2 8ad1c570 2021-05-09 op * Copyright (c) 2021 Omar Polo <op@omarpolo.com>
4 8ad1c570 2021-05-09 op * Permission to use, copy, modify, and distribute this software for any
5 8ad1c570 2021-05-09 op * purpose with or without fee is hereby granted, provided that the above
6 8ad1c570 2021-05-09 op * copyright notice and this permission notice appear in all copies.
8 8ad1c570 2021-05-09 op * THE SOFTWARE IS PROVIDED "AS IS" AND THE AUTHOR DISCLAIMS ALL WARRANTIES
9 8ad1c570 2021-05-09 op * WITH REGARD TO THIS SOFTWARE INCLUDING ALL IMPLIED WARRANTIES OF
10 8ad1c570 2021-05-09 op * MERCHANTABILITY AND FITNESS. IN NO EVENT SHALL THE AUTHOR BE LIABLE FOR
11 8ad1c570 2021-05-09 op * ANY SPECIAL, DIRECT, INDIRECT, OR CONSEQUENTIAL DAMAGES OR ANY DAMAGES
12 8ad1c570 2021-05-09 op * WHATSOEVER RESULTING FROM LOSS OF USE, DATA OR PROFITS, WHETHER IN AN
13 8ad1c570 2021-05-09 op * ACTION OF CONTRACT, NEGLIGENCE OR OTHER TORTIOUS ACTION, ARISING OUT OF
14 8ad1c570 2021-05-09 op * OR IN CONNECTION WITH THE USE OR PERFORMANCE OF THIS SOFTWARE.
17 8ad1c570 2021-05-09 op #include "gmid.h"
19 8ad1c570 2021-05-09 op #include <assert.h>
20 8ad1c570 2021-05-09 op #include <errno.h>
21 8ad1c570 2021-05-09 op #include <string.h>
24 8ad1c570 2021-05-09 op * Sometimes it can be useful to inspect the fastcgi traffic as
25 8ad1c570 2021-05-09 op * received by gmid.
27 8ad1c570 2021-05-09 op * This will make gmid connect to a `debug.sock' socket (that must
28 8ad1c570 2021-05-09 op * exists) in the current directory and send there a copy of what gets
29 8ad1c570 2021-05-09 op * read. The socket can be created and monitored e.g. with
31 8ad1c570 2021-05-09 op * rm -f debug.sock ; nc -Ulk ./debug.sock | hexdump -C
33 8ad1c570 2021-05-09 op * NB: the sandbox must be disabled for this to work.
35 8ad1c570 2021-05-09 op #define DEBUG_FCGI 0
37 f740b61b 2021-06-11 op #if DEBUG_FCGI
38 8ad1c570 2021-05-09 op # include <sys/un.h>
39 8ad1c570 2021-05-09 op static int debug_socket = -1;
42 8ad1c570 2021-05-09 op struct fcgi_header {
43 8ad1c570 2021-05-09 op unsigned char version;
44 8ad1c570 2021-05-09 op unsigned char type;
45 8ad1c570 2021-05-09 op unsigned char req_id1;
46 8ad1c570 2021-05-09 op unsigned char req_id0;
47 8ad1c570 2021-05-09 op unsigned char content_len1;
48 8ad1c570 2021-05-09 op unsigned char content_len0;
49 8ad1c570 2021-05-09 op unsigned char padding;
50 8ad1c570 2021-05-09 op unsigned char reserved;
54 8ad1c570 2021-05-09 op * number of bytes in a FCGI_HEADER. Future version of the protocol
55 8ad1c570 2021-05-09 op * will not reduce this number.
57 8ad1c570 2021-05-09 op #define FCGI_HEADER_LEN 8
60 8ad1c570 2021-05-09 op * values for the version component
62 8ad1c570 2021-05-09 op #define FCGI_VERSION_1 1
65 8ad1c570 2021-05-09 op * values for the type component
67 8ad1c570 2021-05-09 op #define FCGI_BEGIN_REQUEST 1
68 8ad1c570 2021-05-09 op #define FCGI_ABORT_REQUEST 2
69 8ad1c570 2021-05-09 op #define FCGI_END_REQUEST 3
70 8ad1c570 2021-05-09 op #define FCGI_PARAMS 4
71 8ad1c570 2021-05-09 op #define FCGI_STDIN 5
72 8ad1c570 2021-05-09 op #define FCGI_STDOUT 6
73 8ad1c570 2021-05-09 op #define FCGI_STDERR 7
74 8ad1c570 2021-05-09 op #define FCGI_DATA 8
75 8ad1c570 2021-05-09 op #define FCGI_GET_VALUES 9
76 8ad1c570 2021-05-09 op #define FCGI_GET_VALUES_RESULT 10
77 8ad1c570 2021-05-09 op #define FCGI_UNKNOWN_TYPE 11
78 8ad1c570 2021-05-09 op #define FCGI_MAXTYPE (FCGI_UNKNOWN_TYPE)
80 8ad1c570 2021-05-09 op struct fcgi_begin_req {
81 8ad1c570 2021-05-09 op unsigned char role1;
82 8ad1c570 2021-05-09 op unsigned char role0;
83 8ad1c570 2021-05-09 op unsigned char flags;
84 8ad1c570 2021-05-09 op unsigned char reserved[5];
87 8ad1c570 2021-05-09 op struct fcgi_begin_req_record {
88 8ad1c570 2021-05-09 op struct fcgi_header header;
89 8ad1c570 2021-05-09 op struct fcgi_begin_req body;
93 8ad1c570 2021-05-09 op * mask for flags;
95 8ad1c570 2021-05-09 op #define FCGI_KEEP_CONN 1
98 8ad1c570 2021-05-09 op * values for the role
100 8ad1c570 2021-05-09 op #define FCGI_RESPONDER 1
101 8ad1c570 2021-05-09 op #define FCGI_AUTHORIZER 2
102 8ad1c570 2021-05-09 op #define FCGI_FILTER 3
104 8ad1c570 2021-05-09 op struct fcgi_end_req_body {
105 8ad1c570 2021-05-09 op unsigned char app_status3;
106 8ad1c570 2021-05-09 op unsigned char app_status2;
107 8ad1c570 2021-05-09 op unsigned char app_status1;
108 8ad1c570 2021-05-09 op unsigned char app_status0;
109 8ad1c570 2021-05-09 op unsigned char proto_status;
110 8ad1c570 2021-05-09 op unsigned char reserved[3];
114 8ad1c570 2021-05-09 op * values for proto_status
116 8ad1c570 2021-05-09 op #define FCGI_REQUEST_COMPLETE 0
117 8ad1c570 2021-05-09 op #define FCGI_CANT_MPX_CONN 1
118 8ad1c570 2021-05-09 op #define FCGI_OVERLOADED 2
119 8ad1c570 2021-05-09 op #define FCGI_UNKNOWN_ROLE 3
122 8ad1c570 2021-05-09 op * Variable names for FCGI_GET_VALUES / FCGI_GET_VALUES_RESULT
125 8ad1c570 2021-05-09 op #define FCGI_MAX_CONNS "FCGI_MAX_CONNS"
126 8ad1c570 2021-05-09 op #define FCGI_MAX_REQS "FCGI_MAX_REQS"
127 8ad1c570 2021-05-09 op #define FCGI_MPXS_CONNS "FCGI_MPXS_CONNS"
130 8ad1c570 2021-05-09 op prepare_header(struct fcgi_header *h, int type, int id, size_t size,
131 8ad1c570 2021-05-09 op size_t padding)
133 8ad1c570 2021-05-09 op memset(h, 0, sizeof(*h));
136 8ad1c570 2021-05-09 op * id=0 is reserved for status messages.
140 8ad1c570 2021-05-09 op h->version = FCGI_VERSION_1;
141 8ad1c570 2021-05-09 op h->type = type;
142 8ad1c570 2021-05-09 op h->req_id1 = (id >> 8);
143 8ad1c570 2021-05-09 op h->req_id0 = (id & 0xFF);
144 8ad1c570 2021-05-09 op h->content_len1 = (size >> 8);
145 8ad1c570 2021-05-09 op h->content_len0 = (size & 0xFF);
146 8ad1c570 2021-05-09 op h->padding = padding;
152 8ad1c570 2021-05-09 op fcgi_begin_request(int sock, int id)
154 8ad1c570 2021-05-09 op struct fcgi_begin_req_record r;
156 8ad1c570 2021-05-09 op if (id > UINT16_MAX)
159 8ad1c570 2021-05-09 op memset(&r, 0, sizeof(r));
160 8ad1c570 2021-05-09 op prepare_header(&r.header, FCGI_BEGIN_REQUEST, id,
161 8ad1c570 2021-05-09 op sizeof(r.body), 0);
162 8ad1c570 2021-05-09 op assert(sizeof(r.body) == FCGI_HEADER_LEN);
164 8ad1c570 2021-05-09 op r.body.role1 = 0;
165 8ad1c570 2021-05-09 op r.body.role0 = FCGI_RESPONDER;
166 8ad1c570 2021-05-09 op r.body.flags = FCGI_KEEP_CONN;
168 e18b070d 2021-06-12 op if (write(sock, &r, sizeof(r)) != sizeof(r))
174 8ad1c570 2021-05-09 op fcgi_send_param(int sock, int id, const char *name, const char *value)
176 8ad1c570 2021-05-09 op struct fcgi_header h;
177 8ad1c570 2021-05-09 op uint32_t namlen, vallen, padlen;
178 8ad1c570 2021-05-09 op uint8_t s[8];
180 8ad1c570 2021-05-09 op char padding[8] = { 0 };
182 8ad1c570 2021-05-09 op namlen = strlen(name);
183 8ad1c570 2021-05-09 op vallen = strlen(value);
184 8ad1c570 2021-05-09 op size = namlen + vallen + 8; /* 4 for the sizes */
185 8ad1c570 2021-05-09 op padlen = (8 - (size & 0x7)) & 0x7;
187 8ad1c570 2021-05-09 op s[0] = ( namlen >> 24) | 0x80;
188 8ad1c570 2021-05-09 op s[1] = ((namlen >> 16) & 0xFF);
189 8ad1c570 2021-05-09 op s[2] = ((namlen >> 8) & 0xFF);
190 8ad1c570 2021-05-09 op s[3] = ( namlen & 0xFF);
192 8ad1c570 2021-05-09 op s[4] = ( vallen >> 24) | 0x80;
193 8ad1c570 2021-05-09 op s[5] = ((vallen >> 16) & 0xFF);
194 8ad1c570 2021-05-09 op s[6] = ((vallen >> 8) & 0xFF);
195 8ad1c570 2021-05-09 op s[7] = ( vallen & 0xFF);
197 8ad1c570 2021-05-09 op prepare_header(&h, FCGI_PARAMS, id, size, padlen);
199 8ad1c570 2021-05-09 op if (write(sock, &h, sizeof(h)) != sizeof(h) ||
200 8ad1c570 2021-05-09 op write(sock, s, sizeof(s)) != sizeof(s) ||
201 8ad1c570 2021-05-09 op write(sock, name, namlen) != namlen ||
202 8ad1c570 2021-05-09 op write(sock, value, vallen) != vallen ||
203 8ad1c570 2021-05-09 op write(sock, padding, padlen) != padlen)
210 8ad1c570 2021-05-09 op fcgi_end_param(int sock, int id)
212 8ad1c570 2021-05-09 op struct fcgi_header h;
214 8ad1c570 2021-05-09 op prepare_header(&h, FCGI_PARAMS, id, 0, 0);
215 8ad1c570 2021-05-09 op if (write(sock, &h, sizeof(h)) != sizeof(h))
218 8ad1c570 2021-05-09 op prepare_header(&h, FCGI_STDIN, id, 0, 0);
219 8ad1c570 2021-05-09 op if (write(sock, &h, sizeof(h)) != sizeof(h))
226 8ad1c570 2021-05-09 op fcgi_abort_request(int sock, int id)
228 8ad1c570 2021-05-09 op struct fcgi_header h;
230 8ad1c570 2021-05-09 op prepare_header(&h, FCGI_ABORT_REQUEST, id, 0, 0);
231 8ad1c570 2021-05-09 op if (write(sock, &h, sizeof(h)) != sizeof(h))
238 8ad1c570 2021-05-09 op must_read(int sock, char *d, size_t len)
242 8ad1c570 2021-05-09 op #if DEBUG_FCGI
243 8ad1c570 2021-05-09 op if (debug_socket == -1) {
244 8ad1c570 2021-05-09 op struct sockaddr_un addr;
246 8ad1c570 2021-05-09 op if ((debug_socket = socket(AF_UNIX, SOCK_STREAM, 0)) == -1)
247 8ad1c570 2021-05-09 op err(1, "socket");
249 8ad1c570 2021-05-09 op memset(&addr, 0, sizeof(addr));
250 8ad1c570 2021-05-09 op addr.sun_family = AF_UNIX;
251 8ad1c570 2021-05-09 op strlcpy(addr.sun_path, "./debug.sock", sizeof(addr.sun_path));
252 8ad1c570 2021-05-09 op if (connect(debug_socket, (struct sockaddr*)&addr, sizeof(addr))
254 8ad1c570 2021-05-09 op err(1, "connect");
259 8ad1c570 2021-05-09 op switch (r = read(sock, d, len)) {
264 8ad1c570 2021-05-09 op #if DEBUG_FCGI
265 8ad1c570 2021-05-09 op write(debug_socket, d, r);
268 8ad1c570 2021-05-09 op if (r == (ssize_t)len)
277 8ad1c570 2021-05-09 op fcgi_read_header(int sock, struct fcgi_header *h)
279 8ad1c570 2021-05-09 op if (must_read(sock, (char*)h, sizeof(*h)) == -1)
281 8ad1c570 2021-05-09 op if (h->version != FCGI_VERSION_1) {
282 8ad1c570 2021-05-09 op errno = EINVAL;
288 8ad1c570 2021-05-09 op static inline int
289 8ad1c570 2021-05-09 op recid(struct fcgi_header *h)
291 8ad1c570 2021-05-09 op return h->req_id0 + (h->req_id1 << 8) - 1;
294 8ad1c570 2021-05-09 op static inline int
295 8ad1c570 2021-05-09 op reclen(struct fcgi_header *h)
297 8ad1c570 2021-05-09 op return h->content_len0 + (h->content_len1 << 8);
301 8ad1c570 2021-05-09 op copy_mbuf(int fd, short ev, void *d)
303 8ad1c570 2021-05-09 op struct client *c = d;
304 8ad1c570 2021-05-09 op struct mbuf *mbuf;
310 8ad1c570 2021-05-09 op mbuf = TAILQ_FIRST(&c->mbufhead);
311 8ad1c570 2021-05-09 op if (mbuf == NULL)
314 8ad1c570 2021-05-09 op len = mbuf->len - mbuf->off;
315 8ad1c570 2021-05-09 op data = mbuf->data + mbuf->off;
316 8ad1c570 2021-05-09 op switch (r = tls_write(c->ctx, data, len)) {
319 8ad1c570 2021-05-09 op * Can't close_conn here. The application
320 8ad1c570 2021-05-09 op * needs to be informed first, otherwise it
321 8ad1c570 2021-05-09 op * can interfere with future connections.
322 8ad1c570 2021-05-09 op * Check also that we're not doing recursion
323 8ad1c570 2021-05-09 op * (copy_mbuf -> handle_fcgi -> copy_mbuf ...)
325 8ad1c570 2021-05-09 op if (c->next != NULL)
327 8ad1c570 2021-05-09 op fcgi_abort_request(0, c->id);
329 8ad1c570 2021-05-09 op case TLS_WANT_POLLIN:
330 8ad1c570 2021-05-09 op event_once(c->fd, EV_READ, ©_mbuf, c, NULL);
332 8ad1c570 2021-05-09 op case TLS_WANT_POLLOUT:
333 8ad1c570 2021-05-09 op event_once(c->fd, EV_WRITE, ©_mbuf, c, NULL);
336 8ad1c570 2021-05-09 op mbuf->off += r;
338 8ad1c570 2021-05-09 op if (mbuf->off == mbuf->len) {
339 8ad1c570 2021-05-09 op TAILQ_REMOVE(&c->mbufhead, mbuf, mbufs);
345 8ad1c570 2021-05-09 op if (c->next != NULL)
346 8ad1c570 2021-05-09 op c->next(0, 0, c);
350 8ad1c570 2021-05-09 op consume(int fd, size_t len)
353 8ad1c570 2021-05-09 op char buf[64];
355 8ad1c570 2021-05-09 op while (len != 0) {
356 8ad1c570 2021-05-09 op if ((l = len) > sizeof(buf))
357 8ad1c570 2021-05-09 op l = sizeof(buf);
358 8ad1c570 2021-05-09 op if (must_read(fd, buf, l) == -1)
367 8ad1c570 2021-05-09 op close_all(struct fcgi *f)
370 8ad1c570 2021-05-09 op struct client *c;
372 8ad1c570 2021-05-09 op for (i = 0; i < MAX_USERS; i++) {
373 8ad1c570 2021-05-09 op c = &clients[i];
375 8ad1c570 2021-05-09 op if (c->fcgi != f->id)
378 8ad1c570 2021-05-09 op if (c->code != 0)
379 8ad1c570 2021-05-09 op close_conn(0, 0, c);
381 8ad1c570 2021-05-09 op start_reply(c, CGI_ERROR, "CGI error");
384 090b8a89 2021-07-06 op fcgi_close_backend(f);
388 090b8a89 2021-07-06 op fcgi_close_backend(struct fcgi *f)
390 8ad1c570 2021-05-09 op event_del(&f->e);
391 8ad1c570 2021-05-09 op close(f->fd);
393 090b8a89 2021-07-06 op f->pending = 0;
394 8ad1c570 2021-05-09 op f->s = FCGI_OFF;
398 8ad1c570 2021-05-09 op handle_fcgi(int sock, short event, void *d)
400 8ad1c570 2021-05-09 op struct fcgi *f = d;
401 8ad1c570 2021-05-09 op struct fcgi_header h;
402 8ad1c570 2021-05-09 op struct fcgi_end_req_body end;
403 8ad1c570 2021-05-09 op struct client *c;
404 8ad1c570 2021-05-09 op struct mbuf *mbuf;
407 8ad1c570 2021-05-09 op if (fcgi_read_header(sock, &h) == -1)
410 8ad1c570 2021-05-09 op c = try_client_by_id(recid(&h));
411 8ad1c570 2021-05-09 op if (c == NULL || c->fcgi != f->id)
414 8ad1c570 2021-05-09 op len = reclen(&h);
416 8ad1c570 2021-05-09 op switch (h.type) {
417 8ad1c570 2021-05-09 op case FCGI_END_REQUEST:
418 8ad1c570 2021-05-09 op if (len != sizeof(end))
420 8ad1c570 2021-05-09 op if (must_read(sock, (char*)&end, sizeof(end)) == -1)
422 8ad1c570 2021-05-09 op /* TODO: do something with the status? */
424 090b8a89 2021-07-06 op f->pending--;
425 8ad1c570 2021-05-09 op c->fcgi = -1;
426 8ad1c570 2021-05-09 op c->next = close_conn;
427 8ad1c570 2021-05-09 op event_once(c->fd, EV_WRITE, ©_mbuf, c, NULL);
430 8ad1c570 2021-05-09 op case FCGI_STDERR:
431 8ad1c570 2021-05-09 op /* discard stderr (for now) */
432 8ad1c570 2021-05-09 op if (!consume(sock, len))
436 8ad1c570 2021-05-09 op case FCGI_STDOUT:
437 8ad1c570 2021-05-09 op if ((mbuf = calloc(1, sizeof(*mbuf) + len)) == NULL)
438 8ad1c570 2021-05-09 op fatal("calloc");
439 8ad1c570 2021-05-09 op mbuf->len = len;
440 8ad1c570 2021-05-09 op if (must_read(sock, mbuf->data, len) == -1) {
445 8ad1c570 2021-05-09 op if (TAILQ_EMPTY(&c->mbufhead)) {
446 8ad1c570 2021-05-09 op TAILQ_INSERT_HEAD(&c->mbufhead, mbuf, mbufs);
447 8ad1c570 2021-05-09 op event_once(c->fd, EV_WRITE, ©_mbuf, c, NULL);
449 8ad1c570 2021-05-09 op TAILQ_INSERT_TAIL(&c->mbufhead, mbuf, mbufs);
453 8ad1c570 2021-05-09 op log_err(NULL, "got invalid fcgi record (type=%d)", h.type);
457 8ad1c570 2021-05-09 op if (!consume(sock, h.padding))
460 090b8a89 2021-07-06 op if (f->pending == 0 && shutting_down)
461 090b8a89 2021-07-06 op fcgi_close_backend(f);
466 8ad1c570 2021-05-09 op close_all(f);
470 8ad1c570 2021-05-09 op send_fcgi_req(struct fcgi *f, struct client *c)
472 f740b61b 2021-06-11 op char addr[NI_MAXHOST], buf[22];
475 f740b61b 2021-06-11 op struct tm tminfo;
476 f740b61b 2021-06-11 op struct envlist *p;
478 090b8a89 2021-07-06 op f->pending++;
480 59c7ee13 2021-07-06 op e = getnameinfo((struct sockaddr*)&c->addr, sizeof(c->addr),
481 d1051bfa 2021-05-15 op addr, sizeof(addr),
483 d1051bfa 2021-05-15 op NI_NUMERICHOST);
485 d1051bfa 2021-05-15 op fatal("getnameinfo failed");
487 8ad1c570 2021-05-09 op c->next = NULL;
489 8ad1c570 2021-05-09 op fcgi_begin_request(f->fd, c->id);
490 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "GATEWAY_INTERFACE", "CGI/1.1");
491 8ad1c570 2021-05-09 op fcgi_send_param(f->fd, c->id, "GEMINI_URL_PATH", c->iri.path);
492 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "QUERY_STRING", c->iri.query);
493 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "REMOTE_ADDR", addr);
494 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "REMOTE_HOST", addr);
495 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "REQUEST_METHOD", "");
496 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "SERVER_NAME", c->iri.host);
497 d1051bfa 2021-05-15 op fcgi_send_param(f->fd, c->id, "SERVER_PROTOCOL", "GEMINI");
498 ce2c9edb 2021-05-15 op fcgi_send_param(f->fd, c->id, "SERVER_SOFTWARE", GMID_VERSION);
500 f740b61b 2021-06-11 op if (tls_peer_cert_provided(c->ctx)) {
501 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "AUTH_TYPE", "CERTIFICATE");
502 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "REMOTE_USER",
503 f740b61b 2021-06-11 op tls_peer_cert_subject(c->ctx));
504 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CLIENT_ISSUER",
505 f740b61b 2021-06-11 op tls_peer_cert_issuer(c->ctx));
506 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CLIENT_HASH",
507 f740b61b 2021-06-11 op tls_peer_cert_hash(c->ctx));
508 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_VERSION",
509 f740b61b 2021-06-11 op tls_conn_version(c->ctx));
510 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CIPHER",
511 f740b61b 2021-06-11 op tls_conn_cipher(c->ctx));
513 f740b61b 2021-06-11 op snprintf(buf, sizeof(buf), "%d",
514 f740b61b 2021-06-11 op tls_conn_cipher_strength(c->ctx));
515 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CIPHER_STRENGTH", buf);
517 f740b61b 2021-06-11 op tim = tls_peer_cert_notbefore(c->ctx);
518 f740b61b 2021-06-11 op strftime(buf, sizeof(buf), "%FT%TZ",
519 f740b61b 2021-06-11 op gmtime_r(&tim, &tminfo));
520 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CLIENT_NOT_BEFORE", buf);
522 f740b61b 2021-06-11 op tim = tls_peer_cert_notafter(c->ctx);
523 f740b61b 2021-06-11 op strftime(buf, sizeof(buf), "%FT%TZ",
524 f740b61b 2021-06-11 op gmtime_r(&tim, &tminfo));
525 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "TLS_CLIENT_NOT_AFTER", buf);
527 f740b61b 2021-06-11 op TAILQ_FOREACH(p, &c->host->params, envs) {
528 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, p->name, p->value);
531 f740b61b 2021-06-11 op fcgi_send_param(f->fd, c->id, "AUTH_TYPE", "");
533 8ad1c570 2021-05-09 op if (fcgi_end_param(f->fd, c->id) == -1)
534 8ad1c570 2021-05-09 op close_all(f);