream_open(h2_session *session, h2_stream *stream)
{ if (H2_STREAM_CLIENT_INITIATED(stream->id)) { if (stream->id > session->remote.accepted_max) {
session->local.accepted_max = stream->id;
}
} else { if (stream->id > session->local.emitted_max) {
++session->local.emitted_count;
session->remote.emitted_max = stream->id;
}
} /* Stream state OPEN means we have received all request headers
* and can start processing the stream. */
h2_iq_append(session->ready_to_process, stream->id);
update_child_status(session, SERVER_BUSY_READ, "schedule", stream);
}
if (H2_STREAM_CLIENT_INITIATED(stream->id)
&& (stream->id > session->local.completed_max)) {
session->local.completed_max = stream->id;
} /* The stream might have data in the buffers of the main connection. * We can only free the allocated resources once all had been written. * Send a special buckets on the connection that gets destroyed when * all preceding data has been handled. On its destruction, it is safe
* to purge all resources of the stream. */
ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_STRM_MSG(stream, "adding h2_eos to c1 out"));
b = h2_bucket_eos_create(session->c1->bucket_alloc, stream);
APR_BRIGADE_INSERT_TAIL(session->bbtmp, b);
h2_c1_io_append(&session->io, session->bbtmp);
apr_brigade_cleanup(session->bbtmp);
}
ap_log_cerror(APLOG_MARK, APLOG_TRACE2, 0, session->c1,
H2_STRM_MSG(stream, "entered state")); switch (stream->state) { case H2_SS_IDLE: /* stream was created */
ev_stream_created(session, stream); break; case H2_SS_OPEN: /* stream has request headers */ case H2_SS_RSVD_L:
ev_stream_open(session, stream); break; case H2_SS_CLOSED_L: /* stream output was closed, but remote end is not */ /* If the stream is still being processed, it could still be reading * its input (theoretically, http request hangling does not normally). * But when processing is done, we need to cancel the stream as no * one is consuming the input any longer. * This happens, for example, on a large POST when the response
* is ready early due to the POST being denied. */ if (!h2_mplx_c1_stream_is_running(session->mplx, stream)) {
ap_log_cerror(APLOG_MARK, APLOG_DEBUG, 0, session->c1,
H2_STRM_LOG(APLOGNO(10305), stream, "remote close missing"));
nghttp2_submit_rst_stream(session->ngh2, NGHTTP2_FLAG_NONE,
stream->id, H2_ERR_NO_ERROR);
} break; case H2_SS_CLOSED_R: /* stream input was closed */ break; case H2_SS_CLOSED: /* stream in+out were closed */
ev_stream_closed(session, stream); break; case H2_SS_CLEANUP:
nghttp2_session_set_stream_user_data(session->ngh2, stream->id, NULL);
update_child_status(session, SERVER_BUSY_WRITE, "done", stream);
h2_mplx_c1_stream_cleanup(session->mplx, stream, &session->open_streams);
stream = NULL;
++session->streams_done; break; default: break;
}
}
Die Informationen auf dieser Webseite wurden
nach bestem Wissen sorgfältig zusammengestellt. Es wird jedoch weder Vollständigkeit, noch Richtigkeit,
noch Qualität der bereit gestellten Informationen zugesichert.
Bemerkung:
Die farbliche Syntaxdarstellung ist noch experimentell.