nginx/src/core/ngx_file.c

385 lines
9.5 KiB
C
Raw Normal View History

2003-04-12 00:01:14 +08:00
/*
* Copyright (C) Igor Sysoev
*/
2003-04-12 00:01:14 +08:00
#include <ngx_config.h>
#include <ngx_core.h>
static ngx_atomic_uint_t ngx_temp_number;
static ngx_atomic_uint_t ngx_random;
2003-04-28 23:06:39 +08:00
ssize_t
ngx_write_chain_to_temp_file(ngx_temp_file_t *tf, ngx_chain_t *chain)
2003-10-27 16:53:49 +08:00
{
ngx_int_t rc;
2003-10-27 16:53:49 +08:00
if (tf->file.fd == NGX_INVALID_FILE) {
2003-11-03 06:56:18 +08:00
rc = ngx_create_temp_file(&tf->file, tf->path, tf->pool,
2003-10-27 16:53:49 +08:00
tf->persistent);
2003-12-09 04:48:12 +08:00
2003-10-27 16:53:49 +08:00
if (rc == NGX_ERROR || rc == NGX_AGAIN) {
return rc;
}
if (!tf->persistent && tf->warn) {
ngx_log_error(NGX_LOG_WARN, tf->file.log, 0, tf->warn);
}
}
2003-11-03 06:56:18 +08:00
return ngx_write_chain_to_file(&tf->file, chain, tf->offset, tf->pool);
2003-10-27 16:53:49 +08:00
}
ngx_int_t
ngx_create_temp_file(ngx_file_t *file, ngx_path_t *path, ngx_pool_t *pool,
int persistent)
2003-04-12 00:01:14 +08:00
{
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
ngx_err_t err;
ngx_atomic_uint_t n;
ngx_pool_cleanup_file_t *cln;
2003-04-12 00:01:14 +08:00
file->name.len = path->name.len + 1 + path->len + NGX_ATOMIC_T_LEN;
2003-04-12 00:01:14 +08:00
file->name.data = ngx_palloc(pool, file->name.len + 1);
if (file->name.data == NULL) {
return NGX_ERROR;
}
2003-04-12 00:01:14 +08:00
#if 0
for (i = 0; i < file->name.len; i++) {
file->name.data[i] = 'X';
}
#endif
ngx_memcpy(file->name.data, path->name.data, path->name.len);
n = ngx_next_temp_number(0);
2003-04-28 23:06:39 +08:00
2003-04-12 00:01:14 +08:00
for ( ;; ) {
ngx_sprintf(file->name.data + path->name.len + 1 + path->len,
"%0muA%Z", n);
2003-04-12 00:01:14 +08:00
ngx_create_hashed_filename(file, path);
2004-03-31 23:26:46 +08:00
#if 1
2003-04-12 00:01:14 +08:00
file->fd = ngx_open_tempfile(file->name.data, persistent);
2004-03-17 05:26:01 +08:00
#else
2003-11-26 04:44:56 +08:00
file->fd = ngx_open_tempfile(file->name.data, 1);
2004-03-17 05:26:01 +08:00
#endif
2003-04-12 00:01:14 +08:00
2004-02-12 01:08:49 +08:00
ngx_log_debug1(NGX_LOG_DEBUG_CORE, file->log, 0,
"temp fd:%d", file->fd);
2003-04-15 01:04:58 +08:00
2003-04-12 00:01:14 +08:00
if (file->fd != NGX_INVALID_FILE) {
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
cln = ngx_palloc(pool, sizeof(ngx_pool_cleanup_file_t));
if (cln == NULL) {
return NGX_ERROR;
}
cln->fd = file->fd;
cln->name = file->name.data;
cln->log = pool->log;
if (ngx_pool_cleanup_add(pool, ngx_pool_cleanup_file, cln) == NULL)
{
return NGX_ERROR;
}
2003-04-12 00:01:14 +08:00
return NGX_OK;
}
err = ngx_errno;
if (err == NGX_EEXIST) {
n = ngx_next_temp_number(1);
2003-04-12 00:01:14 +08:00
continue;
}
2004-04-26 04:13:21 +08:00
if ((path->level[0] == 0)
|| (err != NGX_ENOENT
#if (NGX_WIN32)
2004-04-26 04:13:21 +08:00
&& err != NGX_ENOTDIR
2003-04-12 00:01:14 +08:00
#endif
))
{
2003-04-12 00:01:14 +08:00
ngx_log_error(NGX_LOG_CRIT, file->log, err,
ngx_open_tempfile_n " \"%s\" failed",
file->name.data);
return NGX_ERROR;
}
if (ngx_create_path(file, path) == NGX_ERROR) {
return NGX_ERROR;
2003-05-21 21:28:21 +08:00
}
2003-04-12 00:01:14 +08:00
}
}
void
ngx_create_hashed_filename(ngx_file_t *file, ngx_path_t *path)
2003-04-12 00:01:14 +08:00
{
ngx_uint_t i, name, pos, level;
2003-04-12 00:01:14 +08:00
name = file->name.len;
pos = path->name.len + 1;
file->name.data[path->name.len + path->len] = '/';
for (i = 0; i < 3; i++) {
level = path->level[i];
if (level == 0) {
break;
}
name -= level;
file->name.data[pos - 1] = '/';
ngx_memcpy(&file->name.data[pos], &file->name.data[name], level);
pos += level + 1;
}
2004-02-12 01:08:49 +08:00
ngx_log_debug1(NGX_LOG_DEBUG_CORE, file->log, 0,
"hashed path: %s", file->name.data);
2003-04-12 00:01:14 +08:00
}
ngx_int_t
ngx_create_path(ngx_file_t *file, ngx_path_t *path)
2003-04-12 00:01:14 +08:00
{
int i, pos;
ngx_err_t err;
pos = path->name.len;
for (i = 0; i < 3; i++) {
if (path->level[i] == 0) {
break;
}
pos += path->level[i] + 1;
file->name.data[pos] = '\0';
2004-02-12 01:08:49 +08:00
ngx_log_debug1(NGX_LOG_DEBUG_CORE, file->log, 0,
"temp file: \"%s\"", file->name.data);
2003-04-12 00:01:14 +08:00
2003-11-17 05:49:42 +08:00
if (ngx_create_dir(file->name.data) == NGX_FILE_ERROR) {
2003-04-12 00:01:14 +08:00
err = ngx_errno;
if (err != NGX_EEXIST) {
ngx_log_error(NGX_LOG_CRIT, file->log, err,
2003-11-17 05:49:42 +08:00
ngx_create_dir_n " \"%s\" failed",
file->name.data);
2003-04-12 00:01:14 +08:00
return NGX_ERROR;
}
}
file->name.data[pos] = '/';
}
return NGX_OK;
}
2003-04-28 23:06:39 +08:00
void
ngx_init_temp_number(void)
2003-04-28 23:06:39 +08:00
{
ngx_temp_number = 0;
ngx_random = 123456;
2003-04-28 23:06:39 +08:00
}
ngx_atomic_uint_t
ngx_next_temp_number(ngx_uint_t collision)
2003-04-28 23:06:39 +08:00
{
if (collision) {
ngx_temp_number += ngx_random;
}
return ngx_temp_number++;
}
2003-10-23 00:38:26 +08:00
char *
ngx_conf_set_path_slot(ngx_conf_t *cf, ngx_command_t *cmd, void *conf)
2003-10-23 00:38:26 +08:00
{
char *p = conf;
ssize_t level;
2004-03-16 15:10:12 +08:00
ngx_uint_t i, n;
2003-10-23 00:38:26 +08:00
ngx_str_t *value;
ngx_path_t *path, **slot;
2003-10-23 00:38:26 +08:00
slot = (ngx_path_t **) (p + cmd->offset);
2003-10-23 00:38:26 +08:00
if (*slot) {
2003-10-23 00:38:26 +08:00
return "is duplicate";
}
path = ngx_pcalloc(cf->pool, sizeof(ngx_path_t));
if (path == NULL) {
return NGX_CONF_ERROR;
}
2003-10-23 00:38:26 +08:00
value = cf->args->elts;
2003-10-23 00:38:26 +08:00
path->name = value[1];
path->len = 0;
path->cleaner = (ngx_gc_handler_pt) cmd->post;
path->conf_file = cf->conf_file->file.name.data;
path->line = cf->conf_file->line;
2003-10-23 00:38:26 +08:00
for (i = 0, n = 2; n < cf->args->nelts; i++, n++) {
2003-11-21 14:30:49 +08:00
level = ngx_atoi(value[n].data, value[n].len);
if (level == NGX_ERROR || level == 0) {
2003-10-23 00:38:26 +08:00
return "invalid value";
}
2003-11-26 04:44:56 +08:00
path->level[i] = level;
path->len += level + 1;
2003-10-23 00:38:26 +08:00
}
while (i < 3) {
path->level[i++] = 0;
}
*slot = path;
if (ngx_add_path(cf, slot) == NGX_ERROR) {
return NGX_CONF_ERROR;
}
return NGX_CONF_OK;
}
ngx_int_t
ngx_add_path(ngx_conf_t *cf, ngx_path_t **slot)
{
ngx_uint_t i, n;
ngx_path_t *path, **p;
path = *slot;
p = cf->cycle->pathes.elts;
for (i = 0; i < cf->cycle->pathes.nelts; i++) {
if (p[i]->name.len == path->name.len
&& ngx_strcmp(p[i]->name.data, path->name.data) == 0)
{
for (n = 0; n < 3; n++) {
if (p[i]->level[n] != path->level[n]) {
if (path->conf_file == NULL) {
if (p[i]->conf_file == NULL) {
ngx_log_error(NGX_LOG_EMERG, cf->log, 0,
"the default path name \"%V\" has "
"the same name as another default path, "
"but the different levels, you need to "
"redefine one of them in http section",
&p[i]->name);
return NGX_ERROR;
}
ngx_log_error(NGX_LOG_EMERG, cf->log, 0,
"the path name \"%V\" in %s:%ui has "
"the same name as default path, but "
"the different levels, you need to "
"define default path in http section",
&p[i]->name, p[i]->conf_file, p[i]->line);
return NGX_ERROR;
}
ngx_conf_log_error(NGX_LOG_EMERG, cf, 0,
"the same path name \"%V\" in %s:%ui "
"has the different levels than",
&p[i]->name, p[i]->conf_file, p[i]->line);
return NGX_ERROR;
}
if (p[i]->level[n] == 0) {
break;
}
}
*slot = p[i];
return NGX_OK;
}
}
p = ngx_array_push(&cf->cycle->pathes);
if (p == NULL) {
return NGX_ERROR;
}
*p = path;
2003-11-19 05:34:08 +08:00
return NGX_OK;
2003-10-23 00:38:26 +08:00
}
ngx_int_t
ngx_create_pathes(ngx_cycle_t *cycle, ngx_uid_t user)
{
ngx_err_t err;
ngx_uint_t i;
ngx_path_t **path;
#if !(NGX_WIN32)
ngx_file_info_t fi;
#endif
path = cycle->pathes.elts;
for (i = 0; i < cycle->pathes.nelts; i++) {
if (ngx_create_dir(path[i]->name.data) == NGX_FILE_ERROR) {
err = ngx_errno;
if (err != NGX_EEXIST) {
ngx_log_error(NGX_LOG_EMERG, cycle->log, err,
ngx_create_dir_n " \"%s\" failed",
path[i]->name.data);
return NGX_ERROR;
}
}
if (user == (ngx_uid_t) -1) {
continue;
}
#if !(NGX_WIN32)
if (ngx_file_info((const char *) path[i]->name.data, &fi) == -1) {
ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_errno,
ngx_file_info_n " \"%s\" failed", path[i]->name.data);
return NGX_ERROR;
}
if (fi.st_uid != user) {
if (chown((const char *) path[i]->name.data, user, -1) == -1) {
ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_errno,
"chown(\"%s\", %d) failed",
path[i]->name.data, user);
return NGX_ERROR;
}
}
if ((fi.st_mode & (S_IRUSR|S_IWUSR|S_IXUSR))
!= (S_IRUSR|S_IWUSR|S_IXUSR))
{
fi.st_mode |= (S_IRUSR|S_IWUSR|S_IXUSR);
if (chmod((const char *) path[i]->name.data, fi.st_mode) == -1) {
ngx_log_error(NGX_LOG_EMERG, cycle->log, ngx_errno,
"chmod() \"%s\" failed", path[i]->name.data);
return NGX_ERROR;
}
}
#endif
}
return NGX_OK;
}