You are viewing a plain text version of this content. The canonical link for it is here.
Posted to dev@tomcat.apache.org by co...@apache.org on 2001/12/12 22:37:13 UTC

cvs commit: jakarta-tomcat-connectors/jk/native2/common jk_serialize_ajp.c jk_handler_request.c jk_handler_shutdown.c

costin      01/12/12 13:37:13

  Added:       jk/native2/common jk_serialize_ajp.c
  Removed:     jk/native2/common jk_handler_request.c jk_handler_shutdown.c
  Log:
  Moved the 'serialization' code to a separate file.
  
  Revision  Changes    Path
  1.1                  jakarta-tomcat-connectors/jk/native2/common/jk_serialize_ajp.c
  
  Index: jk_serialize_ajp.c
  ===================================================================
  /* ========================================================================= *
   *                                                                           *
   *                 The Apache Software License,  Version 1.1                 *
   *                                                                           *
   *          Copyright (c) 1999-2001 The Apache Software Foundation.          *
   *                           All rights reserved.                            *
   *                                                                           *
   * ========================================================================= *
   *                                                                           *
   * Redistribution and use in source and binary forms,  with or without modi- *
   * fication, are permitted provided that the following conditions are met:   *
   *                                                                           *
   * 1. Redistributions of source code  must retain the above copyright notice *
   *    notice, this list of conditions and the following disclaimer.          *
   *                                                                           *
   * 2. Redistributions  in binary  form  must  reproduce the  above copyright *
   *    notice,  this list of conditions  and the following  disclaimer in the *
   *    documentation and/or other materials provided with the distribution.   *
   *                                                                           *
   * 3. The end-user documentation  included with the redistribution,  if any, *
   *    must include the following acknowlegement:                             *
   *                                                                           *
   *       "This product includes  software developed  by the Apache  Software *
   *        Foundation <http://www.apache.org/>."                              *
   *                                                                           *
   *    Alternately, this acknowlegement may appear in the software itself, if *
   *    and wherever such third-party acknowlegements normally appear.         *
   *                                                                           *
   * 4. The names  "The  Jakarta  Project",  "Jk",  and  "Apache  Software     *
   *    Foundation"  must not be used  to endorse or promote  products derived *
   *    from this  software without  prior  written  permission.  For  written *
   *    permission, please contact <ap...@apache.org>.                        *
   *                                                                           *
   * 5. Products derived from this software may not be called "Apache" nor may *
   *    "Apache" appear in their names without prior written permission of the *
   *    Apache Software Foundation.                                            *
   *                                                                           *
   * THIS SOFTWARE IS PROVIDED "AS IS" AND ANY EXPRESSED OR IMPLIED WARRANTIES *
   * INCLUDING, BUT NOT LIMITED TO,  THE IMPLIED WARRANTIES OF MERCHANTABILITY *
   * AND FITNESS FOR  A PARTICULAR PURPOSE  ARE DISCLAIMED.  IN NO EVENT SHALL *
   * THE APACHE  SOFTWARE  FOUNDATION OR  ITS CONTRIBUTORS  BE LIABLE  FOR ANY *
   * DIRECT,  INDIRECT,   INCIDENTAL,  SPECIAL,  EXEMPLARY,  OR  CONSEQUENTIAL *
   * DAMAGES (INCLUDING,  BUT NOT LIMITED TO,  PROCUREMENT OF SUBSTITUTE GOODS *
   * OR SERVICES;  LOSS OF USE,  DATA,  OR PROFITS;  OR BUSINESS INTERRUPTION) *
   * HOWEVER CAUSED AND  ON ANY  THEORY  OF  LIABILITY,  WHETHER IN  CONTRACT, *
   * STRICT LIABILITY, OR TORT  (INCLUDING NEGLIGENCE OR OTHERWISE) ARISING IN *
   * ANY  WAY  OUT OF  THE  USE OF  THIS  SOFTWARE,  EVEN  IF  ADVISED  OF THE *
   * POSSIBILITY OF SUCH DAMAGE.                                               *
   *                                                                           *
   * ========================================================================= *
   *                                                                           *
   * This software  consists of voluntary  contributions made  by many indivi- *
   * duals on behalf of the  Apache Software Foundation.  For more information *
   * on the Apache Software Foundation, please see <http://www.apache.org/>.   *
   *                                                                           *
   * ========================================================================= */
  
  /**
   * Serializing requests.
   *
   * @author: Gal Shachor <sh...@il.ibm.com>                           
   * @author: Henri Gomez <hg...@slib.fr>
   * @author: Costin Manolache
   */
  
  
  #include "jk_global.h"
  #include "jk_handler.h"
  #include "jk_channel.h"
  #include "jk_env.h"
  #include "jk_requtil.h"
  #include "jk_msg.h"
  #include "jk_ajp14.h"
  
  /*
   * Forward a request from the web server to the servlet container.
   */
  #define JK_AJP13_FORWARD_REQUEST    (unsigned char)2
  
  /* Important: ajp13 protocol has the strange habit of sending
     a second ( untyped ) message imediately following the request,
     with a first chunk of POST body. This is nice for small post
     requests, since it avoids a roundtrip, but it's horrible
     because it brakes the model. So we'll have to remember this
     as an exception to the rule as long as ajp13 is alive
  */
  
  #define JK_AJP13_SHUTDOWN           (unsigned char)7
  
  #define JK_AJP13_PING           (unsigned char)8
  
  /* 
   * Build the ping cmd. Tomcat will get control and will be able 
   * to send any command.
   *
   * +-----------------------+
   * | PING CMD (1 byte) |
   * +-----------------------+
   *
   * XXX Add optional Key/Value set .
   *  
   */
  int jk_serialize_ping(jk_msg_t *msg,
                        jk_endpoint_t  *ae)
  {
      jk_logger_t *l=msg->l;
      int rc;
      
      /* To be on the safe side */
      msg->reset(msg);
  
      /* SHUTDOWN CMD */
      rc= msg->appendByte( msg, JK_AJP13_PING);
      if (rc!=JK_TRUE )
          return JK_FALSE;
  
      return JK_TRUE;
  }
  
  
  /*
   * Conditional request attributes
   * 
   */
  #define SC_A_CONTEXT            (unsigned char)1
  #define SC_A_SERVLET_PATH       (unsigned char)2
  #define SC_A_REMOTE_USER        (unsigned char)3
  #define SC_A_AUTH_TYPE          (unsigned char)4
  #define SC_A_QUERY_STRING       (unsigned char)5
  #define SC_A_JVM_ROUTE          (unsigned char)6
  #define SC_A_SSL_CERT           (unsigned char)7
  #define SC_A_SSL_CIPHER         (unsigned char)8
  #define SC_A_SSL_SESSION        (unsigned char)9
  #define SC_A_REQ_ATTRIBUTE      (unsigned char)10
  /* only in if JkOptions +ForwardKeySize */
  #define SC_A_SSL_KEY_SIZE       (unsigned char)11		
  #define SC_A_ARE_DONE           (unsigned char)0xFF
  
  
  
  /**
    Message structure
   
   
  AJPV13_REQUEST/AJPV14_REQUEST=
      request_prefix (1) (byte)
      method         (byte)
      protocol       (string)
      req_uri        (string)
      remote_addr    (string)
      remote_host    (string)
      server_name    (string)
      server_port    (short)
      is_ssl         (boolean)
      num_headers    (short)
      num_headers*(req_header_name header_value)
  
      ?context       (byte)(string)
      ?servlet_path  (byte)(string)
      ?remote_user   (byte)(string)
      ?auth_type     (byte)(string)
      ?query_string  (byte)(string)
      ?jvm_route     (byte)(string)
      ?ssl_cert      (byte)(string)
      ?ssl_cipher    (byte)(string)
      ?ssl_session   (byte)(string)
      ?ssl_key_size  (byte)(int)		via JkOptions +ForwardKeySize
      request_terminator (byte)
      ?body          content_length*(var binary)
  
      Was: ajp_marshal_into_msgb
   */
  int jk_serialize_request13(jk_msg_t    *msg,
                             jk_ws_service_t *s )
  {
      unsigned char method;
      unsigned i;
      jk_logger_t *l=msg->l;
  
      l->jkLog(l, JK_LOG_DEBUG, "Into ajp_marshal_into_msgb\n");
  
      if (!jk_requtil_getMethodId(s->method, &method)) { 
          l->jkLog(l, JK_LOG_ERROR,
                   "Error ajp_marshal_into_msgb - No such method %s\n", s->method);
          return JK_FALSE;
      }
  
      if (msg->appendByte(msg, JK_AJP13_FORWARD_REQUEST)  ||
          msg->appendByte(msg, method)               ||
          msg->appendString(msg, s->protocol)        ||
          msg->appendString(msg, s->req_uri)         ||
          msg->appendString(msg, s->remote_addr)     ||
          msg->appendString(msg, s->remote_host)     ||
          msg->appendString(msg, s->server_name)     ||
          msg->appendInt(msg, (unsigned short)s->server_port) ||
          msg->appendByte(msg, (unsigned char)(s->is_ssl)) ||
          msg->appendInt(msg, (unsigned short)(s->num_headers))) {
  
          l->jkLog(l, JK_LOG_ERROR,
                   "handle.request()  Error serializing the message head\n");
          return JK_FALSE;
      }
  
      for (i = 0 ; i < s->num_headers ; i++) {
          unsigned short sc;
  
          if (jk_requtil_getHeaderId(s->headers_names[i], &sc)) {
              if (msg->appendInt(msg, sc)) {
                  l->jkLog(l, JK_LOG_ERROR,
                           "handle.request() Error serializing header id\n");
                  return JK_FALSE;
              }
          } else {
              if (msg->appendString(msg, s->headers_names[i])) {
                  l->jkLog(l, JK_LOG_ERROR,
                           "handle.request() Error serializing header name\n");
                  return JK_FALSE;
              }
          }
          
          if (msg->appendString(msg, s->headers_values[i])) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing header value\n");
              return JK_FALSE;
          }
      }
  
      if (s->remote_user) {
          if (msg->appendByte(msg, SC_A_REMOTE_USER) ||
              msg->appendString(msg, s->remote_user)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing user name\n");
              return JK_FALSE;
          }
      }
      if (s->auth_type) {
          if (msg->appendByte(msg, SC_A_AUTH_TYPE) ||
              msg->appendString(msg, s->auth_type)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing auth type\n");
              return JK_FALSE;
          }
      }
      if (s->query_string) {
          if (msg->appendByte(msg, SC_A_QUERY_STRING) ||
              msg->appendString(msg, s->query_string)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing query string\n");
              return JK_FALSE;
          }
      }
      /* XXX This can be sent only on startup ( ajp14 ) */
       
      if (s->jvm_route) {
          if (msg->appendByte(msg, SC_A_JVM_ROUTE) ||
              msg->appendString(msg, s->jvm_route)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing worker id\n");
              return JK_FALSE;
          }
      }
      
      if (s->ssl_cert_len) {
          if (msg->appendByte(msg, SC_A_SSL_CERT) ||
              msg->appendString(msg, s->ssl_cert)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing SSL cert\n");
              return JK_FALSE;
          }
      }
  
      if (s->ssl_cipher) {
          if (msg->appendByte(msg, SC_A_SSL_CIPHER) ||
              msg->appendString(msg, s->ssl_cipher)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing SSL cipher\n");
              return JK_FALSE;
          }
      }
      if (s->ssl_session) {
          if (msg->appendByte(msg, SC_A_SSL_SESSION) ||
              msg->appendString(msg, s->ssl_session)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing SSL session\n");
              return JK_FALSE;
          }
      }
  
      /*
       * ssl_key_size is required by Servlet 2.3 API
       * added support only in ajp14 mode
       * JFC removed: ae->proto == AJP14_PROTO
       */
      if (s->ssl_key_size != -1) {
          if (msg->appendByte(msg, SC_A_SSL_KEY_SIZE) ||
              msg->appendInt(msg, (unsigned short) s->ssl_key_size)) {
              l->jkLog(l, JK_LOG_ERROR,
                       "handle.request() Error serializing SSL key size\n");
              return JK_FALSE;
          }
      }
  
  
      if (s->num_attributes > 0) {
          for (i = 0 ; i < s->num_attributes ; i++) {
              if (msg->appendByte(msg, SC_A_REQ_ATTRIBUTE)       ||
                  msg->appendString(msg, s->attributes_names[i]) ||
                  msg->appendString(msg, s->attributes_values[i])) {
                  l->jkLog(l, JK_LOG_ERROR,
                           "handle.request() Error serializing attribute %s=%s\n",
                           s->attributes_names[i], s->attributes_values[i]);
                  return JK_FALSE;
              }
          }
      }
  
      if (msg->appendByte(msg, SC_A_ARE_DONE)) {
          l->jkLog(l, JK_LOG_ERROR,
                   "handle.request() Error serializing end marker\n");
          return JK_FALSE;
      }
      
      l->jkLog(l, JK_LOG_INFO, "handle.request() request serialized\n");
      return JK_TRUE;
  }
  
  
  /** The inital BODY chunk 
   */
  int jk_serialize_postHead(jk_msg_t   *msg,
                            jk_ws_service_t  *r,
                            jk_endpoint_t *e)
  {
      jk_logger_t *l=msg->l;
      int len = r->left_bytes_to_send;
  
      if(len > AJP13_MAX_SEND_BODY_SZ) {
          len = AJP13_MAX_SEND_BODY_SZ;
      }
      if(len <= 0) {
          len = 0;
          return JK_TRUE;
      }
  
      len=msg->appendFromServer( msg, r, e, len );
      /* the right place to add file storage for upload */
      if (len >= 0) {
          r->content_read += len;
          return JK_TRUE;
      }                  
              
      l->jkLog(l, JK_LOG_ERROR,
               "handler.marshapPostHead() - error len=%d\n", len);
      return JK_FALSE;	    
  }
  
  /* 
   * Build the Shutdown Cmd. ( no need to send any secret key,
   * we already authenticated when opening the channel )
   *
   * +-----------------------+
   * | SHUTDOWN CMD (1 byte) |
   * +-----------------------+
   *
   */
  int jk_serialize_shutdown(jk_msg_t *msg,
                            jk_ws_service_t  *r)
  {
      jk_logger_t *l=msg->l;
      int rc;
      
      l->jkLog(l, JK_LOG_DEBUG, "Into ajp14_marshal_shutdown_into_msgb\n");
  
      /* To be on the safe side */
      msg->reset(msg);
  
      /* SHUTDOWN CMD */
      rc= msg->appendByte( msg, JK_AJP13_SHUTDOWN);
      if (rc!=JK_TRUE )
          return JK_FALSE;
  
  	return JK_TRUE;
  }
  
  
  
  
  
  
  

--
To unsubscribe, e-mail:   <ma...@jakarta.apache.org>
For additional commands, e-mail: <ma...@jakarta.apache.org>