root/sapi/cgi/fastcgi.c

/* [<][>][^][v][top][bottom][index][help] */

DEFINITIONS

This source file includes following definitions.
  1. fcgi_shutdown_thread
  2. fcgi_signal_handler
  3. fcgi_in_shutdown
  4. fcgi_init
  5. fcgi_is_fastcgi
  6. fcgi_shutdown
  7. prepare_named_pipe_acl
  8. is_port_number
  9. fcgi_listen
  10. fcgi_init_request
  11. safe_write
  12. safe_read
  13. fcgi_make_header
  14. fcgi_get_params
  15. fcgi_free_var
  16. fcgi_read_request
  17. fcgi_read
  18. fcgi_close
  19. fcgi_accept_request
  20. open_packet
  21. close_packet
  22. fcgi_flush
  23. fcgi_write
  24. fcgi_finish_request
  25. fcgi_getenv
  26. fcgi_putenv
  27. fcgi_impersonate

/*
   +----------------------------------------------------------------------+
   | PHP Version 5                                                        |
   +----------------------------------------------------------------------+
   | Copyright (c) 1997-2008 The PHP Group                                |
   +----------------------------------------------------------------------+
   | This source file is subject to version 3.01 of the PHP license,      |
   | that is bundled with this package in the file LICENSE, and is        |
   | available through the world-wide-web at the following url:           |
   | http://www.php.net/license/3_01.txt                                  |
   | If you did not receive a copy of the PHP license and are unable to   |
   | obtain it through the world-wide-web, please send a note to          |
   | license@php.net so we can mail you a copy immediately.               |
   +----------------------------------------------------------------------+
   | Authors: Dmitry Stogov <dmitry@zend.com>                             |
   +----------------------------------------------------------------------+
*/

/* $Id: fastcgi.c,v 1.4.2.13.2.30 2008/04/03 10:24:44 dmitry Exp $ */

#include "php.h"
#include "fastcgi.h"

#include <string.h>
#include <stdlib.h>
#include <stdio.h>
#include <stdarg.h>
#include <errno.h>

#ifdef _WIN32

#include <windows.h>

        typedef unsigned int in_addr_t;

        struct sockaddr_un {
                short   sun_family;
                char    sun_path[MAXPATHLEN];
        };

        static HANDLE fcgi_accept_mutex = INVALID_HANDLE_VALUE;
        static int is_impersonate = 0;

#define FCGI_LOCK(fd) \
        if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
                DWORD ret; \
                while ((ret = WaitForSingleObject(fcgi_accept_mutex, 1000)) == WAIT_TIMEOUT) { \
                        if (in_shutdown) return -1; \
                } \
                if (ret == WAIT_FAILED) { \
                        fprintf(stderr, "WaitForSingleObject() failed\n"); \
                        return -1; \
                } \
        }

#define FCGI_UNLOCK(fd) \
        if (fcgi_accept_mutex != INVALID_HANDLE_VALUE) { \
                ReleaseMutex(fcgi_accept_mutex); \
        }

#else

# include <sys/types.h>
# include <sys/stat.h>
# include <unistd.h>
# include <fcntl.h>
# include <sys/socket.h>
# include <sys/un.h>
# include <netinet/in.h>
# include <arpa/inet.h>
# include <netdb.h>
# include <signal.h>

# define closesocket(s) close(s)

# if defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
#  include <sys/poll.h>
# endif
# if defined(HAVE_SYS_SELECT_H)
#  include <sys/select.h>
# endif

#ifndef INADDR_NONE
#define INADDR_NONE ((unsigned long) -1)
#endif

# ifndef HAVE_SOCKLEN_T
        typedef unsigned int socklen_t;
# endif

# ifdef USE_LOCKING
#  define FCGI_LOCK(fd)                                                         \
        do {                                                                                    \
                struct flock lock;                                                      \
                lock.l_type = F_WRLCK;                                          \
                lock.l_start = 0;                                                       \
                lock.l_whence = SEEK_SET;                                       \
                lock.l_len = 0;                                                         \
                if (fcntl(fd, F_SETLKW, &lock) != -1) {         \
                        break;                                                                  \
                } else if (errno != EINTR || in_shutdown) {     \
                        return -1;                                                              \
                }                                                                                       \
        } while (1)

#  define FCGI_UNLOCK(fd)                                                       \
        do {                                                                                    \
                int orig_errno = errno;                                         \
                while (1) {                                                                     \
                        struct flock lock;                                              \
                        lock.l_type = F_UNLCK;                                  \
                        lock.l_start = 0;                                               \
                        lock.l_whence = SEEK_SET;                               \
                        lock.l_len = 0;                                                 \
                        if (fcntl(fd, F_SETLK, &lock) != -1) {  \
                                break;                                                          \
                        } else if (errno != EINTR) {                    \
                                return -1;                                                      \
                        }                                                                               \
                }                                                                                       \
                errno = orig_errno;                                                     \
        } while (0)
# else
#  define FCGI_LOCK(fd)
#  define FCGI_UNLOCK(fd)
# endif

#endif

typedef union _sa_t {
        struct sockaddr     sa;
        struct sockaddr_un  sa_unix;
        struct sockaddr_in  sa_inet;
} sa_t;

typedef struct _fcgi_mgmt_rec {
        char*  name;
        char   name_len;
        char   val;
} fcgi_mgmt_rec;

static const fcgi_mgmt_rec fcgi_mgmt_vars[] = {
        {"FCGI_MAX_CONNS",  sizeof("FCGI_MAX_CONNS")-1,  1},
        {"FCGI_MAX_REQS",   sizeof("FCGI_MAX_REQS")-1,   1},
        {"FCGI_MPXS_CONNS", sizeof("FCGI_MPXS_CONNS")-1, 0}
};


static int is_initialized = 0;
static int is_fastcgi = 0;
static int in_shutdown = 0;
static in_addr_t *allowed_clients = NULL;

#ifdef _WIN32

static DWORD WINAPI fcgi_shutdown_thread(LPVOID arg)
{
        HANDLE shutdown_event = (HANDLE) arg;
        WaitForSingleObject(shutdown_event, INFINITE);
        in_shutdown = 1;
        return 0;
}

#else

static void fcgi_signal_handler(int signo)
{
        if (signo == SIGUSR1 || signo == SIGTERM) {
                in_shutdown = 1;
        }
}

#endif

int fcgi_in_shutdown(void)
{
        return in_shutdown;
}

int fcgi_init(void)
{
        if (!is_initialized) {
#ifdef _WIN32
# if 0
                /* TODO: Support for TCP sockets */
                WSADATA wsaData;

                if (WSAStartup(MAKEWORD(2,0), &wsaData)) {
                        fprintf(stderr, "Error starting Windows Sockets.  Error: %d", WSAGetLastError());
                        return 0;
                }
# endif
                is_initialized = 1;

                if ((GetStdHandle(STD_OUTPUT_HANDLE) == INVALID_HANDLE_VALUE) &&
                    (GetStdHandle(STD_ERROR_HANDLE)  == INVALID_HANDLE_VALUE) &&
                    (GetStdHandle(STD_INPUT_HANDLE)  != INVALID_HANDLE_VALUE)) {
                        char *str;
                        DWORD pipe_mode = PIPE_READMODE_BYTE | PIPE_WAIT;
                        HANDLE pipe = GetStdHandle(STD_INPUT_HANDLE);

                        SetNamedPipeHandleState(pipe, &pipe_mode, NULL, NULL);

                        str = getenv("_FCGI_SHUTDOWN_EVENT_");
                        if (str != NULL) {
                                HANDLE shutdown_event = (HANDLE) atoi(str);
                                if (!CreateThread(NULL, 0, fcgi_shutdown_thread,
                                                  shutdown_event, 0, NULL)) {
                                        return -1;
                                }
                        }
                        str = getenv("_FCGI_MUTEX_");
                        if (str != NULL) {
                                fcgi_accept_mutex = (HANDLE) atoi(str);
                        }
                        return is_fastcgi = 1;
                } else {
                        return is_fastcgi = 0;
                }
#else
                sa_t sa;
                socklen_t len = sizeof(sa);

                is_initialized = 1;
                errno = 0;
                if (getpeername(0, (struct sockaddr *)&sa, &len) != 0 && errno == ENOTCONN) {
                        struct sigaction new_sa, old_sa;

                        sigemptyset(&new_sa.sa_mask);
                        new_sa.sa_flags = 0;
                        new_sa.sa_handler = fcgi_signal_handler;
                        sigaction(SIGUSR1, &new_sa, NULL);
                        sigaction(SIGTERM, &new_sa, NULL);
                        sigaction(SIGPIPE, NULL, &old_sa);
                        if (old_sa.sa_handler == SIG_DFL) {
                                sigaction(SIGPIPE, &new_sa, NULL);
                        }

                        return is_fastcgi = 1;
                } else {
                        return is_fastcgi = 0;
                }
#endif
        }
        return is_fastcgi;
}


int fcgi_is_fastcgi(void)
{
        if (!is_initialized) {
                return fcgi_init();
        } else {
                return is_fastcgi;
        }
}

void fcgi_shutdown(void)
{
        is_fastcgi = 0;
}

#ifdef _WIN32
/* Do some black magic with the NT security API.
 * We prepare a DACL (Discretionary Access Control List) so that
 * we, the creator, are allowed all access, while "Everyone Else"
 * is only allowed to read and write to the pipe.
 * This avoids security issues on shared hosts where a luser messes
 * with the lower-level pipe settings and screws up the FastCGI service.
 */
static PACL prepare_named_pipe_acl(PSECURITY_DESCRIPTOR sd, LPSECURITY_ATTRIBUTES sa)
{
  DWORD req_acl_size;
  char everyone_buf[32], owner_buf[32];
  PSID sid_everyone, sid_owner;
  SID_IDENTIFIER_AUTHORITY
    siaWorld = SECURITY_WORLD_SID_AUTHORITY,
    siaCreator = SECURITY_CREATOR_SID_AUTHORITY;
  PACL acl;

  sid_everyone = (PSID)&everyone_buf;
  sid_owner = (PSID)&owner_buf;

  req_acl_size = sizeof(ACL) +
    (2 * ((sizeof(ACCESS_ALLOWED_ACE) - sizeof(DWORD)) + GetSidLengthRequired(1)));

  acl = malloc(req_acl_size);

  if (acl == NULL) {
    return NULL;
  }

  if (!InitializeSid(sid_everyone, &siaWorld, 1)) {
    goto out_fail;
  }
  *GetSidSubAuthority(sid_everyone, 0) = SECURITY_WORLD_RID;

  if (!InitializeSid(sid_owner, &siaCreator, 1)) {
    goto out_fail;
  }
  *GetSidSubAuthority(sid_owner, 0) = SECURITY_CREATOR_OWNER_RID;

  if (!InitializeAcl(acl, req_acl_size, ACL_REVISION)) {
    goto out_fail;
  }

  if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_GENERIC_READ | FILE_GENERIC_WRITE, sid_everyone)) {
    goto out_fail;
  }

  if (!AddAccessAllowedAce(acl, ACL_REVISION, FILE_ALL_ACCESS, sid_owner)) {
    goto out_fail;
  }

  if (!InitializeSecurityDescriptor(sd, SECURITY_DESCRIPTOR_REVISION)) {
    goto out_fail;
  }

  if (!SetSecurityDescriptorDacl(sd, TRUE, acl, FALSE)) {
    goto out_fail;
  }

  sa->lpSecurityDescriptor = sd;

  return acl;

out_fail:
  free(acl);
  return NULL;
}
#endif

static int is_port_number(const char *bindpath)
{
        while (*bindpath) {
                if (*bindpath < '0' || *bindpath > '9') {
                        return 0;
                }
                bindpath++;
        }
        return 1;
}

int fcgi_listen(const char *path, int backlog)
{
        char     *s;
        int       tcp = 0;
        char      host[MAXPATHLEN];
        short     port = 0;
        int       listen_socket;
        sa_t      sa;
        socklen_t sock_len;
#ifdef SO_REUSEADDR
# ifdef _WIN32
        BOOL reuse = 1;
# else
        int reuse = 1;
# endif
#endif

        if ((s = strchr(path, ':'))) {
                port = atoi(s+1);
                if (port != 0 && (s-path) < MAXPATHLEN) {
                        strncpy(host, path, s-path);
                        host[s-path] = '\0';
                        tcp = 1;
                }
        } else if (is_port_number(path)) {
                port = atoi(path);
                if (port != 0) {
                        host[0] = '\0';
                        tcp = 1;
                }
        }

        /* Prepare socket address */
        if (tcp) {
                memset(&sa.sa_inet, 0, sizeof(sa.sa_inet));
                sa.sa_inet.sin_family = AF_INET;
                sa.sa_inet.sin_port = htons(port);
                sock_len = sizeof(sa.sa_inet);

                if (!*host || !strncmp(host, "*", sizeof("*")-1)) {
                        sa.sa_inet.sin_addr.s_addr = htonl(INADDR_ANY);
                } else {
                        sa.sa_inet.sin_addr.s_addr = inet_addr(host);
                        if (sa.sa_inet.sin_addr.s_addr == INADDR_NONE) {
                                struct hostent *hep;

                                hep = gethostbyname(host);
                                if (!hep || hep->h_addrtype != AF_INET || !hep->h_addr_list[0]) {
                                        fprintf(stderr, "Cannot resolve host name '%s'!\n", host);
                                        return -1;
                                } else if (hep->h_addr_list[1]) {
                                        fprintf(stderr, "Host '%s' has multiple addresses. You must choose one explicitly!\n", host);
                                        return -1;
                                }
                                sa.sa_inet.sin_addr.s_addr = ((struct in_addr*)hep->h_addr_list[0])->s_addr;
                        }
                }
        } else {
#ifdef _WIN32
            SECURITY_DESCRIPTOR  sd;
        SECURITY_ATTRIBUTES  sa;
            PACL                 acl;
                HANDLE namedPipe;

                memset(&sa, 0, sizeof(sa));
                sa.nLength = sizeof(sa);
                sa.bInheritHandle = FALSE;
                acl = prepare_named_pipe_acl(&sd, &sa);

                namedPipe = CreateNamedPipe(path,
                        PIPE_ACCESS_DUPLEX | FILE_FLAG_OVERLAPPED,
                        PIPE_TYPE_BYTE | PIPE_WAIT | PIPE_READMODE_BYTE,
                        PIPE_UNLIMITED_INSTANCES,
                        8192, 8192, 0, &sa);
                if (namedPipe == INVALID_HANDLE_VALUE) {
                        return -1;
                }               
                listen_socket = _open_osfhandle((long)namedPipe, 0);
                if (!is_initialized) {
                        fcgi_init();
                }
                is_fastcgi = 1;
                return listen_socket;

#else
                int path_len = strlen(path);

                if (path_len >= sizeof(sa.sa_unix.sun_path)) {
                        fprintf(stderr, "Listening socket's path name is too long.\n");
                        return -1;
                }

                memset(&sa.sa_unix, 0, sizeof(sa.sa_unix));
                sa.sa_unix.sun_family = AF_UNIX;
                memcpy(sa.sa_unix.sun_path, path, path_len + 1);
                sock_len = (size_t)(((struct sockaddr_un *)0)->sun_path)        + path_len;
#ifdef HAVE_SOCKADDR_UN_SUN_LEN
                sa.sa_unix.sun_len = sock_len;
#endif
                unlink(path);
#endif
        }

        /* Create, bind socket and start listen on it */
        if ((listen_socket = socket(sa.sa.sa_family, SOCK_STREAM, 0)) < 0 ||
#ifdef SO_REUSEADDR
            setsockopt(listen_socket, SOL_SOCKET, SO_REUSEADDR, (char*)&reuse, sizeof(reuse)) < 0 ||
#endif
            bind(listen_socket, (struct sockaddr *) &sa, sock_len) < 0 ||
            listen(listen_socket, backlog) < 0) {

                fprintf(stderr, "Cannot bind/listen socket - [%d] %s.\n",errno, strerror(errno));
                return -1;
        }

        if (!tcp) {
                chmod(path, 0777);
        } else {
            char *ip = getenv("FCGI_WEB_SERVER_ADDRS");
            char *cur, *end;
            int n;
            
            if (ip) {
                ip = strdup(ip);
                cur = ip;
                n = 0;
                while (*cur) {
                        if (*cur == ',') n++;
                        cur++;
                }
                allowed_clients = malloc(sizeof(in_addr_t) * (n+2));
                n = 0;
                cur = ip;
                while (cur) {
                        end = strchr(cur, ',');
                        if (end) {
                                *end = 0;
                                end++;
                        }
                        allowed_clients[n] = inet_addr(cur);
                        if (allowed_clients[n] == INADDR_NONE) {
                                        fprintf(stderr, "Wrong IP address '%s' in FCGI_WEB_SERVER_ADDRS\n", cur);
                        }
                        n++;
                        cur = end;
                }
                allowed_clients[n] = INADDR_NONE;
                        free(ip);
                }
        }

        if (!is_initialized) {
                fcgi_init();
        }
        is_fastcgi = 1;

#ifdef _WIN32
        if (tcp) {
                listen_socket = _open_osfhandle((long)listen_socket, 0);
        }
#endif
        return listen_socket;
}

void fcgi_init_request(fcgi_request *req, int listen_socket)
{
        memset(req, 0, sizeof(fcgi_request));
        req->listen_socket = listen_socket;
        req->fd = -1;
        req->id = -1;

        req->in_len = 0;
        req->in_pad = 0;

        req->out_hdr  = NULL;
        req->out_pos  = req->out_buf;

#ifdef _WIN32
        req->tcp = !GetNamedPipeInfo((HANDLE)_get_osfhandle(req->listen_socket), NULL, NULL, NULL, NULL);
#endif
}

static inline ssize_t safe_write(fcgi_request *req, const void *buf, size_t count)
{
        int    ret;
        size_t n = 0;

        do {
                errno = 0;
#ifdef _WIN32
                if (!req->tcp) {
                        ret = write(req->fd, ((char*)buf)+n, count-n);
                } else {
                        ret = send(req->fd, ((char*)buf)+n, count-n, 0);
                        if (ret <= 0) {
                                errno = WSAGetLastError();
                        }
                }
#else
                ret = write(req->fd, ((char*)buf)+n, count-n);
#endif
                if (ret > 0) {
                        n += ret;
                } else if (ret <= 0 && errno != 0 && errno != EINTR) {
                        return ret;
                }
        } while (n != count);
        return n;
}

static inline ssize_t safe_read(fcgi_request *req, const void *buf, size_t count)
{
        int    ret;
        size_t n = 0;

        do {
                errno = 0;
#ifdef _WIN32
                if (!req->tcp) {
                        ret = read(req->fd, ((char*)buf)+n, count-n);
                } else {
                        ret = recv(req->fd, ((char*)buf)+n, count-n, 0);
                        if (ret <= 0) {
                                errno = WSAGetLastError();
                        }
                }
#else
                ret = read(req->fd, ((char*)buf)+n, count-n);
#endif
                if (ret > 0) {
                        n += ret;
                } else if (ret == 0 && errno == 0) {
                        return n;
                } else if (ret <= 0 && errno != 0 && errno != EINTR) {
                        return ret;
                }
        } while (n != count);
        return n;
}

static inline int fcgi_make_header(fcgi_header *hdr, fcgi_request_type type, int req_id, int len)
{
        int pad = ((len + 7) & ~7) - len;

        hdr->contentLengthB0 = (unsigned char)(len & 0xff);
        hdr->contentLengthB1 = (unsigned char)((len >> 8) & 0xff);
        hdr->paddingLength = (unsigned char)pad;
        hdr->requestIdB0 = (unsigned char)(req_id & 0xff);
        hdr->requestIdB1 = (unsigned char)((req_id >> 8) & 0xff);
        hdr->reserved = 0;
        hdr->type = type;
        hdr->version = FCGI_VERSION_1;
        if (pad) {
                memset(((unsigned char*)hdr) + sizeof(fcgi_header) + len, 0, pad);
        }
        return pad;
}

static int fcgi_get_params(fcgi_request *req, unsigned char *p, unsigned char *end)
{
        char buf[128];
        char *tmp = buf;
        int buf_size = sizeof(buf);
        int name_len, val_len;
        char *s;
        int ret = 1;

        while (p < end) {
                name_len = *p++;
                if (name_len >= 128) {
                        name_len = ((name_len & 0x7f) << 24);
                        name_len |= (*p++ << 16);
                        name_len |= (*p++ << 8);
                        name_len |= *p++;
                }
                val_len = *p++;
                if (val_len >= 128) {
                        val_len = ((val_len & 0x7f) << 24);
                        val_len |= (*p++ << 16);
                        val_len |= (*p++ << 8);
                        val_len |= *p++;
                }
                if (name_len + val_len < 0 ||
                    name_len + val_len > end - p) {
                        /* Malformated request */
                        ret = 0;
                        break;
                }
                if (name_len+1 >= buf_size) {
                        buf_size = name_len + 64;
                        tmp = (tmp == buf ? emalloc(buf_size): erealloc(tmp, buf_size));
                }
                memcpy(tmp, p, name_len);
                tmp[name_len] = 0;
                s = zend_strndup((char*)p + name_len, val_len);
                zend_hash_update(&req->env, tmp, name_len+1, &s, sizeof(char*), NULL);
                p += name_len + val_len;
        }
        if (tmp != buf && tmp != NULL) {
                efree(tmp);
        }
        return ret;
}

static void fcgi_free_var(char **s)
{
        free(*s);
}

static int fcgi_read_request(fcgi_request *req)
{
        fcgi_header hdr;
        int len, padding;
        unsigned char buf[FCGI_MAX_LENGTH+8];

        req->keep = 0;
        req->in_len = 0;
        req->out_hdr = NULL;
        req->out_pos = req->out_buf;
        zend_hash_init(&req->env, 0, NULL, (void (*)(void *)) fcgi_free_var, 1);

        if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
            hdr.version < FCGI_VERSION_1) {
                return 0;
        }

        len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
        padding = hdr.paddingLength;

        while (hdr.type == FCGI_STDIN && len == 0) {
                if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
                    hdr.version < FCGI_VERSION_1) {
                        return 0;
                }

                len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
                padding = hdr.paddingLength;
        }

        if (len + padding > FCGI_MAX_LENGTH) {
                return 0;
        }

        req->id = (hdr.requestIdB1 << 8) + hdr.requestIdB0;

        if (hdr.type == FCGI_BEGIN_REQUEST && len == sizeof(fcgi_begin_request)) {
                char *val;

                if (safe_read(req, buf, len+padding) != len+padding) {
                        return 0;
                }

                req->keep = (((fcgi_begin_request*)buf)->flags & FCGI_KEEP_CONN);
                switch ((((fcgi_begin_request*)buf)->roleB1 << 8) + ((fcgi_begin_request*)buf)->roleB0) {
                        case FCGI_RESPONDER:
                                val = strdup("RESPONDER");
                                zend_hash_update(&req->env, "FCGI_ROLE", sizeof("FCGI_ROLE"), &val, sizeof(char*), NULL);
                                break;
                        case FCGI_AUTHORIZER:
                                val = strdup("AUTHORIZER");
                                zend_hash_update(&req->env, "FCGI_ROLE", sizeof("FCGI_ROLE"), &val, sizeof(char*), NULL);
                                break;
                        case FCGI_FILTER:
                                val = strdup("FILTER");
                                zend_hash_update(&req->env, "FCGI_ROLE", sizeof("FCGI_ROLE"), &val, sizeof(char*), NULL);
                                break;
                        default:
                                return 0;
                }

                if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
                    hdr.version < FCGI_VERSION_1) {
                        return 0;
                }

                len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
                padding = hdr.paddingLength;

                while (hdr.type == FCGI_PARAMS && len > 0) {
                        if (len + padding > FCGI_MAX_LENGTH) {
                                return 0;
                        }

                        if (safe_read(req, buf, len+padding) != len+padding) {
                                req->keep = 0;
                                return 0;
                        }

                        if (!fcgi_get_params(req, buf, buf+len)) {
                                req->keep = 0;
                                return 0;
                        }

                        if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
                            hdr.version < FCGI_VERSION_1) {
                                req->keep = 0;
                                return 0;
                        }
                        len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
                        padding = hdr.paddingLength;
                }
        } else if (hdr.type == FCGI_GET_VALUES) {
                int j;
                unsigned char *p = buf + sizeof(fcgi_header);

                if (safe_read(req, buf, len+padding) != len+padding) {
                        req->keep = 0;
                        return 0;
                }

                if (!fcgi_get_params(req, buf, buf+len)) {
                        req->keep = 0;
                        return 0;
                }

                for (j = 0; j < sizeof(fcgi_mgmt_vars)/sizeof(fcgi_mgmt_vars[0]); j++) {
                        if (zend_hash_exists(&req->env, fcgi_mgmt_vars[j].name, fcgi_mgmt_vars[j].name_len+1) == 0) {
                                sprintf((char*)p, "%c%c%s%c", fcgi_mgmt_vars[j].name_len, 1, fcgi_mgmt_vars[j].name, fcgi_mgmt_vars[j].val);
                                p += fcgi_mgmt_vars[j].name_len + 3;
                        }
                }
                len = p - buf - sizeof(fcgi_header);
                len += fcgi_make_header((fcgi_header*)buf, FCGI_GET_VALUES_RESULT, 0, len);
                if (safe_write(req, buf, sizeof(fcgi_header)+len) != (int)sizeof(fcgi_header)+len) {
                        req->keep = 0;
                        return 0;
                }
                return 0;
        } else {
                return 0;
        }

        return 1;
}

int fcgi_read(fcgi_request *req, char *str, int len)
{
        int ret, n, rest;
        fcgi_header hdr;
        unsigned char buf[255];

        n = 0;
        rest = len;
        while (rest > 0) {
                if (req->in_len == 0) {
                        if (safe_read(req, &hdr, sizeof(fcgi_header)) != sizeof(fcgi_header) ||
                            hdr.version < FCGI_VERSION_1 ||
                            hdr.type != FCGI_STDIN) {
                                req->keep = 0;
                                return 0;
                        }
                        req->in_len = (hdr.contentLengthB1 << 8) | hdr.contentLengthB0;
                        req->in_pad = hdr.paddingLength;
                        if (req->in_len == 0) {
                                return n;
                        }
                }

                if (req->in_len >= rest) {
                        ret = safe_read(req, str, rest);
                } else {
                        ret = safe_read(req, str, req->in_len);
                }
                if (ret < 0) {
                        req->keep = 0;
                        return ret;
                } else if (ret > 0) {
                        req->in_len -= ret;
                        rest -= ret;
                        n += ret;
                        str += ret;
                        if (req->in_len == 0) {
                                if (req->in_pad) {
                                        if (safe_read(req, buf, req->in_pad) != req->in_pad) {
                                                req->keep = 0;
                                                return ret;
                                        }
                                }
                        } else {
                                return n;
                        }
                } else {
                        return n;
                }
        }
        return n;
}

static inline void fcgi_close(fcgi_request *req, int force, int destroy)
{
        if (destroy) {
                zend_hash_destroy(&req->env);
        }

#ifdef _WIN32
        if (is_impersonate && !req->tcp) {
                RevertToSelf();
        }
#endif

        if ((force || !req->keep) && req->fd >= 0) {
#ifdef _WIN32
                if (!req->tcp) {
                        HANDLE pipe = (HANDLE)_get_osfhandle(req->fd);

                        if (!force) {
                                FlushFileBuffers(pipe);
                        }
                        DisconnectNamedPipe(pipe);
                } else {
                        if (!force) {
                                char buf[8];

                                shutdown(req->fd, 1);
                                while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
                        }
                        closesocket(req->fd);
                }
#else
                if (!force) {
                        char buf[8];

                        shutdown(req->fd, 1);
                        while (recv(req->fd, buf, sizeof(buf), 0) > 0) {}
                }
                close(req->fd);
#endif
                req->fd = -1;
        }
}

int fcgi_accept_request(fcgi_request *req)
{
#ifdef _WIN32
        HANDLE pipe;
        OVERLAPPED ov;
#endif
        fcgi_finish_request(req);

        while (1) {
                if (req->fd < 0) {
                        while (1) {
                                if (in_shutdown) {
                                        return -1;
                                }
#ifdef _WIN32
                                if (!req->tcp) {
                                        pipe = (HANDLE)_get_osfhandle(req->listen_socket);
                                        FCGI_LOCK(req->listen_socket);
                                        ov.hEvent = CreateEvent(NULL, TRUE, FALSE, NULL);
                                        if (!ConnectNamedPipe(pipe, &ov)) {
                                                errno = GetLastError();
                                                if (errno == ERROR_IO_PENDING) {
                                                        while (WaitForSingleObject(ov.hEvent, 1000) == WAIT_TIMEOUT) {
                                                                if (in_shutdown) {
                                                                        CloseHandle(ov.hEvent);
                                                                        FCGI_UNLOCK(req->listen_socket);
                                                                        return -1;
                                                                }
                                                        }
                                                } else if (errno != ERROR_PIPE_CONNECTED) {
                                                }
                                        }
                                        CloseHandle(ov.hEvent);
                                        req->fd = req->listen_socket;
                                        FCGI_UNLOCK(req->listen_socket);
                                } else {
                                        SOCKET listen_socket = (SOCKET)_get_osfhandle(req->listen_socket);
#else
                                {
                                        int listen_socket = req->listen_socket;
#endif
                                        sa_t sa;
                                        socklen_t len = sizeof(sa);

                                        FCGI_LOCK(req->listen_socket);
                                        req->fd = accept(listen_socket, (struct sockaddr *)&sa, &len);
                                        FCGI_UNLOCK(req->listen_socket);
                                        if (req->fd >= 0 && allowed_clients) {
                                                int n = 0;
                                                int allowed = 0;

                                        while (allowed_clients[n] != INADDR_NONE) {
                                                if (allowed_clients[n] == sa.sa_inet.sin_addr.s_addr) {
                                                        allowed = 1;
                                                        break;
                                                }
                                                n++;
                                        }
                                                if (!allowed) {
                                                        fprintf(stderr, "Connection from disallowed IP address '%s' is dropped.\n", inet_ntoa(sa.sa_inet.sin_addr));
                                                        closesocket(req->fd);
                                                        req->fd = -1;
                                                        continue;
                                                }
                                        }
                                }

#ifdef _WIN32
                                if (req->fd < 0 && (in_shutdown || errno != EINTR)) {
#else
                                if (req->fd < 0 && (in_shutdown || (errno != EINTR && errno != ECONNABORTED))) {
#endif
                                        return -1;
                                }

#ifdef _WIN32
                                break;
#else
                                if (req->fd >= 0) {
#if defined(HAVE_SYS_POLL_H) && defined(HAVE_POLL)
                                        struct pollfd fds;
                                        int ret;

                                        fds.fd = req->fd;
                                        fds.events = POLLIN;
                                        fds.revents = 0;
                                        do {
                                                errno = 0;
                                                ret = poll(&fds, 1, 5000);
                                        } while (ret < 0 && errno == EINTR);
                                        if (ret > 0 && (fds.revents & POLLIN)) {
                                                break;
                                        }
                                        fcgi_close(req, 1, 0);
#else
                                        if (req->fd < FD_SETSIZE) {
                                                struct timeval tv = {5,0};
                                                fd_set set;
                                                int ret;

                                                FD_ZERO(&set);
                                                FD_SET(req->fd, &set);
                                                do {
                                                        errno = 0;
                                                        ret = select(req->fd + 1, &set, NULL, NULL, &tv) >= 0;
                                                } while (ret < 0 && errno == EINTR);
                                                if (ret > 0 && FD_ISSET(req->fd, &set)) {
                                                        break;
                                                }
                                                fcgi_close(req, 1, 0);
                                        } else {
                                                fprintf(stderr, "Too many open file descriptors. FD_SETSIZE limit exceeded.");
                                                fcgi_close(req, 1, 0);
                                        }
#endif
                                }
#endif
                        }
                } else if (in_shutdown) {
                        return -1;
                }
                if (fcgi_read_request(req)) {
#ifdef _WIN32
                        if (is_impersonate && !req->tcp) {
                                pipe = (HANDLE)_get_osfhandle(req->fd);
                                if (!ImpersonateNamedPipeClient(pipe)) {
                                        fcgi_close(req, 1, 1);
                                        continue;
                                }
                        }
#endif
                        return req->fd;
                } else {
                        fcgi_close(req, 1, 1);
                }
        }
}

static inline fcgi_header* open_packet(fcgi_request *req, fcgi_request_type type)
{
        req->out_hdr = (fcgi_header*) req->out_pos;
        req->out_hdr->type = type;
        req->out_pos += sizeof(fcgi_header);
        return req->out_hdr;
}

static inline void close_packet(fcgi_request *req)
{
        if (req->out_hdr) {
                int len = req->out_pos - ((unsigned char*)req->out_hdr + sizeof(fcgi_header));

                req->out_pos += fcgi_make_header(req->out_hdr, (fcgi_request_type)req->out_hdr->type, req->id, len);
                req->out_hdr = NULL;
        }
}

int fcgi_flush(fcgi_request *req, int close)
{
        int len;

        close_packet(req);

        len = req->out_pos - req->out_buf;

        if (close) {
                fcgi_end_request_rec *rec = (fcgi_end_request_rec*)(req->out_pos);

                fcgi_make_header(&rec->hdr, FCGI_END_REQUEST, req->id, sizeof(fcgi_end_request));
                rec->body.appStatusB3 = 0;
                rec->body.appStatusB2 = 0;
                rec->body.appStatusB1 = 0;
                rec->body.appStatusB0 = 0;
                rec->body.protocolStatus = FCGI_REQUEST_COMPLETE;
                len += sizeof(fcgi_end_request_rec);
        }

        if (safe_write(req, req->out_buf, len) != len) {
                req->keep = 0;
                return 0;
        }

        req->out_pos = req->out_buf;
        return 1;
}

int fcgi_write(fcgi_request *req, fcgi_request_type type, const char *str, int len)
{
        int limit, rest;

        if (len <= 0) {
                return 0;
        }

        if (req->out_hdr && req->out_hdr->type != type) {
                close_packet(req);
        }
#if 0
        /* Unoptimized, but clear version */
        rest = len;
        while (rest > 0) {
                limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);

                if (!req->out_hdr) {
                        if (limit < sizeof(fcgi_header)) {
                                if (!fcgi_flush(req, 0)) {
                                        return -1;
                                }
                        }
                        open_packet(req, type);
                }
                limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
                if (rest < limit) {
                        memcpy(req->out_pos, str, rest);
                        req->out_pos += rest;
                        return len;
                } else {
                        memcpy(req->out_pos, str, limit);
                        req->out_pos += limit;
                        rest -= limit;
                        str += limit;
                        if (!fcgi_flush(req, 0)) {
                                return -1;
                        }
                }
        }
#else
        /* Optimized version */
        limit = sizeof(req->out_buf) - (req->out_pos - req->out_buf);
        if (!req->out_hdr) {
                limit -= sizeof(fcgi_header);
                if (limit < 0) limit = 0;
        }

        if (len < limit) {
                if (!req->out_hdr) {
                        open_packet(req, type);
                }
                memcpy(req->out_pos, str, len);
                req->out_pos += len;
        } else if (len - limit < sizeof(req->out_buf) - sizeof(fcgi_header)) {
                if (!req->out_hdr) {
                        open_packet(req, type);
                }
                if (limit > 0) {
                        memcpy(req->out_pos, str, limit);
                        req->out_pos += limit;
                }
                if (!fcgi_flush(req, 0)) {
                        return -1;
                }
                if (len > limit) {
                        open_packet(req, type);
                        memcpy(req->out_pos, str + limit, len - limit);
                        req->out_pos += len - limit;
                }
        } else {
                int pos = 0;
                int pad;

                close_packet(req);
                while ((len - pos) > 0xffff) {
                        open_packet(req, type);
                        fcgi_make_header(req->out_hdr, type, req->id, 0xfff8);
                        req->out_hdr = NULL;
                        if (!fcgi_flush(req, 0)) {
                                return -1;
                        }
                        if (safe_write(req, str + pos, 0xfff8) != 0xfff8) {
                                req->keep = 0;
                                return -1;
                        }
                        pos += 0xfff8;
                }               
                
                pad = (((len - pos) + 7) & ~7) - (len - pos);
                rest = pad ? 8 - pad : 0;

                open_packet(req, type);
                fcgi_make_header(req->out_hdr, type, req->id, (len - pos) - rest);
                req->out_hdr = NULL;
                if (!fcgi_flush(req, 0)) {
                        return -1;
                }
                if (safe_write(req, str + pos, (len - pos) - rest) != (len - pos) - rest) {
                        req->keep = 0;
                        return -1;
                }
                if (pad) {
                        open_packet(req, type);
                        memcpy(req->out_pos, str + len - rest,  rest);
                        req->out_pos += rest;
                }
        }
#endif
        return len;
}

int fcgi_finish_request(fcgi_request *req)
{
        if (req->fd >= 0) {
                fcgi_flush(req, 1);
                fcgi_close(req, 0, 1);
        }
        return 1;
}

char* fcgi_getenv(fcgi_request *req, const char* var, int var_len)
{
        char **val;

        if (!req) return NULL;

        if (zend_hash_find(&req->env, (char*)var, var_len+1, (void**)&val) == SUCCESS) {
                return *val;
        }
        return NULL;
}

char* fcgi_putenv(fcgi_request *req, char* var, int var_len, char* val)
{
        if (var && req) {
                if (val == NULL) {
                        zend_hash_del(&req->env, var, var_len+1);
                } else {
                        char **ret;

                        val = strdup(val);
                        if (zend_hash_update(&req->env, var, var_len+1, &val, sizeof(char*), (void**)&ret) == SUCCESS) {
                                return *ret;
                        }
                }
        }
        return NULL;
}

#ifdef _WIN32
void fcgi_impersonate(void)
{
        char *os_name;

        os_name = getenv("OS");
        if (os_name && stricmp(os_name, "Windows_NT") == 0) {
                is_impersonate = 1;
        }
}
#endif

/*
 * Local variables:
 * tab-width: 4
 * c-basic-offset: 4
 * End:
 * vim600: sw=4 ts=4 fdm=marker
 * vim<600: sw=4 ts=4
 */

/* [<][>][^][v][top][bottom][index][help] */