]> git.ipfire.org Git - thirdparty/squid.git/blob - src/format/Token.cc
Boilerplate copyright/license adjustment preparation
[thirdparty/squid.git] / src / format / Token.cc
1 #include "squid.h"
2 #include "format/Config.h"
3 #include "format/Token.h"
4 #include "format/TokenTableEntry.h"
5 #include "globals.h"
6 #include "SquidConfig.h"
7 #include "Store.h"
8
9 // Due to token overlaps between 1 and 2 letter tokens (Bug 3310)
10 // We split the token table into sets determined by the token length
11 namespace Format
12 {
13
14 /// 1-char tokens.
15 static TokenTableEntry TokenTable1C[] = {
16
17 {">a", LFT_CLIENT_IP_ADDRESS},
18 {">p", LFT_CLIENT_PORT},
19 {">A", LFT_CLIENT_FQDN},
20
21 {"<a", LFT_SERVER_IP_ADDRESS},
22 {"<p", LFT_SERVER_PORT},
23 {"<A", LFT_SERVER_FQDN_OR_PEER_NAME},
24
25 {">h", LFT_REQUEST_HEADER},
26 {">h", LFT_REQUEST_ALL_HEADERS},
27 {"<h", LFT_REPLY_HEADER},
28 {"<h", LFT_REPLY_ALL_HEADERS},
29
30 {">v", LFT_REQUEST_VERSION_OLD_2X},
31
32 {"%", LFT_PERCENT},
33
34 {NULL, LFT_NONE} /* this must be last */
35 };
36
37 /// 2-char tokens
38 static TokenTableEntry TokenTable2C[] = {
39
40 {">la", LFT_CLIENT_LOCAL_IP},
41 {"la", LFT_LOCAL_LISTENING_IP},
42 {">lp", LFT_CLIENT_LOCAL_PORT},
43 {"lp", LFT_LOCAL_LISTENING_PORT},
44 /*{ "lA", LFT_LOCAL_NAME }, */
45
46 {"<la", LFT_SERVER_LOCAL_IP},
47 {"oa", LFT_SERVER_LOCAL_IP_OLD_27},
48 {"<lp", LFT_SERVER_LOCAL_PORT},
49
50 {"ts", LFT_TIME_SECONDS_SINCE_EPOCH},
51 {"tu", LFT_TIME_SUBSECOND},
52 {"tl", LFT_TIME_LOCALTIME},
53 {"tg", LFT_TIME_GMT},
54 {"tS", LFT_TIME_START},
55 {"tr", LFT_TIME_TO_HANDLE_REQUEST},
56
57 {"<pt", LFT_PEER_RESPONSE_TIME},
58 {"<tt", LFT_TOTAL_SERVER_SIDE_RESPONSE_TIME},
59 {"dt", LFT_DNS_WAIT_TIME},
60
61 {">ha", LFT_ADAPTED_REQUEST_HEADER},
62 {">ha", LFT_ADAPTED_REQUEST_ALL_HEADERS},
63
64 {"un", LFT_USER_NAME},
65 {"ul", LFT_USER_LOGIN},
66 /*{ "ur", LFT_USER_REALM }, */
67 /*{ "us", LFT_USER_SCHEME }, */
68 {"ui", LFT_USER_IDENT},
69 {"ue", LFT_USER_EXTERNAL},
70
71 {"Hs", LFT_HTTP_SENT_STATUS_CODE_OLD_30},
72 {">Hs", LFT_HTTP_SENT_STATUS_CODE},
73 {"<Hs", LFT_HTTP_RECEIVED_STATUS_CODE},
74 /*{ "Ht", LFT_HTTP_STATUS }, */
75 {"<bs", LFT_HTTP_BODY_BYTES_READ},
76
77 {"Ss", LFT_SQUID_STATUS},
78 {"Sh", LFT_SQUID_HIERARCHY},
79
80 {"mt", LFT_MIME_TYPE},
81
82 {">rm", LFT_CLIENT_REQ_METHOD},
83 {">ru", LFT_CLIENT_REQ_URI},
84 {">rs", LFT_CLIENT_REQ_URLSCHEME},
85 {">rd", LFT_CLIENT_REQ_URLDOMAIN},
86 {">rP", LFT_CLIENT_REQ_URLPORT},
87 {">rp", LFT_CLIENT_REQ_URLPATH},
88 /*{">rq", LFT_CLIENT_REQ_QUERY},*/
89 {">rv", LFT_CLIENT_REQ_VERSION},
90
91 {"rm", LFT_REQUEST_METHOD},
92 {"ru", LFT_REQUEST_URI}, /* doesn't include the query-string */
93 {"rp", LFT_REQUEST_URLPATH_OLD_31},
94 /* { "rq", LFT_REQUEST_QUERY }, * / / * the query-string, INCLUDING the leading ? */
95 {"rv", LFT_REQUEST_VERSION},
96 {"rG", LFT_REQUEST_URLGROUP_OLD_2X},
97
98 {"<rm", LFT_SERVER_REQ_METHOD},
99 {"<ru", LFT_SERVER_REQ_URI},
100 {"<rs", LFT_SERVER_REQ_URLSCHEME},
101 {"<rd", LFT_SERVER_REQ_URLDOMAIN},
102 {"<rP", LFT_SERVER_REQ_URLPORT},
103 {"<rp", LFT_SERVER_REQ_URLPATH},
104 /*{"<rq", LFT_SERVER_REQ_QUERY},*/
105 {"<rv", LFT_SERVER_REQ_VERSION},
106
107 {">st", LFT_CLIENT_REQUEST_SIZE_TOTAL },
108 {">sh", LFT_CLIENT_REQUEST_SIZE_HEADERS },
109 /*{ ">sb", LFT_REQUEST_SIZE_BODY }, */
110 /*{ ">sB", LFT_REQUEST_SIZE_BODY_NO_TE }, */
111
112 {"<st", LFT_ADAPTED_REPLY_SIZE_TOTAL}, // XXX: adapted should be code: <sta
113 {"<sH", LFT_REPLY_HIGHOFFSET},
114 {"<sS", LFT_REPLY_OBJECTSIZE},
115 {"<sh", LFT_ADAPTED_REPLY_SIZE_HEADERS }, // XXX: adapted should be code: <sha
116 /*{ "<sb", LFT_REPLY_SIZE_BODY }, */
117 /*{ "<sB", LFT_REPLY_SIZE_BODY_NO_TE }, */
118
119 {"st", LFT_CLIENT_IO_SIZE_TOTAL}, // XXX: total from client should be stC ??
120 /*{"stP", LFT_SERVER_IO_SIZE_TOTAL},*/
121
122 {"et", LFT_TAG},
123 {"ea", LFT_EXT_LOG},
124 {"sn", LFT_SEQUENCE_NUMBER},
125
126 {NULL, LFT_NONE} /* this must be last */
127 };
128
129 /// Miscellaneous >2 byte tokens
130 static TokenTableEntry TokenTableMisc[] = {
131 {">eui", LFT_CLIENT_EUI},
132 {">qos", LFT_CLIENT_LOCAL_TOS},
133 {"<qos", LFT_SERVER_LOCAL_TOS},
134 {">nfmark", LFT_CLIENT_LOCAL_NFMARK},
135 {"<nfmark", LFT_SERVER_LOCAL_NFMARK},
136 {"err_code", LFT_SQUID_ERROR },
137 {"err_detail", LFT_SQUID_ERROR_DETAIL },
138 {"note", LFT_NOTE },
139 {"credentials", LFT_CREDENTIALS},
140 {NULL, LFT_NONE} /* this must be last */
141 };
142
143 #if USE_ADAPTATION
144 static TokenTableEntry TokenTableAdapt[] = {
145 {"all_trs", LFT_ADAPTATION_ALL_XACT_TIMES},
146 {"sum_trs", LFT_ADAPTATION_SUM_XACT_TIMES},
147 {"<last_h", LFT_ADAPTATION_LAST_HEADER},
148 {NULL, LFT_NONE} /* this must be last */
149 };
150 #endif
151
152 #if ICAP_CLIENT
153 /// ICAP (icap::) tokens
154 static TokenTableEntry TokenTableIcap[] = {
155 {"tt", LFT_ICAP_TOTAL_TIME},
156 {"<last_h", LFT_ADAPTATION_LAST_HEADER}, // deprecated
157
158 {"<A", LFT_ICAP_ADDR},
159 {"<service_name", LFT_ICAP_SERV_NAME},
160 {"ru", LFT_ICAP_REQUEST_URI},
161 {"rm", LFT_ICAP_REQUEST_METHOD},
162 {">st", LFT_ICAP_BYTES_SENT},
163 {"<st", LFT_ICAP_BYTES_READ},
164 {"<bs", LFT_ICAP_BODY_BYTES_READ},
165
166 {">h", LFT_ICAP_REQ_HEADER},
167 {"<h", LFT_ICAP_REP_HEADER},
168
169 {"tr", LFT_ICAP_TR_RESPONSE_TIME},
170 {"tio", LFT_ICAP_IO_TIME},
171 {"to", LFT_ICAP_OUTCOME},
172 {"Hs", LFT_ICAP_STATUS_CODE},
173
174 {NULL, LFT_NONE} /* this must be last */
175 };
176 #endif
177
178 #if USE_OPENSSL
179 // SSL (ssl::) tokens
180 static TokenTableEntry TokenTableSsl[] = {
181 {"bump_mode", LFT_SSL_BUMP_MODE},
182 {">cert_subject", LFT_SSL_USER_CERT_SUBJECT},
183 {">cert_issuer", LFT_SSL_USER_CERT_ISSUER},
184 {NULL, LFT_NONE}
185 };
186 #endif
187 } // namespace Format
188
189 /// Register all components custom format tokens
190 void
191 Format::Token::Init()
192 {
193 // TODO standard log tokens
194 // TODO external ACL fmt tokens
195
196 #if USE_ADAPTATION
197 TheConfig.registerTokens(String("adapt"),::Format::TokenTableAdapt);
198 #endif
199 #if ICAP_CLIENT
200 TheConfig.registerTokens(String("icap"),::Format::TokenTableIcap);
201 #endif
202 #if USE_OPENSSL
203 TheConfig.registerTokens(String("ssl"),::Format::TokenTableSsl);
204 #endif
205 }
206
207 /// Scans a token table to see if the next token exists there
208 /// returns a pointer to next unparsed byte and updates type member if found
209 const char *
210 Format::Token::scanForToken(TokenTableEntry const table[], const char *cur)
211 {
212 for (TokenTableEntry const *lte = table; lte->configTag != NULL; ++lte) {
213 debugs(46, 8, HERE << "compare tokens '" << lte->configTag << "' with '" << cur << "'");
214 if (strncmp(lte->configTag, cur, strlen(lte->configTag)) == 0) {
215 type = lte->tokenType;
216 label = lte->configTag;
217 debugs(46, 7, HERE << "Found token '" << label << "'");
218 return cur + strlen(lte->configTag);
219 }
220 }
221 return cur;
222 }
223
224 /* parses a single token. Returns the token length in characters,
225 * and fills in the lt item with the token information.
226 * def is for sure null-terminated
227 */
228 int
229 Format::Token::parse(const char *def, Quoting *quoting)
230 {
231 const char *cur = def;
232
233 int l;
234
235 l = strcspn(cur, "%");
236
237 if (l > 0) {
238 char *cp;
239 /* it's a string for sure, until \0 or the next % */
240 cp = (char *)xmalloc(l + 1);
241 xstrncpy(cp, cur, l + 1);
242 type = LFT_STRING;
243 data.string = cp;
244
245 while (l > 0) {
246 switch (*cur) {
247
248 case '"':
249
250 if (*quoting == LOG_QUOTE_NONE)
251 *quoting = LOG_QUOTE_QUOTES;
252 else if (*quoting == LOG_QUOTE_QUOTES)
253 *quoting = LOG_QUOTE_NONE;
254
255 break;
256
257 case '[':
258 if (*quoting == LOG_QUOTE_NONE)
259 *quoting = LOG_QUOTE_MIMEBLOB;
260
261 break;
262
263 case ']':
264 if (*quoting == LOG_QUOTE_MIMEBLOB)
265 *quoting = LOG_QUOTE_NONE;
266
267 break;
268 }
269
270 ++cur;
271 --l;
272 }
273
274 } else if (*cur) {
275
276 ++cur;
277
278 // select quoting style for his particular token
279 switch (*cur) {
280
281 case '"':
282 quote = LOG_QUOTE_QUOTES;
283 ++cur;
284 break;
285
286 case '\'':
287 quote = LOG_QUOTE_RAW;
288 ++cur;
289 break;
290
291 case '[':
292 quote = LOG_QUOTE_MIMEBLOB;
293 ++cur;
294 break;
295
296 case '#':
297 quote = LOG_QUOTE_URL;
298 ++cur;
299 break;
300
301 default:
302 quote = *quoting;
303 break;
304 }
305
306 if (*cur == '-') {
307 left = true;
308 ++cur;
309 }
310
311 if (*cur == '0') {
312 zero = true;
313 ++cur;
314 }
315
316 char *endp;
317 if (xisdigit(*cur)) {
318 widthMin = strtol(cur, &endp, 10);
319 cur = endp;
320 }
321
322 if (*cur == '.' && xisdigit(*(++cur))) {
323 widthMax = strtol(cur, &endp, 10);
324 cur = endp;
325 }
326
327 if (*cur == '{') {
328 char *cp;
329 ++cur;
330 l = strcspn(cur, "}");
331 cp = (char *)xmalloc(l + 1);
332 xstrncpy(cp, cur, l + 1);
333 data.string = cp;
334 cur += l;
335
336 if (*cur == '}')
337 ++cur;
338 }
339
340 type = LFT_NONE;
341
342 // Scan each registered token namespace
343 debugs(46, 9, HERE << "check for token in " << TheConfig.tokens.size() << " namespaces.");
344 for (std::list<TokenNamespace>::const_iterator itr = TheConfig.tokens.begin(); itr != TheConfig.tokens.end(); ++itr) {
345 debugs(46, 7, HERE << "check for possible " << itr->prefix << ":: token");
346 const size_t len = itr->prefix.size();
347 if (itr->prefix.cmp(cur, len) == 0 && cur[len] == ':' && cur[len+1] == ':') {
348 debugs(46, 5, HERE << "check for " << itr->prefix << ":: token in '" << cur << "'");
349 const char *old = cur;
350 cur = scanForToken(itr->tokenSet, cur+len+2);
351 if (old != cur) // found
352 break;
353 else // reset to start of namespace
354 cur = cur - len - 2;
355 }
356 }
357
358 if (type == LFT_NONE) {
359 // For upward compatibility, assume "http::" prefix as default prefix
360 // for all log access formatting codes, except those starting with a
361 // "%" or a known namespace. (ie "icap::", "adapt::")
362 if (strncmp(cur,"http::", 6) == 0 && *(cur+6) != '%' )
363 cur += 6;
364
365 // NP: scan the sets of tokens in decreasing size to guarantee no
366 // mistakes made with overlapping names. (Bug 3310)
367
368 // Scan for various long tokens
369 debugs(46, 5, HERE << "scan for possible Misc token");
370 cur = scanForToken(TokenTableMisc, cur);
371 // scan for 2-char tokens
372 if (type == LFT_NONE) {
373 debugs(46, 5, HERE << "scan for possible 2C token");
374 cur = scanForToken(TokenTable2C, cur);
375 }
376 // finally scan for 1-char tokens.
377 if (type == LFT_NONE) {
378 debugs(46, 5, HERE << "scan for possible 1C token");
379 cur = scanForToken(TokenTable1C, cur);
380 }
381 }
382
383 if (type == LFT_NONE) {
384 fatalf("Can't parse configuration token: '%s'\n", def);
385 }
386
387 if (*cur == ' ') {
388 space = true;
389 ++cur;
390 }
391 }
392
393 switch (type) {
394
395 #if USE_ADAPTATION
396 case LFT_ADAPTATION_LAST_HEADER:
397 #endif
398
399 #if ICAP_CLIENT
400 case LFT_ICAP_REQ_HEADER:
401
402 case LFT_ICAP_REP_HEADER:
403 #endif
404
405 case LFT_ADAPTED_REQUEST_HEADER:
406
407 case LFT_REQUEST_HEADER:
408
409 case LFT_REPLY_HEADER:
410
411 case LFT_NOTE:
412
413 if (data.string) {
414 char *header = data.string;
415 char *cp = strchr(header, ':');
416
417 if (cp) {
418 *cp = '\0';
419 ++cp;
420
421 if (*cp == ',' || *cp == ';' || *cp == ':') {
422 data.header.separator = *cp;
423 ++cp;
424 } else {
425 data.header.separator = ',';
426 }
427
428 data.header.element = cp;
429
430 switch (type) {
431 case LFT_REQUEST_HEADER:
432 type = LFT_REQUEST_HEADER_ELEM;
433 break;
434
435 case LFT_ADAPTED_REQUEST_HEADER:
436 type = LFT_ADAPTED_REQUEST_HEADER_ELEM;
437 break;
438
439 case LFT_REPLY_HEADER:
440 type = LFT_REPLY_HEADER_ELEM;
441 break;
442 #if USE_ADAPTATION
443 case LFT_ADAPTATION_LAST_HEADER:
444 type = LFT_ADAPTATION_LAST_HEADER_ELEM;
445 break;
446 #endif
447 #if ICAP_CLIENT
448 case LFT_ICAP_REQ_HEADER:
449 type = LFT_ICAP_REQ_HEADER_ELEM;
450 break;
451 case LFT_ICAP_REP_HEADER:
452 type = LFT_ICAP_REP_HEADER_ELEM;
453 break;
454 #endif
455 default:
456 break;
457 }
458 }
459
460 data.header.header = header;
461 } else {
462 switch (type) {
463 case LFT_REQUEST_HEADER:
464 type = LFT_REQUEST_ALL_HEADERS;
465 break;
466
467 case LFT_ADAPTED_REQUEST_HEADER:
468 type = LFT_ADAPTED_REQUEST_ALL_HEADERS;
469 break;
470
471 case LFT_REPLY_HEADER:
472 type = LFT_REPLY_ALL_HEADERS;
473 break;
474 #if USE_ADAPTATION
475 case LFT_ADAPTATION_LAST_HEADER:
476 type = LFT_ADAPTATION_LAST_ALL_HEADERS;
477 break;
478 #endif
479 #if ICAP_CLIENT
480 case LFT_ICAP_REQ_HEADER:
481 type = LFT_ICAP_REQ_ALL_HEADERS;
482 break;
483 case LFT_ICAP_REP_HEADER:
484 type = LFT_ICAP_REP_ALL_HEADERS;
485 break;
486 #endif
487 default:
488 break;
489 }
490 Config.onoff.log_mime_hdrs = 1;
491 }
492
493 break;
494
495 case LFT_CLIENT_FQDN:
496 Config.onoff.log_fqdn = 1;
497 break;
498
499 case LFT_TIME_START:
500 case LFT_TIME_SUBSECOND:
501 divisor = 1000;
502
503 if (widthMax > 0) {
504 divisor = 1000000;
505
506 for (int i = widthMax; i > 0; --i)
507 divisor /= 10;
508
509 if (!divisor)
510 divisor = 1;
511 }
512 break;
513
514 case LFT_HTTP_SENT_STATUS_CODE_OLD_30:
515 debugs(46, DBG_PARSE_NOTE(DBG_IMPORTANT), "WARNING: The \"Hs\" formatting code is deprecated. Use the \">Hs\" instead.");
516 type = LFT_HTTP_SENT_STATUS_CODE;
517 break;
518
519 case LFT_SERVER_LOCAL_IP_OLD_27:
520 debugs(46, DBG_PARSE_NOTE(DBG_IMPORTANT), "WARNING: The \"oa\" formatting code is deprecated. Use the \"<la\" instead.");
521 type = LFT_SERVER_LOCAL_IP;
522 break;
523
524 case LFT_REQUEST_URLPATH_OLD_31:
525 debugs(46, DBG_PARSE_NOTE(DBG_IMPORTANT), "WARNING: The \"rp\" formatting code is deprecated. Use the \">rp\" instead.");
526 type = LFT_CLIENT_REQ_URLPATH;
527 break;
528
529 case LFT_REQUEST_VERSION_OLD_2X:
530 debugs(46, DBG_PARSE_NOTE(DBG_IMPORTANT), "WARNING: The \">v\" formatting code is deprecated. Use the \">rv\" instead.");
531 type = LFT_REQUEST_VERSION;
532 break;
533
534 #if !USE_SQUID_EUI
535 case LFT_CLIENT_EUI:
536 debugs(46, DBG_CRITICAL, "WARNING: The \">eui\" formatting code requires EUI features which are disabled in this Squid.");
537 break;
538 #endif
539
540 case LFT_REQUEST_URLGROUP_OLD_2X:
541 debugs(46, DBG_PARSE_NOTE(DBG_IMPORTANT), "WARNING: The \"rG\" formatting code is deprecated. Use \"note{urlgroup}\" instead.");
542 type = LFT_NOTE;
543 data.header.header = xstrdup("urlgroup");
544 break;
545
546 default:
547 break;
548 }
549
550 return (cur - def);
551 }
552
553 Format::Token::Token() : type(LFT_NONE),
554 label(NULL),
555 widthMin(-1),
556 widthMax(-1),
557 quote(LOG_QUOTE_NONE),
558 left(false),
559 space(false),
560 zero(false),
561 divisor(1),
562 next(NULL)
563 {
564 data.string = NULL;
565 data.header.header = NULL;
566 data.header.element = NULL;
567 data.header.separator = ',';
568 }
569
570 Format::Token::~Token()
571 {
572 label = NULL; // drop reference to global static.
573 safe_free(data.string);
574 while (next) {
575 Token *tokens = next;
576 next = next->next;
577 tokens->next = NULL;
578 delete tokens;
579 }
580 }
581