void kore_accesslog(struct http_request *req) { struct kore_log_packet logpacket; logpacket.addrtype = req->owner->addrtype; if (logpacket.addrtype == AF_INET) { memcpy(logpacket.addr, &(req->owner->addr.ipv4.sin_addr), sizeof(req->owner->addr.ipv4.sin_addr)); } else { memcpy(logpacket.addr, &(req->owner->addr.ipv6.sin6_addr), sizeof(req->owner->addr.ipv6.sin6_addr)); } logpacket.status = req->status; logpacket.method = req->method; logpacket.worker_id = worker->id; logpacket.worker_cpu = worker->cpu; logpacket.time_req = req->total; if (kore_strlcpy(logpacket.host, req->host, sizeof(logpacket.host)) >= sizeof(logpacket.host)) kore_log(LOG_NOTICE, "kore_accesslog: host truncated"); if (kore_strlcpy(logpacket.path, req->path, sizeof(logpacket.path)) >= sizeof(logpacket.path)) kore_log(LOG_NOTICE, "kore_accesslog: path truncated"); if (req->agent != NULL) { if (kore_strlcpy(logpacket.agent, req->agent, sizeof(logpacket.agent)) >= sizeof(logpacket.agent)) kore_log(LOG_NOTICE, "kore_accesslog: agent truncated"); } else { (void)kore_strlcpy(logpacket.agent, "unknown", sizeof(logpacket.agent)); } #if !defined(KORE_NO_TLS) memset(logpacket.cn, '\0', sizeof(logpacket.cn)); if (req->owner->cert != NULL) { if (X509_GET_CN(req->owner->cert, logpacket.cn, sizeof(logpacket.cn)) == -1) { kore_log(LOG_WARNING, "client cert without a CN?"); } } #endif kore_msg_send(KORE_MSG_PARENT, KORE_MSG_ACCESSLOG, &logpacket, sizeof(logpacket)); }
void kore_accesslog(struct http_request *req) { ssize_t len; struct kore_log_packet logpacket; logpacket.addrtype = req->owner->addrtype; if (logpacket.addrtype == AF_INET) { memcpy(logpacket.addr, &(req->owner->addr.ipv4.sin_addr), sizeof(req->owner->addr.ipv4.sin_addr)); } else { memcpy(logpacket.addr, &(req->owner->addr.ipv6.sin6_addr), sizeof(req->owner->addr.ipv6.sin6_addr)); } logpacket.status = req->status; logpacket.method = req->method; logpacket.worker_id = worker->id; logpacket.worker_cpu = worker->cpu; logpacket.time_req = req->total; kore_strlcpy(logpacket.host, req->host, sizeof(logpacket.host)); kore_strlcpy(logpacket.path, req->path, sizeof(logpacket.path)); if (req->agent != NULL) { kore_strlcpy(logpacket.agent, req->agent, sizeof(logpacket.agent)); } else { kore_strlcpy(logpacket.agent, "unknown", sizeof(logpacket.agent)); } memset(logpacket.cn, '\0', sizeof(logpacket.cn)); #if !defined(KORE_BENCHMARK) if (req->owner->cert != NULL) { if (X509_GET_CN(req->owner->cert, logpacket.cn, sizeof(logpacket.cn)) == -1) { kore_log(LOG_WARNING, "client cert without a CN?"); } } #endif len = send(accesslog_fd[1], &logpacket, sizeof(logpacket), 0); if (len == -1) { kore_log(LOG_WARNING, "kore_accesslog(): send(): %s", errno_s); } else if (len != sizeof(logpacket)) { kore_log(LOG_WARNING, "short accesslog packet sent"); } }
char * kore_strdup(const char *str) { size_t len; char *nstr; len = strlen(str) + 1; nstr = kore_malloc(len); kore_strlcpy(nstr, str, len); return (nstr); }
void kore_accesslog(struct http_request *req) { ssize_t len; struct kore_log_packet logpacket; logpacket.addrtype = req->owner->addrtype; if (logpacket.addrtype == AF_INET) { memcpy(logpacket.addr, &(req->owner->addr.ipv4.sin_addr), sizeof(req->owner->addr.ipv4.sin_addr)); } else { memcpy(logpacket.addr, &(req->owner->addr.ipv6.sin6_addr), sizeof(req->owner->addr.ipv6.sin6_addr)); } logpacket.status = req->status; logpacket.method = req->method; logpacket.worker_id = worker->id; logpacket.worker_cpu = worker->cpu; logpacket.time_req = req->end - req->start; kore_strlcpy(logpacket.host, req->host, sizeof(logpacket.host)); kore_strlcpy(logpacket.path, req->path, sizeof(logpacket.path)); if (req->agent != NULL) { kore_strlcpy(logpacket.agent, req->agent, sizeof(logpacket.agent)); } else { kore_strlcpy(logpacket.agent, "unknown", sizeof(logpacket.agent)); } len = send(accesslog_fd[1], &logpacket, sizeof(logpacket), 0); if (len == -1) { kore_log(LOG_WARNING, "kore_accesslog(): send(): %s", errno_s); } else if (len != sizeof(logpacket)) { kore_log(LOG_WARNING, "short accesslog packet sent"); } }
void kore_accesslog(struct http_request *req) { ssize_t len; struct kore_log_packet logpacket; logpacket.status = req->status; logpacket.method = req->method; logpacket.worker_id = worker->id; logpacket.worker_cpu = worker->cpu; logpacket.src = req->owner->sin.sin_addr; logpacket.time_req = req->end - req->start; kore_strlcpy(logpacket.host, req->host, sizeof(logpacket.host)); kore_strlcpy(logpacket.path, req->path, sizeof(logpacket.path)); kore_strlcpy(logpacket.agent, req->agent, sizeof(logpacket.agent)); len = send(accesslog_fd[1], &logpacket, sizeof(logpacket), 0); if (len == -1) { kore_log(LOG_WARNING, "kore_accesslog(): send(): %s", errno_s); } else if (len != sizeof(logpacket)) { kore_log(LOG_WARNING, "short accesslog packet sent"); } }
int kore_accesslog_wait(void) { ssize_t len; time_t now; struct kore_domain *dom; struct pollfd pfd[1]; int nfds, l; struct kore_log_packet logpacket; char addr[INET6_ADDRSTRLEN]; char *method, *buf, *tbuf, *cn; pfd[0].fd = accesslog_fd[0]; pfd[0].events = POLLIN; pfd[0].revents = 0; nfds = poll(pfd, 1, 1000); if (nfds == -1 || (pfd[0].revents & (POLLERR | POLLHUP | POLLNVAL))) { if (nfds == -1 && errno == EINTR) return (KORE_RESULT_OK); kore_log(LOG_WARNING, "poll(): %s", errno_s); return (KORE_RESULT_ERROR); } if (nfds == 0) return (KORE_RESULT_OK); len = recv(accesslog_fd[0], &logpacket, sizeof(logpacket), 0); if (len == -1) { kore_log(LOG_WARNING, "recv(): %s", errno_s); return (KORE_RESULT_ERROR); } if (len != sizeof(logpacket)) return (KORE_RESULT_ERROR); if ((dom = kore_domain_lookup(logpacket.host)) == NULL) { kore_log(LOG_WARNING, "got accesslog packet for unknown domain: %s", logpacket.host); return (KORE_RESULT_OK); } switch (logpacket.method) { case HTTP_METHOD_GET: method = "GET"; break; case HTTP_METHOD_POST: method = "POST"; break; default: method = "UNKNOWN"; break; } if (logpacket.cn[0] != '\0') cn = logpacket.cn; else cn = "none"; if (inet_ntop(logpacket.addrtype, &(logpacket.addr), addr, sizeof(addr)) == NULL) kore_strlcpy(addr, "unknown", sizeof(addr)); time(&now); tbuf = kore_time_to_date(now); l = asprintf(&buf, "[%s] %s %d %s %s (w#%d) (%dms) (%s) (%s)\n", tbuf, addr, logpacket.status, method, logpacket.path, logpacket.worker_id, logpacket.time_req, cn, logpacket.agent); if (l == -1) { kore_log(LOG_WARNING, "kore_accesslog_wait(): asprintf() == -1"); return (KORE_RESULT_ERROR); } len = write(dom->accesslog, buf, l); if (len == -1) { free(buf); kore_log(LOG_WARNING, "kore_accesslog_wait(): write(): %s", errno_s); return (KORE_RESULT_ERROR); } if (len != l) kore_log(LOG_NOTICE, "accesslog: %s", buf); free(buf); return (KORE_RESULT_OK); }
int kore_accesslog_wait(void) { ssize_t len; time_t now; size_t slen; int nfds; struct kore_domain *dom; struct pollfd pfd[1]; struct kore_log_packet logpacket; char addr[INET6_ADDRSTRLEN]; char *method, buf[4096], *tbuf; pfd[0].fd = accesslog_fd[0]; pfd[0].events = POLLIN; pfd[0].revents = 0; nfds = poll(pfd, 1, 1000); if (nfds == -1 || (pfd[0].revents & (POLLERR | POLLHUP | POLLNVAL))) { if (nfds == -1 && errno == EINTR) return (KORE_RESULT_OK); kore_log(LOG_WARNING, "poll(): %s", errno_s); return (KORE_RESULT_ERROR); } if (nfds == 0) return (KORE_RESULT_OK); len = recv(accesslog_fd[0], &logpacket, sizeof(logpacket), 0); if (len == -1) { kore_log(LOG_WARNING, "recv(): %s", errno_s); return (KORE_RESULT_ERROR); } if (len != sizeof(logpacket)) return (KORE_RESULT_ERROR); if ((dom = kore_domain_lookup(logpacket.host)) == NULL) { kore_log(LOG_WARNING, "got accesslog packet for unknown domain: %s", logpacket.host); return (KORE_RESULT_OK); } if (logpacket.method == HTTP_METHOD_GET) method = "GET"; else method = "POST"; if (inet_ntop(logpacket.addrtype, &(logpacket.addr), addr, sizeof(addr)) == NULL) kore_strlcpy(addr, "unknown", sizeof(addr)); time(&now); tbuf = kore_time_to_date(now); snprintf(buf, sizeof(buf), "[%s] %s %d %s %s (w#%d) (%dms) (%s)\n", tbuf, addr, logpacket.status, method, logpacket.path, logpacket.worker_id, logpacket.time_req, logpacket.agent); slen = strlen(buf); len = write(dom->accesslog, buf, slen); if (len == -1) { kore_log(LOG_WARNING, "kore_accesslog_wait(): write(): %s", errno_s); return (KORE_RESULT_ERROR); } if ((size_t)len != slen) kore_log(LOG_NOTICE, "accesslog: %s", buf); return (KORE_RESULT_OK); }
int kore_accesslog_write(const void *data, u_int32_t len) { int l; time_t now; ssize_t sent; struct kore_domain *dom; struct kore_log_packet logpacket; char addr[INET6_ADDRSTRLEN]; char *method, *buf, *tbuf, *cn; if (len != sizeof(struct kore_log_packet)) return (KORE_RESULT_ERROR); (void)memcpy(&logpacket, data, sizeof(logpacket)); if ((dom = kore_domain_lookup(logpacket.host)) == NULL) { kore_log(LOG_WARNING, "got accesslog packet for unknown domain: %s", logpacket.host); return (KORE_RESULT_OK); } switch (logpacket.method) { case HTTP_METHOD_GET: method = "GET"; break; case HTTP_METHOD_POST: method = "POST"; break; case HTTP_METHOD_PUT: method = "PUT"; break; case HTTP_METHOD_DELETE: method = "DELETE"; break; case HTTP_METHOD_HEAD: method = "HEAD"; break; default: method = "UNKNOWN"; break; } cn = "none"; #if !defined(KORE_NO_TLS) if (logpacket.cn[0] != '\0') cn = logpacket.cn; #endif if (inet_ntop(logpacket.addrtype, &(logpacket.addr), addr, sizeof(addr)) == NULL) (void)kore_strlcpy(addr, "unknown", sizeof(addr)); time(&now); tbuf = kore_time_to_date(now); l = asprintf(&buf, "[%s] %s %d %s %s (w#%d) (%dms) (%s) (%s)\n", tbuf, addr, logpacket.status, method, logpacket.path, logpacket.worker_id, logpacket.time_req, cn, logpacket.agent); if (l == -1) { kore_log(LOG_WARNING, "kore_accesslog_write(): asprintf() == -1"); return (KORE_RESULT_ERROR); } sent = write(dom->accesslog, buf, l); if (sent == -1) { free(buf); kore_log(LOG_WARNING, "kore_accesslog_write(): write(): %s", errno_s); return (KORE_RESULT_ERROR); } if (sent != l) kore_log(LOG_NOTICE, "accesslog: %s", buf); free(buf); return (KORE_RESULT_OK); }