apache: core directive AllowEncodedSlashes
[hcoop/domtool2.git] / src / plugins / apache.sml
... / ...
CommitLineData
1(* HCoop Domtool (http://hcoop.sourceforge.net/)
2 * Copyright (c) 2006-2009, Adam Chlipala
3 * Copyright (c) 2013 Clinton Ebadi
4 *
5 * This program is free software; you can redistribute it and/or
6 * modify it under the terms of the GNU General Public License
7 * as published by the Free Software Foundation; either version 2
8 * of the License, or (at your option) any later version.
9 *
10 * This program is distributed in the hope that it will be useful,
11 * but WITHOUT ANY WARRANTY; without even the implied warranty of
12 * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the
13 * GNU General Public License for more details.
14 *
15 * You should have received a copy of the GNU General Public License
16 * along with this program; if not, write to the Free Software
17 * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301, USA.
18 *)
19
20(* Apache HTTPD handling *)
21
22structure Apache :> APACHE = struct
23
24open Ast
25
26val dl = ErrorMsg.dummyLoc
27
28fun webNode node =
29 List.exists (fn (x, _) => x = node) Config.Apache.webNodes_all
30 orelse (Domain.hasPriv "www"
31 andalso List.exists (fn (x, _) => x = node) Config.Apache.webNodes_admin)
32
33val _ = Env.type_one "web_node"
34 Env.string
35 webNode
36
37val _ = Env.registerFunction ("web_node_to_node",
38 fn [e] => SOME e
39 | _ => NONE)
40
41fun webPlace (EApp ((EVar "web_place_default", _), (EString node, _)), _) =
42 SOME (node, Domain.nodeIp node)
43 | webPlace (EApp ((EApp ((EVar "web_place", _), (EString node, _)), _), (EString ip, _)), _) =
44 SOME (node, ip)
45 | webPlace _ = NONE
46
47fun webPlaceDefault node = (EApp ((EVar "web_place_default", dl), (EString node, dl)), dl)
48
49val _ = Env.registerFunction ("web_place_to_web_node",
50 fn [e] => Option.map (fn (node, _) => (EString node, dl)) (webPlace e)
51 | _ => NONE)
52
53val _ = Env.registerFunction ("web_place_to_node",
54 fn [e] => Option.map (fn (node, _) => (EString node, dl)) (webPlace e)
55 | _ => NONE)
56
57val _ = Env.registerFunction ("web_place_to_ip",
58 fn [e] => Option.map (fn (_, ip) => (EString ip, dl)) (webPlace e)
59 | _ => NONE)
60
61val _ = Env.type_one "proxy_port"
62 Env.int
63 (fn n => n > 1024)
64
65fun validProxyTarget default s =
66 case String.fields (fn ch => ch = #":") s of
67 "http" :: host :: rest =>
68 let
69 val rest = String.concatWith ":" rest
70 in
71 if List.exists (fn h' => host = h') (map (fn h => String.concat ["//", h]) Config.Apache.proxyHosts)
72 then
73 CharVector.all (fn ch => Char.isPrint ch andalso not (Char.isSpace ch)
74 andalso ch <> #"\"" andalso ch <> #"'") rest
75 andalso case String.fields (fn ch => ch = #"/") rest of
76 port :: _ =>
77 (case Int.fromString port of
78 NONE => default s
79 | SOME n => n > 1024 orelse default s)
80 | _ => default s
81 else
82 default s
83 end
84 | _ => default s
85
86val _ = Env.type_one "proxy_target"
87 Env.string
88 (validProxyTarget (fn s => List.exists (fn s' => s = s') (Config.Apache.proxyTargets @ ["!"])))
89
90val _ = Env.type_one "proxy_reverse_target"
91 Env.string
92 (validProxyTarget (fn s => List.exists (fn s' => s = s') Config.Apache.proxyTargets))
93
94val _ = Env.type_one "rewrite_arg"
95 Env.string
96 (CharVector.all Char.isAlphaNum)
97
98val _ = Env.type_one "suexec_flag"
99 Env.bool
100 (fn b => b orelse Domain.hasPriv "www")
101
102val _ = Env.type_one "regexp"
103 Env.string
104 Pcre.validRegexp
105
106fun validLocation s =
107 size s > 0 andalso size s < 1000 andalso CharVector.all
108 (fn ch => Char.isAlphaNum ch
109 orelse ch = #"-"
110 orelse ch = #"_"
111 orelse ch = #"."
112 orelse ch = #"/"
113 orelse ch = #"~") s
114
115val _ = Env.type_one "location"
116 Env.string
117 validLocation
118
119fun validCert s = Acl.query {user = Domain.getUser (),
120 class = "cert",
121 value = s}
122
123fun validCaCert s = Acl.query {user = Domain.getUser (),
124 class = "cacert",
125 value = s}
126
127val _ = Env.type_one "ssl_cert_path"
128 Env.string
129 validCert
130
131val _ = Env.type_one "ssl_cacert_path"
132 Env.string
133 validCaCert
134
135fun ssl e = case e of
136 (EVar "no_ssl", _) => SOME NONE
137 | (EApp ((EVar "use_cert", _), s), _) => Option.map SOME (Env.string s)
138 | _ => NONE
139
140fun validExtension s =
141 size s > 0
142 andalso size s < 20
143 andalso CharVector.all (fn ch => Char.isAlphaNum ch orelse ch = #"_") s
144
145val _ = Env.type_one "file_extension"
146 Env.string
147 validExtension
148
149val _ = Env.registerFunction ("defaultServerAdmin",
150 fn [] => SOME (EString (Domain.getUser () ^ "@" ^ Config.defaultDomain), dl)
151 | _ => NONE)
152
153val redirect_code = fn (EVar "temp", _) => SOME "temp"
154 | (EVar "permanent", _) => SOME "permanent"
155 | (EVar "seeother", _) => SOME "seeother"
156 | (EVar "redir300", _) => SOME "300"
157 | (EVar "redir301", _) => SOME "301"
158 | (EVar "redir302", _) => SOME "302"
159 | (EVar "redir303", _) => SOME "303"
160 | (EVar "redir304", _) => SOME "304"
161 | (EVar "redir305", _) => SOME "305"
162 | (EVar "redir307", _) => SOME "307"
163 | (EVar "notfound", _) => SOME "404"
164 | _ => NONE
165
166val flag = fn (EVar "redirect", _) => SOME "R"
167 | (EVar "forbidden", _) => SOME "F"
168 | (EVar "gone", _) => SOME "G"
169 | (EVar "last", _) => SOME "L"
170 | (EVar "chain", _) => SOME "C"
171 | (EVar "nosubreq", _) => SOME "NS"
172 | (EVar "nocase", _) => SOME "NC"
173 | (EVar "qsappend", _) => SOME "QSA"
174 | (EVar "noescape", _) => SOME "NE"
175 | (EVar "passthrough", _) => SOME "PT"
176 | (EApp ((EVar "mimeType", _), e), _) =>
177 Option.map (fn s => "T=" ^ s) (Env.string e)
178 | (EApp ((EVar "redirectWith", _), e), _) =>
179 Option.map (fn s => "R=" ^ s) (redirect_code e)
180 | (EApp ((EVar "skip", _), e), _) =>
181 Option.map (fn n => "S=" ^ Int.toString n) (Env.int e)
182 | (EApp ((EApp ((EVar "env", _), e1), _), e2), _) =>
183 (case Env.string e1 of
184 NONE => NONE
185 | SOME s1 => Option.map (fn s2 => "E=" ^ s1 ^ ":" ^ s2)
186 (Env.string e2))
187
188 | _ => NONE
189
190val cond_flag = fn (EVar "cond_nocase", _) => SOME "NC"
191 | (EVar "ornext", _) => SOME "OR"
192 | _ => NONE
193
194val apache_option = fn (EVar "execCGI", _) => SOME "ExecCGI"
195 | (EVar "includesNOEXEC", _) => SOME "IncludesNOEXEC"
196 | (EVar "indexes", _) => SOME "Indexes"
197 | (EVar "followSymLinks", _) => SOME "FollowSymLinks"
198 | (EVar "multiViews", _) => SOME "MultiViews"
199 | _ => NONE
200
201val autoindex_width = fn (EVar "autofit", _) => SOME "*"
202 | (EApp ((EVar "characters", _), n), _) =>
203 Option.map Int.toString (Env.int n)
204 | _ => NONE
205
206val autoindex_option = fn (EApp ((EVar "descriptionWidth", _), w), _) =>
207 Option.map (fn w => ("DescriptionWidth", SOME w))
208 (autoindex_width w)
209 | (EVar "fancyIndexing", _) => SOME ("FancyIndexing", NONE)
210 | (EVar "foldersFirst", _) => SOME ("FoldersFirst", NONE)
211 | (EVar "htmlTable", _) => SOME ("HTMLTable", NONE)
212 | (EVar "iconsAreLinks", _) => SOME ("IconsAreLinks", NONE)
213 | (EApp ((EVar "iconHeight", _), n), _) =>
214 Option.map (fn w => ("IconHeight", SOME (Int.toString w)))
215 (Env.int n)
216 | (EApp ((EVar "iconWidth", _), n), _) =>
217 Option.map (fn w => ("IconWidth", SOME (Int.toString w)))
218 (Env.int n)
219 | (EVar "ignoreCase", _) => SOME ("IgnoreCase", NONE)
220 | (EVar "ignoreClient", _) => SOME ("IgnoreClient", NONE)
221 | (EApp ((EVar "nameWidth", _), w), _) =>
222 Option.map (fn w => ("NameWidth", SOME w))
223 (autoindex_width w)
224 | (EVar "scanHtmlTitles", _) => SOME ("ScanHTMLTitles", NONE)
225 | (EVar "suppressColumnSorting", _) => SOME ("SuppressColumnSorting", NONE)
226 | (EVar "suppressDescription", _) => SOME ("SuppressDescription", NONE)
227 | (EVar "suppressHtmlPreamble", _) => SOME ("SuppressHTMLPreamble", NONE)
228 | (EVar "suppressIcon", _) => SOME ("SuppressIcon", NONE)
229 | (EVar "suppressLastModified", _) => SOME ("SuppressLastModified", NONE)
230 | (EVar "suppressRules", _) => SOME ("SuppressRules", NONE)
231 | (EVar "suppressSize", _) => SOME ("SuppressSize", NONE)
232 | (EVar "trackModified", _) => SOME ("TrackModified", NONE)
233 | (EVar "versionSort", _) => SOME ("VersionSort", NONE)
234 | (EVar "xhtml", _) => SOME ("XHTML", NONE)
235
236 | _ => NONE
237
238val interval_base = fn (EVar "access", _) => SOME "access"
239 | (EVar "modification", _) => SOME "modification"
240 | _ => NONE
241
242val interval = fn (EVar "years", _) => SOME "years"
243 | (EVar "months", _) => SOME "months"
244 | (EVar "weeks", _) => SOME "weeks"
245 | (EVar "days", _) => SOME "days"
246 | (EVar "hours", _) => SOME "hours"
247 | (EVar "minutes", _) => SOME "minutes"
248 | (EVar "seconds", _) => SOME "seconds"
249 | _ => NONE
250
251val vhostsChanged = ref false
252val logDeleted = ref false
253val delayedLogMoves = ref (fn () => ())
254
255val () = Slave.registerPreHandler
256 (fn () => (vhostsChanged := false;
257 logDeleted := false;
258 delayedLogMoves := (fn () => print "Executing delayed log moves/deletes.\n")))
259
260fun findVhostUser fname =
261 let
262 val inf = TextIO.openIn fname
263
264 fun loop () =
265 case TextIO.inputLine inf of
266 NONE => NONE
267 | SOME line =>
268 if String.isPrefix "# Owner: " line then
269 case String.tokens Char.isSpace line of
270 [_, _, user] => SOME user
271 | _ => NONE
272 else
273 loop ()
274 in
275 loop ()
276 before TextIO.closeIn inf
277 end handle _ => NONE
278
279val webNodes_full = Config.Apache.webNodes_all @ Config.Apache.webNodes_admin
280
281fun isVersion1 node =
282 List.exists (fn (n, {version = ConfigTypes.APACHE_1_3, ...}) => n = node
283 | _ => false) webNodes_full
284
285fun imVersion1 () = isVersion1 (Slave.hostname ())
286
287fun isWaklog node =
288 List.exists (fn (n, {auth = ConfigTypes.MOD_WAKLOG, ...}) => n = node
289 | _ => false) webNodes_full
290
291fun down () = if imVersion1 () then Config.Apache.down1 else Config.Apache.down
292fun undown () = if imVersion1 () then Config.Apache.undown1 else Config.Apache.undown
293fun reload () = if imVersion1 () then Config.Apache.reload1 else Config.Apache.reload
294fun fixperms () = if imVersion1 () then Config.Apache.fixperms1 else Config.Apache.fixperms
295
296fun logDir {user, node, vhostId} =
297 String.concat [Config.Apache.logDirOf (isVersion1 node) user,
298 "/",
299 node,
300 "/",
301 vhostId]
302
303fun realLogDir {user, node, vhostId} =
304 String.concat [Config.Apache.realLogDirOf user,
305 "/",
306 node,
307 "/",
308 vhostId]
309
310val () = Slave.registerFileHandler (fn fs =>
311 let
312 val spl = OS.Path.splitDirFile (#file fs)
313 in
314 if String.isSuffix ".vhost" (#file spl)
315 orelse String.isSuffix ".vhost_ssl" (#file spl) then let
316 val realVhostFile = OS.Path.joinDirFile
317 {dir = Config.Apache.confDir,
318 file = #file spl}
319
320 val user = findVhostUser (#file fs)
321 val oldUser = case #action fs of
322 Slave.Delete false => user
323 | _ => findVhostUser realVhostFile
324 in
325 if (oldUser = NONE andalso #action fs <> Slave.Add)
326 orelse (user = NONE andalso not (Slave.isDelete (#action fs))) then
327 print ("Can't find user in " ^ #file fs ^ " or " ^ realVhostFile ^ "! Taking no action.\n")
328 else
329 let
330 val vhostId = if OS.Path.ext (#file spl) = SOME "vhost_ssl" then
331 OS.Path.base (#file spl) ^ ".ssl"
332 else
333 OS.Path.base (#file spl)
334
335 fun realLogDir user =
336 logDir {user = valOf user,
337 node = Slave.hostname (),
338 vhostId = vhostId}
339
340 fun backupLogs () =
341 OS.Path.joinDirFile
342 {dir = Config.Apache.backupLogDirOf
343 (isVersion1 (Slave.hostname ())),
344 file = vhostId}
345 in
346 vhostsChanged := true;
347 case #action fs of
348 Slave.Delete _ =>
349 let
350 val ldir = realLogDir oldUser
351 val dlm = !delayedLogMoves
352 in
353 if !logDeleted then
354 ()
355 else
356 ((*ignore (OS.Process.system (down ()));*)
357 ignore (OS.Process.system (fixperms ()));
358 logDeleted := true);
359 ignore (OS.Process.system (Config.rm
360 ^ " -rf "
361 ^ realVhostFile));
362 delayedLogMoves := (fn () => (dlm ();
363 Slave.moveDirCreate {from = ldir,
364 to = backupLogs ()}))
365 end
366 | Slave.Add =>
367 let
368 val rld = realLogDir user
369 in
370 ignore (OS.Process.system (Config.cp
371 ^ " "
372 ^ #file fs
373 ^ " "
374 ^ realVhostFile));
375 if Posix.FileSys.access (rld, []) then
376 ()
377 else
378 Slave.moveDirCreate {from = backupLogs (),
379 to = rld}
380 end
381
382 | _ =>
383 (ignore (OS.Process.system (Config.cp
384 ^ " "
385 ^ #file fs
386 ^ " "
387 ^ realVhostFile));
388 if user <> oldUser then
389 let
390 val old = realLogDir oldUser
391 val rld = realLogDir user
392
393 val dlm = !delayedLogMoves
394 in
395 if !logDeleted then
396 ()
397 else
398 ((*ignore (OS.Process.system (down ()));*)
399 logDeleted := true);
400 delayedLogMoves := (fn () => (dlm ();
401 ignore (OS.Process.system (Config.rm
402 ^ " -rf "
403 ^ realLogDir oldUser))));
404 if Posix.FileSys.access (rld, []) then
405 ()
406 else
407 Slave.mkDirAll rld
408 end
409 else
410 ())
411 end
412 end
413 else
414 ()
415 end)
416
417val () = Slave.registerPostHandler
418 (fn () =>
419 (if !vhostsChanged then
420 (Slave.shellF ([reload ()],
421 fn cl => "Error reloading Apache with " ^ cl);
422 if !logDeleted then !delayedLogMoves () else ())
423 else
424 ()))
425
426val vhostFiles : (string * TextIO.outstream) list ref = ref []
427fun write' s = app (fn (node, file) => TextIO.output (file, s node)) (!vhostFiles)
428fun write s = app (fn (_, file) => TextIO.output (file, s)) (!vhostFiles)
429
430val rewriteEnabled = ref false
431val localRewriteEnabled = ref false
432val expiresEnabled = ref false
433val localExpiresEnabled = ref false
434val currentVhost = ref ""
435val currentVhostId = ref ""
436val sslEnabled = ref false
437
438val pre = ref (fn _ : {user : string, nodes : string list, id : string, hostname : string} => ())
439fun registerPre f =
440 let
441 val old = !pre
442 in
443 pre := (fn x => (old x; f x))
444 end
445
446val post = ref (fn () => ())
447fun registerPost f =
448 let
449 val old = !post
450 in
451 post := (fn () => (old (); f ()))
452 end
453
454fun doPre x = !pre x
455fun doPost () = !post ()
456
457val aliaser = ref (fn _ : string => ())
458fun registerAliaser f =
459 let
460 val old = !aliaser
461 in
462 aliaser := (fn x => (old x; f x))
463 end
464
465fun vhostPost () = (!post ();
466 write "</VirtualHost>\n";
467 app (TextIO.closeOut o #2) (!vhostFiles))
468
469val php_version = fn (EVar "php5", _) => SOME 5
470 | _ => NONE
471
472fun vhostBody (env, makeFullHost) =
473 let
474 val places = Env.env (Env.list webPlace) (env, "WebPlaces")
475
476 val ssl = Env.env ssl (env, "SSL")
477 val user = Env.env Env.string (env, "User")
478 val group = Env.env Env.string (env, "Group")
479 val docroot = Env.env Env.string (env, "DocumentRoot")
480 val sadmin = Env.env Env.string (env, "ServerAdmin")
481 val suexec = Env.env Env.bool (env, "SuExec")
482 val php = Env.env php_version (env, "PhpVersion")
483
484 val fullHost = makeFullHost (Domain.currentDomain ())
485 val vhostId = fullHost ^ (if Option.isSome ssl then ".ssl" else "")
486 val confFile = fullHost ^ (if Option.isSome ssl then ".vhost_ssl" else ".vhost")
487 in
488 currentVhost := fullHost;
489 currentVhostId := vhostId;
490 sslEnabled := Option.isSome ssl;
491
492 rewriteEnabled := false;
493 localRewriteEnabled := false;
494 expiresEnabled := false;
495 localExpiresEnabled := false;
496 vhostFiles := map (fn (node, ip) =>
497 let
498 val file = Domain.domainFile {node = node,
499 name = confFile}
500
501 val ld = logDir {user = user, node = node, vhostId = vhostId}
502 in
503 TextIO.output (file, "# Owner: ");
504 TextIO.output (file, user);
505 TextIO.output (file, "\n<VirtualHost ");
506 TextIO.output (file, ip);
507 TextIO.output (file, ":");
508 TextIO.output (file, case ssl of
509 SOME _ => "443"
510 | NONE => "80");
511 TextIO.output (file, ">\n");
512 TextIO.output (file, "\tErrorLog ");
513 TextIO.output (file, ld);
514 TextIO.output (file, "/error.log\n\tCustomLog ");
515 TextIO.output (file, ld);
516 TextIO.output (file, "/access.log combined\n");
517 TextIO.output (file, "\tServerName ");
518 TextIO.output (file, fullHost);
519 app
520 (fn dom => (TextIO.output (file, "\n\tServerAlias ");
521 TextIO.output (file, makeFullHost dom)))
522 (Domain.currentAliasDomains ());
523
524 if suexec then
525 if isVersion1 node then
526 (TextIO.output (file, "\n\tUser ");
527 TextIO.output (file, user);
528 TextIO.output (file, "\n\tGroup ");
529 TextIO.output (file, group))
530 else
531 (TextIO.output (file, "\n\tSuexecUserGroup ");
532 TextIO.output (file, user);
533 TextIO.output (file, " ");
534 TextIO.output (file, group);
535 TextIO.output (file, "\n\tsuPHP_UserGroup ");
536 TextIO.output (file, user);
537 TextIO.output (file, " ");
538 TextIO.output (file, group))
539 else
540 ();
541
542 if isWaklog node then
543 (TextIO.output (file, "\n\tWaklogEnabled on\n\tWaklogLocationPrincipal ");
544 TextIO.output (file, user);
545 TextIO.output (file, "/daemon@HCOOP.NET /etc/keytabs/user.daemon/");
546 TextIO.output (file, user))
547 else
548 ();
549
550 TextIO.output (file, "\n\tDAVLockDB /var/lock/apache2/dav/");
551 TextIO.output (file, user);
552 TextIO.output (file, "/DAVLock");
553
554 if php <> Config.Apache.defaultPhpVersion then
555 (TextIO.output (file, "\n\tAddHandler x-httpd-php");
556 TextIO.output (file, Int.toString php);
557 TextIO.output (file, " .php .phtml"))
558 else
559 ();
560
561 (ld, file)
562 end)
563 places;
564 write "\n\tDocumentRoot ";
565 write docroot;
566 write "\n\tServerAdmin ";
567 write sadmin;
568 case ssl of
569 SOME cert =>
570 (write "\n\tSSLEngine on\n\tSSLCertificateFile ";
571 write cert)
572 | NONE => ();
573 write "\n";
574 !pre {user = user, nodes = map #1 places, id = vhostId, hostname = fullHost};
575 app (fn dom => !aliaser (makeFullHost dom)) (Domain.currentAliasDomains ())
576 end
577
578val () = Env.containerV_one "vhost"
579 ("host", Env.string)
580 (fn (env, host) => vhostBody (env, fn dom => host ^ "." ^ dom),
581 vhostPost)
582
583val () = Env.containerV_none "vhostDefault"
584 (fn env => vhostBody (env, fn dom => dom),
585 vhostPost)
586
587val inLocal = ref false
588
589val () = Env.container_one "location"
590 ("prefix", Env.string)
591 (fn prefix =>
592 (write "\t<Location ";
593 write prefix;
594 write ">\n";
595 inLocal := true),
596 fn () => (write "\t</Location>\n";
597 inLocal := false;
598 localRewriteEnabled := false;
599 localExpiresEnabled := false))
600
601val () = Env.container_one "directory"
602 ("directory", Env.string)
603 (fn directory =>
604 (write "\t<Directory ";
605 write directory;
606 write ">\n";
607 inLocal := true),
608 fn () => (write "\t</Directory>\n";
609 inLocal := false;
610 localRewriteEnabled := false;
611 localExpiresEnabled := false))
612
613val () = Env.container_one "filesMatch"
614 ("regexp", Env.string)
615 (fn prefix =>
616 (write "\t<FilesMatch \"";
617 write prefix;
618 write "\">\n"),
619 fn () => (write "\t</FilesMatch>\n";
620 localRewriteEnabled := false;
621 localExpiresEnabled := false))
622
623fun checkRewrite () =
624 if !inLocal then
625 if !localRewriteEnabled then
626 ()
627 else
628 (write "\tRewriteEngine on\n";
629 localRewriteEnabled := true)
630 else if !rewriteEnabled then
631 ()
632 else
633 (write "\tRewriteEngine on\n";
634 rewriteEnabled := true)
635
636fun checkExpires () =
637 if !inLocal then
638 if !localExpiresEnabled then
639 ()
640 else
641 (write "\tExpiresActive on\n";
642 localExpiresEnabled := true)
643 else if !expiresEnabled then
644 ()
645 else
646 (write "\tExpiresActive on\n";
647 expiresEnabled := true)
648
649val () = Env.action_three "localProxyRewrite"
650 ("from", Env.string, "to", Env.string, "port", Env.int)
651 (fn (from, to, port) =>
652 (checkRewrite ();
653 write "\tRewriteRule\t\"";
654 write from;
655 write "\"\thttp://localhost:";
656 write (Int.toString port);
657 write "/";
658 write to;
659 write " [P]\n"))
660
661val () = Env.action_four "expiresByType"
662 ("mime", Env.string, "base", interval_base, "num", Env.int, "inter", interval)
663 (fn (mime, base, num, inter) =>
664 (checkExpires ();
665 write "\tExpiresByType\t\"";
666 write mime;
667 write "\"\t\"";
668 write base;
669 write " plus ";
670 if num < 0 then
671 (write "-";
672 write (Int.toString (~num)))
673 else
674 write (Int.toString num);
675 write " ";
676 write inter;
677 write "\"\n"))
678
679val () = Env.action_two "proxyPass"
680 ("from", Env.string, "to", Env.string)
681 (fn (from, to) =>
682 (write "\tProxyPass\t";
683 write from;
684 write "\t";
685 write to;
686 write "\tretry=0\n"))
687
688val () = Env.action_two "proxyPassReverse"
689 ("from", Env.string, "to", Env.string)
690 (fn (from, to) =>
691 (write "\tProxyPassReverse\t";
692 write from;
693 write "\t";
694 write to;
695 write "\n"))
696
697val () = Env.action_one "proxyPreserveHost"
698 ("enable", Env.bool)
699 (fn (enable) =>
700 (write "\tProxyPreserveHost\t";
701 if enable then write "On" else write "Off";
702 write "\n"))
703
704val () = Env.action_three "rewriteRule"
705 ("from", Env.string, "to", Env.string, "flags", Env.list flag)
706 (fn (from, to, flags) =>
707 (checkRewrite ();
708 write "\tRewriteRule\t\"";
709 write from;
710 write "\"\t\"";
711 write to;
712 write "\"";
713 case flags of
714 [] => ()
715 | flag::rest => (write " [";
716 write flag;
717 app (fn flag => (write ",";
718 write flag)) rest;
719 write "]");
720 write "\n"))
721
722val () = Env.action_three "rewriteCond"
723 ("test", Env.string, "pattern", Env.string, "flags", Env.list cond_flag)
724 (fn (from, to, flags) =>
725 (checkRewrite ();
726 write "\tRewriteCond\t\"";
727 write from;
728 write "\"\t\"";
729 write to;
730 write "\"";
731 case flags of
732 [] => ()
733 | flag::rest => (write " [";
734 write flag;
735 app (fn flag => (write ",";
736 write flag)) rest;
737 write "]");
738 write "\n"))
739
740val () = Env.action_one "rewriteBase"
741 ("prefix", Env.string)
742 (fn prefix =>
743 (checkRewrite ();
744 write "\tRewriteBase\t\"";
745 write prefix;
746 write "\"\n"))
747
748val () = Env.action_one "rewriteLogLevel"
749 ("level", Env.int)
750 (fn level =>
751 (checkRewrite ();
752 write "\tRewriteLog ";
753 write' (fn x => x);
754 write "/rewrite.log\n\tRewriteLogLevel ";
755 write (Int.toString level);
756 write "\n"))
757
758val () = Env.action_two "alias"
759 ("from", Env.string, "to", Env.string)
760 (fn (from, to) =>
761 (write "\tAlias\t";
762 write from;
763 write " ";
764 write to;
765 write "\n"))
766
767val () = Env.action_two "scriptAlias"
768 ("from", Env.string, "to", Env.string)
769 (fn (from, to) =>
770 (write "\tScriptAlias\t";
771 write from;
772 write " ";
773 write to;
774 write "\n"))
775
776val () = Env.action_two "errorDocument"
777 ("code", Env.string, "handler", Env.string)
778 (fn (code, handler) =>
779 let
780 val hasSpaces = CharVector.exists Char.isSpace handler
781
782 fun maybeQuote () =
783 if hasSpaces then
784 write "\""
785 else
786 ()
787 in
788 write "\tErrorDocument\t";
789 write code;
790 write " ";
791 maybeQuote ();
792 write handler;
793 maybeQuote ();
794 write "\n"
795 end)
796
797val () = Env.action_one "options"
798 ("options", Env.list apache_option)
799 (fn opts =>
800 case opts of
801 [] => ()
802 | _ => (write "\tOptions";
803 app (fn opt => (write " "; write opt)) opts;
804 write "\n"))
805
806val () = Env.action_one "set_options"
807 ("options", Env.list apache_option)
808 (fn opts =>
809 case opts of
810 [] => ()
811 | _ => (write "\tOptions";
812 app (fn opt => (write " +"; write opt)) opts;
813 write "\n"))
814
815val () = Env.action_one "unset_options"
816 ("options", Env.list apache_option)
817 (fn opts =>
818 case opts of
819 [] => ()
820 | _ => (write "\tOptions";
821 app (fn opt => (write " -"; write opt)) opts;
822 write "\n"))
823
824val () = Env.action_one "cgiExtension"
825 ("extension", Env.string)
826 (fn ext => (write "\tAddHandler cgi-script ";
827 write ext;
828 write "\n"))
829
830val () = Env.action_one "directoryIndex"
831 ("filenames", Env.list Env.string)
832 (fn opts =>
833 (write "\tDirectoryIndex";
834 app (fn opt => (write " "; write opt)) opts;
835 write "\n"))
836
837val () = Env.action_one "serverAliasHost"
838 ("host", Env.string)
839 (fn host =>
840 (write "\tServerAlias ";
841 write host;
842 write "\n";
843 !aliaser host))
844
845val () = Env.action_one "serverAlias"
846 ("host", Env.string)
847 (fn host =>
848 (app
849 (fn dom =>
850 let
851 val full = host ^ "." ^ dom
852 in
853 write "\tServerAlias ";
854 write full;
855 write "\n";
856 !aliaser full
857 end)
858 (Domain.currentDomains ())))
859
860val () = Env.action_none "serverAliasDefault"
861 (fn () =>
862 (app
863 (fn dom =>
864 (write "\tServerAlias ";
865 write dom;
866 write "\n";
867 !aliaser dom))
868 (Domain.currentDomains ())))
869
870val authType = fn (EVar "basic", _) => SOME "basic"
871 | (EVar "digest", _) => SOME "digest"
872 | (EVar "kerberos", _) => SOME "kerberos"
873 | _ => NONE
874
875fun allowAuthType "kerberos" = !sslEnabled
876 | allowAuthType _ = true
877
878val () = Env.action_one "authType"
879 ("type", authType)
880 (fn ty =>
881 if allowAuthType ty then
882 (write "\tAuthType ";
883 write ty;
884 write "\n";
885 case ty of
886 "kerberos" =>
887 write "\tKrbServiceName apache2\n\tKrb5Keytab /etc/keytabs/service/apache\n\tKrbMethodNegotiate on\n\tKrbMethodK5Passwd on\n\tKrbVerifyKDC on\n\tKrbAuthRealms HCOOP.NET\n\tKrbSaveCredentials on\n"
888 | _ => ())
889 else
890 print "WARNING: Skipped Kerberos authType because this isn't an SSL vhost.\n")
891
892val () = Env.action_one "authName"
893 ("name", Env.string)
894 (fn name =>
895 (write "\tAuthName \"";
896 write name;
897 write "\"\n"))
898
899val () = Env.action_one "authUserFile"
900 ("file", Env.string)
901 (fn name =>
902 (write "\tAuthUserFile ";
903 write name;
904 write "\n"))
905
906val () = Env.action_one "authGroupFile"
907 ("file", Env.string)
908 (fn name =>
909 (write "\tAuthGroupFile ";
910 write name;
911 write "\n"))
912
913val () = Env.action_none "requireValidUser"
914 (fn () => write "\tRequire valid-user\n")
915
916val () = Env.action_one "requireUser"
917 ("users", Env.list Env.string)
918 (fn names =>
919 case names of
920 [] => ()
921 | _ => (write "\tRequire user";
922 app (fn name => (write " "; write name)) names;
923 write "\n"))
924
925val () = Env.action_one "requireGroup"
926 ("groups", Env.list Env.string)
927 (fn names =>
928 case names of
929 [] => ()
930 | _ => (write "\tRequire group";
931 app (fn name => (write " "; write name)) names;
932 write "\n"))
933
934val () = Env.action_none "orderAllowDeny"
935 (fn () => write "\tOrder allow,deny\n")
936
937val () = Env.action_none "orderDenyAllow"
938 (fn () => write "\tOrder deny,allow\n")
939
940val () = Env.action_none "allowFromAll"
941 (fn () => write "\tAllow from all\n")
942
943val () = Env.action_one "allowFrom"
944 ("entries", Env.list Env.string)
945 (fn names =>
946 case names of
947 [] => ()
948 | _ => (write "\tAllow from";
949 app (fn name => (write " "; write name)) names;
950 write "\n"))
951
952val () = Env.action_none "denyFromAll"
953 (fn () => write "\tDeny from all\n")
954
955val () = Env.action_one "denyFrom"
956 ("entries", Env.list Env.string)
957 (fn names =>
958 case names of
959 [] => ()
960 | _ => (write "\tDeny from";
961 app (fn name => (write " "; write name)) names;
962 write "\n"))
963
964val () = Env.action_none "satisfyAll"
965 (fn () => write "\tSatisfy all\n")
966
967val () = Env.action_none "satisfyAny"
968 (fn () => write "\tSatisfy any\n")
969
970val () = Env.action_one "forceType"
971 ("type", Env.string)
972 (fn ty => (write "\tForceType ";
973 write ty;
974 write "\n"))
975
976val () = Env.action_none "forceTypeOff"
977 (fn () => write "\tForceType None\n")
978
979val () = Env.action_two "action"
980 ("what", Env.string, "how", Env.string)
981 (fn (what, how) => (write "\tAction ";
982 write what;
983 write " ";
984 write how;
985 write "\n"))
986
987val () = Env.action_one "addDefaultCharset"
988 ("charset", Env.string)
989 (fn ty => (write "\tAddDefaultCharset ";
990 write ty;
991 write "\n"))
992
993(*val () = Env.action_one "davSvn"
994 ("path", Env.string)
995 (fn path => (write "\tDAV svn\n\tSVNPath ";
996 write path;
997 write "\n"))
998
999val () = Env.action_one "authzSvnAccessFile"
1000 ("path", Env.string)
1001 (fn path => (write "\tAuthzSVNAccessFile ";
1002 write path;
1003 write "\n"))*)
1004
1005val () = Env.action_none "davFilesystem"
1006 (fn path => write "\tDAV filesystem\n")
1007
1008val () = Env.action_two "addDescription"
1009 ("description", Env.string, "patterns", Env.list Env.string)
1010 (fn (desc, pats) =>
1011 case pats of
1012 [] => ()
1013 | _ => (write "\tAddDescription \"";
1014 write (String.toString desc);
1015 write "\"";
1016 app (fn pat => (write " "; write pat)) pats;
1017 write "\n"))
1018
1019val () = Env.action_two "addIcon"
1020 ("icon", Env.string, "patterns", Env.list Env.string)
1021 (fn (icon, pats) =>
1022 case pats of
1023 [] => ()
1024 | _ => (write "\tAddIcon \"";
1025 write icon;
1026 write "\"";
1027 app (fn pat => (write " "; write pat)) pats;
1028 write "\n"))
1029
1030val () = Env.action_one "indexOptions"
1031 ("options", Env.list autoindex_option)
1032 (fn opts =>
1033 case opts of
1034 [] => ()
1035 | _ => (write "\tIndexOptions";
1036 app (fn (opt, arg) =>
1037 (write " ";
1038 write opt;
1039 Option.app (fn arg =>
1040 (write "="; write arg)) arg)) opts;
1041 write "\n"))
1042
1043val () = Env.action_one "indexIgnore"
1044 ("patterns", Env.list Env.string)
1045 (fn pats =>
1046 case pats of
1047 [] => ()
1048 | _ => (write "\tIndexIgnore";
1049 app (fn pat => (write " "; write pat)) pats;
1050 write "\n"))
1051
1052val () = Env.action_one "set_indexOptions"
1053 ("options", Env.list autoindex_option)
1054 (fn opts =>
1055 case opts of
1056 [] => ()
1057 | _ => (write "\tIndexOptions";
1058 app (fn (opt, arg) =>
1059 (write " +";
1060 write opt;
1061 Option.app (fn arg =>
1062 (write "="; write arg)) arg)) opts;
1063 write "\n"))
1064
1065val () = Env.action_one "unset_indexOptions"
1066 ("options", Env.list autoindex_option)
1067 (fn opts =>
1068 case opts of
1069 [] => ()
1070 | _ => (write "\tIndexOptions";
1071 app (fn (opt, _) =>
1072 (write " -";
1073 write opt)) opts;
1074 write "\n"))
1075
1076val () = Env.action_one "headerName"
1077 ("name", Env.string)
1078 (fn name => (write "\tHeaderName ";
1079 write name;
1080 write "\n"))
1081
1082val () = Env.action_one "readmeName"
1083 ("name", Env.string)
1084 (fn name => (write "\tReadmeName ";
1085 write name;
1086 write "\n"))
1087
1088val () = Env.action_two "setEnv"
1089 ("key", Env.string, "value", Env.string)
1090 (fn (key, value) => (write "\tSetEnv \"";
1091 write key;
1092 write "\" \"";
1093 write (String.translate (fn #"\"" => "\\\""
1094 | ch => str ch) value);
1095 write "\"\n"))
1096
1097val () = Env.action_one "diskCache"
1098 ("path", Env.string)
1099 (fn path => (write "\tCacheEnable disk \"";
1100 write path;
1101 write "\"\n"))
1102
1103val () = Env.action_one "phpVersion"
1104 ("version", php_version)
1105 (fn version => (write "\tAddHandler x-httpd-php";
1106 write (Int.toString version);
1107 write " .php .phtml\n"))
1108
1109val () = Env.action_two "addType"
1110 ("mime type", Env.string, "extension", Env.string)
1111 (fn (mt, ext) => (write "\tAddType ";
1112 write mt;
1113 write " ";
1114 write ext;
1115 write "\n"))
1116
1117val filter = fn (EVar "includes", _) => SOME "INCLUDES"
1118 | (EVar "deflate", _) => SOME "DEFLATE"
1119 | _ => NONE
1120
1121val () = Env.action_two "addOutputFilter"
1122 ("filters", Env.list filter, "extensions", Env.list Env.string)
1123 (fn (f :: fs, exts as (_ :: _)) =>
1124 (write "\tAddOutputFilter ";
1125 write f;
1126 app (fn f => (write ";"; write f)) fs;
1127 app (fn ext => (write " "; write ext)) exts;
1128 write "\n")
1129 | _ => ())
1130
1131val () = Env.action_one "sslCertificateChainFile"
1132 ("ssl_cacert_path", Env.string)
1133 (fn cacert =>
1134 if !sslEnabled then
1135 (write "\tSSLCertificateChainFile \"";
1136 write cacert;
1137 write "\"\n")
1138 else
1139 print "WARNING: Skipped sslCertificateChainFile because this isn't an SSL vhost.\n")
1140
1141val () = Domain.registerResetLocal (fn () =>
1142 ignore (OS.Process.system (Config.rm ^ " -rf " ^ Config.Apache.confDir ^ "/*")))
1143
1144val () = Domain.registerDescriber (Domain.considerAll
1145 [Domain.Extension {extension = "vhost",
1146 heading = fn host => "Web vhost " ^ host ^ ":"},
1147 Domain.Extension {extension = "vhost_ssl",
1148 heading = fn host => "SSL web vhost " ^ host ^ ":"}])
1149
1150val () = Env.action_one "allowEncodedSlashes"
1151 ("enable", Env.bool)
1152 (fn enable => (write "\tAllowEncodedSlashes ";
1153 write (if enable then "NoDecode" else "Off");
1154 write "\n"))
1155val () = Env.action_none "testNoHtaccess"
1156 (fn path => write "\tAllowOverride None\n")
1157
1158fun writeWaklogUserFile () =
1159 let
1160 val users = Acl.users ()
1161 val outf = TextIO.openOut Config.Apache.waklogUserFile
1162 in
1163 app (fn user => if String.isSuffix "_admin" user then
1164 ()
1165 else
1166 (TextIO.output (outf, "<Location /~");
1167 TextIO.output (outf, user);
1168 TextIO.output (outf, ">\n\tWaklogEnabled on\n\tWaklogLocationPrincipal ");
1169 TextIO.output (outf, user);
1170 TextIO.output (outf, "/daemon@HCOOP.NET /etc/keytabs/user.daemon/");
1171 TextIO.output (outf, user);
1172 TextIO.output (outf, "\n</Location>\n\n"))) users;
1173 TextIO.closeOut outf
1174 end
1175
1176val () = Domain.registerOnUsersChange writeWaklogUserFile
1177
1178end