!C99Shell v. 2.0 [PHP 7 Update] [25.02.2019]!

Software: Apache. PHP/5.6.40 

uname -a: Linux cpanel06wh.bkk1.cloud.z.com 2.6.32-954.3.5.lve1.4.80.el6.x86_64 #1 SMP Thu Sep 24
01:42:00 EDT 2020 x86_64
 

uid=851(cp949260) gid=853(cp949260) groups=853(cp949260) 

Safe-mode: OFF (not secure)

/opt/passenger-5.3.7-4.el6.cloudlinux/src/agent/Core/   drwxr-xr-x
Free 220.83 GB of 981.82 GB (22.49%)
Home    Back    Forward    UPDIR    Refresh    Search    Buffer    Encoder    Tools    Proc.    FTP brute    Sec.    SQL    PHP-code    Update    Feedback    Self remove    Logout    


Viewing file:     ApiServer.h (24.33 KB)      -rw-r--r--
Select action/file-type:
(+) | (+) | (+) | Code (+) | Session (+) | (+) | SDB (+) | (+) | (+) | (+) | (+) | (+) |
/*
 *  Phusion Passenger - https://www.phusionpassenger.com/
 *  Copyright (c) 2013-2018 Phusion Holding B.V.
 *
 *  "Passenger", "Phusion Passenger" and "Union Station" are registered
 *  trademarks of Phusion Holding B.V.
 *
 *  Permission is hereby granted, free of charge, to any person obtaining a copy
 *  of this software and associated documentation files (the "Software"), to deal
 *  in the Software without restriction, including without limitation the rights
 *  to use, copy, modify, merge, publish, distribute, sublicense, and/or sell
 *  copies of the Software, and to permit persons to whom the Software is
 *  furnished to do so, subject to the following conditions:
 *
 *  The above copyright notice and this permission notice shall be included in
 *  all copies or substantial portions of the Software.
 *
 *  THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR
 *  IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY,
 *  FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE
 *  AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER
 *  LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM,
 *  OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN
 *  THE SOFTWARE.
 */
#ifndef _PASSENGER_CORE_API_SERVER_H_
#define _PASSENGER_CORE_API_SERVER_H_

#include <boost/config.hpp>
#include <boost/scoped_ptr.hpp>
#include <boost/regex.hpp>
#include <oxt/thread.hpp>
#include <string>
#include <cstring>
#include <exception>
#include <sys/types.h>

#include <jsoncpp/json.h>
#include <modp_b64.h>

#include <Core/Controller.h>
#include <Core/ConfigChange.h>
#include <Core/ApplicationPool/Pool.h>
#include <Shared/ApiServerUtils.h>
#include <Shared/ApiAccountUtils.h>
#include <ServerKit/HttpServer.h>
#include <DataStructures/LString.h>
#include <Exceptions.h>
#include <StaticString.h>
#include <LoggingKit/LoggingKit.h>
#include <LoggingKit/Context.h>
#include <Constants.h>
#include <IOTools/BufferedIO.h>
#include <IOTools/MessageIO.h>
#include <StrIntTools/StrIntUtils.h>

namespace Passenger {
namespace Core {
namespace ApiServer {

using namespace std;


/*
 * BEGIN ConfigKit schema: Passenger::Core::ApiServer::Schema
 * (do not edit: following text is automatically generated
 * by 'rake configkit_schemas_inline_comments')
 *
 *   accept_burst_count             unsigned integer   -   default(32)
 *   authorizations                 array              -   default("[FILTERED]"),secret
 *   client_freelist_limit          unsigned integer   -   default(0)
 *   instance_dir                   string             -   -
 *   min_spare_clients              unsigned integer   -   default(0)
 *   request_freelist_limit         unsigned integer   -   default(1024)
 *   start_reading_after_accept     boolean            -   default(true)
 *   watchdog_fd_passing_password   string             -   secret
 *
 * END
 */
class Schema: public ServerKit::HttpServerSchema {
private:
    static Json::Value normalizeAuthorizations(const Json::Value &effectiveValues) {
        Json::Value updates;
        updates["authorizations"] = ApiAccountUtils::normalizeApiAccountsJson(
            effectiveValues["authorizations"]);
        return updates;
    }

public:
    Schema()
        : ServerKit::HttpServerSchema(false)
    {
        using namespace ConfigKit;

        add("instance_dir", STRING_TYPE, OPTIONAL);
        add("watchdog_fd_passing_password", STRING_TYPE, OPTIONAL | SECRET);
        add("authorizations", ARRAY_TYPE, OPTIONAL | SECRET, Json::arrayValue);

        addValidator(boost::bind(ApiAccountUtils::validateAuthorizationsField,
            "authorizations", boost::placeholders::_1, boost::placeholders::_2));

        addNormalizer(normalizeAuthorizations);

        finalize();
    }
};

struct ConfigChangeRequest {
    ServerKit::HttpServerConfigChangeRequest forParent;
    boost::scoped_ptr<ApiAccountUtils::ApiAccountDatabase> apiAccountDatabase;
};

class Request: public ServerKit::BaseHttpRequest {
public:
    string body;
    Json::Value jsonBody;
    Authorization authorization;
    unsigned int controllerStatesGathered;
    vector<Json::Value> controllerStates;

    DEFINE_SERVER_KIT_BASE_HTTP_REQUEST_FOOTER(Passenger::Core::ApiServer::Request);
};

class ApiServer: public ServerKit::HttpServer<ApiServer, ServerKit::HttpClient<Request> > {
public:
    typedef ServerKit::HttpServer<ApiServer, ServerKit::HttpClient<Request> > ParentClass;
    typedef ServerKit::HttpClient<Request> Client;
    typedef ServerKit::HeaderTable HeaderTable;

    typedef Passenger::Core::ApiServer::ConfigChangeRequest ConfigChangeRequest;

private:
    ApiAccountUtils::ApiAccountDatabase apiAccountDatabase;
    boost::regex serverConnectionPath;

    bool regex_match(const StaticString &str, const boost::regex &e) const {
        return boost::regex_match(str.data(), str.data() + str.size(), e);
    }

    int extractThreadNumberFromClientName(const string &clientName) const {
        boost::smatch results;
        boost::regex re("^([0-9]+)-.*");

        if (!boost::regex_match(clientName, results, re)) {
            return -1;
        }
        if (results.size() != 2) {
            return -1;
        }
        return stringToUint(results.str(1));
    }

    static void disconnectClient(Controller *controller, string clientName) {
        controller->disconnect(clientName);
    }

    void route(Client *client, Request *req, const StaticString &path) {
        if (path == P_STATIC_STRING("/server.json")) {
            processServerStatus(client, req);
        } else if (regex_match(path, serverConnectionPath)) {
            processServerConnectionOperation(client, req);
        } else if (path == P_STATIC_STRING("/pool.xml")) {
            processPoolStatusXml(client, req);
        } else if (path == P_STATIC_STRING("/pool.txt")) {
            processPoolStatusTxt(client, req);
        } else if (path == P_STATIC_STRING("/pool/restart_app_group.json")) {
            processPoolRestartAppGroup(client, req);
        } else if (path == P_STATIC_STRING("/pool/detach_process.json")) {
            processPoolDetachProcess(client, req);
        } else if (path == P_STATIC_STRING("/backtraces.txt")) {
            apiServerProcessBacktraces(this, client, req);
        } else if (path == P_STATIC_STRING("/ping.json")) {
            apiServerProcessPing(this, client, req);
        } else if (path == P_STATIC_STRING("/info.json")
            // The "/version.json" path is deprecated
            || path == P_STATIC_STRING("/version.json"))
        {
            apiServerProcessInfo(this, client, req);
        } else if (path == P_STATIC_STRING("/shutdown.json")) {
            apiServerProcessShutdown(this, client, req);
        } else if (path == P_STATIC_STRING("/gc.json")) {
            processGc(client, req);
        } else if (path == P_STATIC_STRING("/config.json")) {
            processConfig(client, req);
        } else if (path == P_STATIC_STRING("/reinherit_logs.json")) {
            apiServerProcessReinheritLogs(this, client, req,
                config["instance_dir"].asString(),
                config["watchdog_fd_passing_password"].asString());
        } else if (path == P_STATIC_STRING("/reopen_logs.json")) {
            apiServerProcessReopenLogs(this, client, req);
        } else {
            apiServerRespondWith404(this, client, req);
        }
    }

    void processServerConnectionOperation(Client *client, Request *req) {
        if (!authorizeAdminOperation(this, client, req)) {
            apiServerRespondWith401(this, client, req);
        } else if (req->method == HTTP_DELETE) {
            StaticString path = req->getPathWithoutQueryString();
            boost::smatch results;

            boost::regex_match(path.toString(), results, serverConnectionPath);
            if (results.size() != 2) {
                endAsBadRequest(&client, &req, "Invalid URI");
                return;
            }

            int threadNumber = extractThreadNumberFromClientName(results.str(1));
            if (threadNumber < 1 || (unsigned int) threadNumber > controllers.size()) {
                HeaderTable headers;
                headers.insert(req->pool, "Content-Type", "application/json");
                writeSimpleResponse(client, 400, &headers,
                    "{ \"status\": \"error\", \"reason\": \"Invalid thread number\" }");
                if (!req->ended()) {
                    endRequest(&client, &req);
                }
                return;
            }

            controllers[threadNumber - 1]->getContext()->libev->runLater(boost::bind(
                disconnectClient, controllers[threadNumber - 1], results.str(1)));

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            writeSimpleResponse(client, 200, &headers,
                "{ \"status\": \"ok\" }");
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else {
            apiServerRespondWith405(this, client, req);
        }
    }

    void gatherControllerState(Client *client, Request *req,
        Controller *controller, unsigned int i)
    {
        Json::Value state = controller->inspectStateAsJson();
        getContext()->libev->runLater(boost::bind(&ApiServer::controllerStateGathered,
            this, client, req, i, state));
    }

    void controllerStateGathered(Client *client, Request *req,
        unsigned int i, Json::Value state)
    {
        if (req->ended()) {
            unrefRequest(req, __FILE__, __LINE__);
            return;
        }

        req->controllerStatesGathered++;
        req->controllerStates[i] = state;

        if (req->controllerStatesGathered == controllers.size()) {
            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");

            Json::Value response;
            response["threads"] = (Json::UInt) controllers.size();

            for (unsigned int i = 0; i < controllers.size(); i++) {
                string key = "thread" + toString(i + 1);
                response[key] = req->controllerStates[i];
            }

            writeSimpleResponse(client, 200, &headers,
                psg_pstrdup(req->pool, response.toStyledString()));
            if (!req->ended()) {
                Request *req2 = req;
                endRequest(&client, &req2);
            }
        }

        unrefRequest(req, __FILE__, __LINE__);
    }

    void processServerStatus(Client *client, Request *req) {
        if (authorizeStateInspectionOperation(this, client, req)) {
            req->controllerStates.resize(controllers.size());
            for (unsigned int i = 0; i < controllers.size(); i++) {
                refRequest(req, __FILE__, __LINE__);
                controllers[i]->getContext()->libev->runLater(boost::bind(
                    &ApiServer::gatherControllerState, this,
                    client, req, controllers[i], i));
            }
        } else {
            apiServerRespondWith401(this, client, req);
        }
    }

    void processPoolStatusXml(Client *client, Request *req) {
        Authorization auth(authorize(this, client, req));
        if (auth.canReadPool) {
            ApplicationPool2::Pool::ToXmlOptions options(
                parseQueryString(req->getQueryString()));
            options.uid = auth.uid;
            options.apiKey = auth.apiKey;

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "text/xml");
            writeSimpleResponse(client, 200, &headers,
                psg_pstrdup(req->pool, appPool->toXml(options)));
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else {
            HeaderTable headers;
            headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
            headers.insert(req->pool, "WWW-Authenticate", "Basic realm=\"api\"");
            if (clientOnUnixDomainSocket(client) && appPool->getGroupCount() == 0) {
                // Allow admin tools that connected through the Unix domain socket
                // to know that this authorization error is caused by the fact
                // that the pool is empty.
                headers.insert(req->pool, "Pool-Empty", "true");
            }
            writeSimpleResponse(client, 401, &headers, "Unauthorized");
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        }
    }

    void processPoolStatusTxt(Client *client, Request *req) {
        Authorization auth(authorize(this, client, req));
        if (auth.canReadPool) {
            ApplicationPool2::Pool::InspectOptions options(
                parseQueryString(req->getQueryString()));
            options.uid = auth.uid;
            options.apiKey = auth.apiKey;

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "text/plain");
            writeSimpleResponse(client, 200, &headers,
                psg_pstrdup(req->pool, appPool->inspect(options)));
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else {
            HeaderTable headers;
            headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
            headers.insert(req->pool, "WWW-Authenticate", "Basic realm=\"api\"");
            if (clientOnUnixDomainSocket(client) && appPool->getGroupCount() == 0) {
                // Allow admin tools that connected through the Unix domain socket
                // to know that this authorization error is caused by the fact
                // that the pool is empty.
                headers.insert(req->pool, "Pool-Empty", "true");
            }
            writeSimpleResponse(client, 401, &headers, "Unauthorized");
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        }
    }

    void processPoolRestartAppGroup(Client *client, Request *req) {
        Authorization auth(authorize(this, client, req));
        if (!auth.canModifyPool) {
            apiServerRespondWith401(this, client, req);
        } else if (req->method != HTTP_POST) {
            apiServerRespondWith405(this, client, req);
        } else if (!req->hasBody()) {
            endAsBadRequest(&client, &req, "Body required");
        } else if (requestBodyExceedsLimit(client, req)) {
            apiServerRespondWith413(this, client, req);
        } else {
            req->authorization = auth;
            // Continues in processPoolRestartAppGroupBody().
        }
    }

    void processPoolRestartAppGroupBody(Client *client, Request *req) {
        if (!req->jsonBody.isMember("name")) {
            endAsBadRequest(&client, &req, "Name required");
            return;
        }

        ApplicationPool2::Pool::RestartOptions options;
        options.uid = req->authorization.uid;
        options.apiKey = req->authorization.apiKey;
        if (req->jsonBody.isMember("restart_method")) {
            string restartMethodString = req->jsonBody["restart_method"].asString();
            if (restartMethodString == "blocking") {
                options.method = RM_BLOCKING;
            } else if (restartMethodString == "rolling") {
                options.method = RM_ROLLING;
            } else {
                endAsBadRequest(&client, &req, "Unsupported restart method");
                return;
            }
        }

        bool result;
        const char *response;
        try {
            result = appPool->restartGroupByName(req->jsonBody["name"].asString(),
                options);
        } catch (const SecurityException &) {
            apiServerRespondWith401(this, client, req);
            return;
        }
        if (result) {
            response = "{ \"restarted\": true }";
        } else {
            response = "{ \"restarted\": false }";
        }

        HeaderTable headers;
        headers.insert(req->pool, "Content-Type", "application/json");
        headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
        writeSimpleResponse(client, 200, &headers, response);

        if (!req->ended()) {
            endRequest(&client, &req);
        }
    }

    void processPoolDetachProcess(Client *client, Request *req) {
        Authorization auth(authorize(this, client, req));
        if (!auth.canModifyPool) {
            apiServerRespondWith401(this, client, req);
        } else if (req->method != HTTP_POST) {
            apiServerRespondWith405(this, client, req);
        } else if (!req->hasBody()) {
            endAsBadRequest(&client, &req, "Body required");
        } else if (requestBodyExceedsLimit(client, req)) {
            apiServerRespondWith413(this, client, req);
        } else {
            req->authorization = auth;
            // Continues in processPoolDetachProcessBody().
        }
    }

    void processPoolDetachProcessBody(Client *client, Request *req) {
        if (req->jsonBody.isMember("pid")) {
            pid_t pid = (pid_t) req->jsonBody["pid"].asUInt();
            ApplicationPool2::Pool::AuthenticationOptions options;
            options.uid = req->authorization.uid;
            options.apiKey = req->authorization.apiKey;

            bool result;
            try {
                result = appPool->detachProcess(pid, options);
            } catch (const SecurityException &) {
                apiServerRespondWith401(this, client, req);
                return;
            }

            const char *response;
            if (result) {
                response = "{ \"detached\": true }";
            } else {
                response = "{ \"detached\": false }";
            }

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
            writeSimpleResponse(client, 200, &headers, response);
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else {
            endAsBadRequest(&client, &req, "PID required");
        }
    }

    static void garbageCollect(Controller *controller) {
        ServerKit::Context *ctx = controller->getContext();
        unsigned int count;

        count = mbuf_pool_compact(&ctx->mbuf_pool);
        SKS_NOTICE_FROM_STATIC(controller, "Freed " << count << " mbufs");

        controller->compact(LoggingKit::NOTICE);
    }

    void processGc(Client *client, Request *req) {
        if (req->method != HTTP_PUT) {
            apiServerRespondWith405(this, client, req);
        } else if (authorizeAdminOperation(this, client, req)) {
            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            for (unsigned int i = 0; i < controllers.size(); i++) {
                controllers[i]->getContext()->libev->runLater(boost::bind(
                    garbageCollect, controllers[i]));
            }
            writeSimpleResponse(client, 200, &headers, "{ \"status\": \"ok\" }");
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else {
            apiServerRespondWith401(this, client, req);
        }
    }

    void processConfig(Client *client, Request *req) {
        if (req->method == HTTP_GET) {
            if (!authorizeStateInspectionOperation(this, client, req)) {
                apiServerRespondWith401(this, client, req);
                return;
            }

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            writeSimpleResponse(client, 200, &headers,
                psg_pstrdup(req->pool, Core::inspectConfig().toStyledString()));
            if (!req->ended()) {
                endRequest(&client, &req);
            }
        } else if (req->method == HTTP_PUT) {
            if (!authorizeAdminOperation(this, client, req)) {
                apiServerRespondWith401(this, client, req);
            } else if (!req->hasBody()) {
                endAsBadRequest(&client, &req, "Body required");
            }
            // Continue in processConfigBody()
        } else {
            apiServerRespondWith405(this, client, req);
        }
    }

    void processConfigBody(Client *client, Request *req) {
        Core::ConfigChangeRequest *changeReq = Core::createConfigChangeRequest();
        refRequest(req, __FILE__, __LINE__);
        Core::asyncPrepareConfigChange(req->jsonBody, changeReq,
            boost::bind(&ApiServer::processConfigBody_prepareDone, this, client, req,
                boost::placeholders::_1, boost::placeholders::_2));
    }

    void processConfigBody_prepareDone(Client *client, Request *req,
        const vector<ConfigKit::Error> &errors, Core::ConfigChangeRequest *changeReq)
    {
        getContext()->libev->runLater(boost::bind(&ApiServer::processConfigBody_prepareDoneInEventLoop,
            this, client, req, errors, changeReq));
    }

    void processConfigBody_prepareDoneInEventLoop(Client *client, Request *req,
        const vector<ConfigKit::Error> &errors, Core::ConfigChangeRequest *changeReq)
    {
        if (req->ended()) {
            Core::freeConfigChangeRequest(changeReq);
            unrefRequest(req, __FILE__, __LINE__);
            return;
        }

        if (errors.empty()) {
            Core::asyncCommitConfigChange(changeReq,
                boost::bind(&ApiServer::processConfigBody_commitDone, this, client, req,
                    boost::placeholders::_1));
        } else {
            unsigned int bufsize = 2048;
            char *message = (char *) psg_pnalloc(req->pool, bufsize);
            snprintf(message, bufsize, "{ \"status\": \"error\", "
                "\"message\": \"Error reconfiguring: %s\" }",
                ConfigKit::toString(errors).c_str());

            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
            writeSimpleResponse(client, 500, &headers, message);

            if (!req->ended()) {
                Request *req2 = req;
                endRequest(&client, &req2);
            }

            Core::freeConfigChangeRequest(changeReq);
            unrefRequest(req, __FILE__, __LINE__);
        }
    }

    void processConfigBody_commitDone(Client *client, Request *req,
        Core::ConfigChangeRequest *changeReq)
    {
        getContext()->libev->runLater(boost::bind(&ApiServer::processConfigBody_commitDoneInEventLoop,
            this, client, req, changeReq));
    }

    void processConfigBody_commitDoneInEventLoop(Client *client, Request *req,
        Core::ConfigChangeRequest *changeReq)
    {
        if (!req->ended()) {
            HeaderTable headers;
            headers.insert(req->pool, "Content-Type", "application/json");
            headers.insert(req->pool, "Cache-Control", "no-cache, no-store, must-revalidate");
            writeSimpleResponse(client, 200, &headers, "{ \"status\": \"ok\" }");
            if (!req->ended()) {
                Request *req2 = req;
                endRequest(&client, &req2);
            }
        }
        Core::freeConfigChangeRequest(changeReq);
        unrefRequest(req, __FILE__, __LINE__);
    }

    bool requestBodyExceedsLimit(Client *client, Request *req, unsigned int limit = 1024 * 128) {
        return (req->bodyType == Request::RBT_CONTENT_LENGTH
                && req->aux.bodyInfo.contentLength > limit)
            || (req->bodyType == Request::RBT_CHUNKED
                && req->body.size() > limit);
    }

protected:
    virtual void onRequestBegin(Client *client, Request *req) {
        TRACE_POINT();
        StaticString path = req->getPathWithoutQueryString();

        P_INFO("API request: " << http_method_str(req->method) <<
            " " << StaticString(req->path.start->data, req->path.size));

        try {
            route(client, req, path);
        } catch (const oxt::tracable_exception &e) {
            SKC_ERROR(client, "Exception: " << e.what() << "\n" << e.backtrace());
            if (!req->ended()) {
                req->wantKeepAlive = false;
                endRequest(&client, &req);
            }
        }
    }

    virtual ServerKit::Channel::Result onRequestBody(Client *client, Request *req,
        const MemoryKit::mbuf &buffer, int errcode)
    {
        TRACE_POINT();
        if (buffer.size() > 0) {
            // Data
            req->body.append(buffer.start, buffer.size());
            if (requestBodyExceedsLimit(client, req)) {
                apiServerRespondWith413(this, client, req);
            }
        } else if (errcode == 0) {
            // EOF
            Json::Reader reader;
            if (reader.parse(req->body, req->jsonBody)) {
                StaticString path = req->getPathWithoutQueryString();
                try {
                    if (path == P_STATIC_STRING("/pool/restart_app_group.json")) {
                        processPoolRestartAppGroupBody(client, req);
                    } else if (path == P_STATIC_STRING("/pool/detach_process.json")) {
                        processPoolDetachProcessBody(client, req);
                    } else if (path == P_STATIC_STRING("/config.json")) {
                        processConfigBody(client, req);
                    } else {
                        P_BUG("Unknown path for body processing: " << path);
                    }
                } catch (const oxt::tracable_exception &e) {
                    SKC_ERROR(client, "Exception: " << e.what() << "\n" << e.backtrace());
                    if (!req->ended()) {
                        req->wantKeepAlive = false;
                        endRequest(&client, &req);
                    }
                }
            } else {
                apiServerRespondWith422(this, client, req, reader.getFormattedErrorMessages());
            }
        } else {
            // Error
            disconnect(&client);
        }
        return ServerKit::Channel::Result(buffer.size(), false);
    }

    virtual void reinitializeRequest(Client *client, Request *req) {
        ParentClass::reinitializeRequest(client, req);
        req->controllerStatesGathered = 0;
    }

    virtual void deinitializeRequest(Client *client, Request *req) {
        req->body.clear();
        if (!req->jsonBody.isNull()) {
            req->jsonBody = Json::Value();
        }
        req->authorization = Authorization();
        req->controllerStates.clear();
        ParentClass::deinitializeRequest(client, req);
    }

public:
    typedef ApiAccountUtils::ApiAccount ApiAccount;

    // Dependencies
    vector<Controller *> controllers;
    ApplicationPool2::PoolPtr appPool;
    EventFd *exitEvent;

    ApiServer(ServerKit::Context *context, const Schema &schema,
        const Json::Value &initialConfig,
        const ConfigKit::Translator &translator = ConfigKit::DummyTranslator())
        : ParentClass(context, schema, initialConfig, translator),
          serverConnectionPath("^/server/(.+)\\.json$"),
          exitEvent(NULL)
    {
        apiAccountDatabase = ApiAccountUtils::ApiAccountDatabase(
            config["authorizations"]);
    }

    virtual void initialize() {
        if (appPool == NULL) {
            throw RuntimeException("appPool must be non-NULL");
        }
        if (exitEvent == NULL) {
            throw RuntimeException("exitEvent must be non-NULL");
        }
        ParentClass::initialize();
    }

    virtual StaticString getServerName() const {
        return P_STATIC_STRING("ApiServer");
    }

    virtual unsigned int getClientName(const Client *client, char *buf, size_t size) const {
        char *pos = buf;
        const char *end = buf + size - 1;
        pos = appendData(pos, end, "Adm.", 1);
        pos += uintToString(client->number, pos, end - pos);
        *pos = '\0';
        return pos - buf;
    }

    const ApiAccountUtils::ApiAccountDatabase &getApiAccountDatabase() const {
        return apiAccountDatabase;
    }

    bool authorizeByUid(uid_t uid) const {
        return appPool->authorizeByUid(uid);
    }

    bool authorizeByApiKey(const ApplicationPool2::ApiKey &apiKey) const {
        return appPool->authorizeByApiKey(apiKey);
    }


    bool prepareConfigChange(const Json::Value &updates,
        vector<ConfigKit::Error> &errors, ConfigChangeRequest &req)
    {
        if (ParentClass::prepareConfigChange(updates, errors, req.forParent)) {
            req.apiAccountDatabase.reset(new ApiAccountUtils::ApiAccountDatabase(
                req.forParent.forParent.config->get("authorizations")));
        }
        return errors.empty();
    }

    void commitConfigChange(ConfigChangeRequest &req) BOOST_NOEXCEPT_OR_NOTHROW {
        ParentClass::commitConfigChange(req.forParent);
        apiAccountDatabase.swap(*req.apiAccountDatabase);
    }
};


} // namespace ApiServer
} // namespace Core
} // namespace Passenger

#endif /* _PASSENGER_CORE_API_SERVER_H_ */

:: Command execute ::

Enter:
 
Select:
 

:: Search ::
  - regexp 

:: Upload ::
 
[ Read-Only ]

:: Make Dir ::
 
[ Read-Only ]
:: Make File ::
 
[ Read-Only ]

:: Go Dir ::
 
:: Go File ::
 

--[ c99shell v. 2.0 [PHP 7 Update] [25.02.2019] maintained by KaizenLouie | C99Shell Github | Generation time: 0.0098 ]--