Server IP : 162.213.251.208 / Your IP : 3.15.34.244 Web Server : LiteSpeed System : Linux business55.web-hosting.com 4.18.0-553.lve.el8.x86_64 #1 SMP Mon May 27 15:27:34 UTC 2024 x86_64 User : jmoroovq ( 1890) PHP Version : 7.4.33 Disable Function : NONE MySQL : OFF | cURL : ON | WGET : ON | Perl : ON | Python : ON | Sudo : OFF | Pkexec : OFF Directory : /opt/cpanel/ea-ruby27/src/passenger-release-6.0.23/src/cxx_supportlib/ServerKit/ |
Upload File : |
/* * Phusion Passenger - https://www.phusionpassenger.com/ * Copyright (c) 2012-2017 Phusion Holding B.V. * * "Passenger", "Phusion Passenger" and "Union Station" are registered * trademarks of Phusion Holding B.V. * * Permission is hereby granted, free of charge, to any person obtaining a copy * of this software and associated documentation files (the "Software"), to deal * in the Software without restriction, including without limitation the rights * to use, copy, modify, merge, publish, distribute, sublicense, and/or sell * copies of the Software, and to permit persons to whom the Software is * furnished to do so, subject to the following conditions: * * The above copyright notice and this permission notice shall be included in * all copies or substantial portions of the Software. * * THE SOFTWARE IS PROVIDED "AS IS", WITHOUT WARRANTY OF ANY KIND, EXPRESS OR * IMPLIED, INCLUDING BUT NOT LIMITED TO THE WARRANTIES OF MERCHANTABILITY, * FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT. IN NO EVENT SHALL THE * AUTHORS OR COPYRIGHT HOLDERS BE LIABLE FOR ANY CLAIM, DAMAGES OR OTHER * LIABILITY, WHETHER IN AN ACTION OF CONTRACT, TORT OR OTHERWISE, ARISING FROM, * OUT OF OR IN CONNECTION WITH THE SOFTWARE OR THE USE OR OTHER DEALINGS IN * THE SOFTWARE. */ #ifndef _PASSENGER_SERVER_KIT_ERRORS_H_ #define _PASSENGER_SERVER_KIT_ERRORS_H_ #include <cstring> #include <ServerKit/llhttp.h> #include <ServerKit/llerrors.h> namespace Passenger { namespace ServerKit { enum Error { // HttpChunkedBodyParser errors CHUNK_SIZE_TOO_LARGE = -1000, CHUNK_SIZE_PARSE_ERROR = -1001, CHUNK_FOOTER_PARSE_ERROR = -1002, CHUNK_FINALIZER_PARSE_ERROR = -1003, UNEXPECTED_EOF = -1004, // HttpHeaderParser errors HTTP_VERSION_NOT_SUPPORTED = -1010, REQUEST_CONTAINS_CONTENT_LENGTH_AND_TRANSFER_ENCODING = -1011, UPGRADE_NOT_ALLOWED_WHEN_REQUEST_BODY_EXISTS = -1012, UPGRADE_NOT_ALLOWED_FOR_HEAD_REQUESTS = -1013, RESPONSE_CONTAINS_CONTENT_LENGTH_AND_TRANSFER_ENCODING = -1014, SECURITY_PASSWORD_MISMATCH = -1015, SECURITY_PASSWORD_DUPLICATE = -1016, ERROR_SECURE_HEADER_NOT_ALLOWED = -1017, NORMAL_HEADER_NOT_ALLOWED_AFTER_SECURITY_PASSWORD = -1018, // HttpServer special errors EARLY_EOF_DETECTED = -1020, // Error codes below -2000 are http_parser errors HTTP_PARSER_ERRNO_BEGIN = -2000, }; inline const char * getErrorDesc(int errcode) { switch (errcode) { case CHUNK_SIZE_TOO_LARGE: return "Chunked encoding size too large"; case CHUNK_SIZE_PARSE_ERROR: return "Chunked encoding size string parse error"; case CHUNK_FOOTER_PARSE_ERROR: return "Chunked encoding footer parse error"; case CHUNK_FINALIZER_PARSE_ERROR: return "Chunked encoding final chunk parse error"; case UNEXPECTED_EOF: return "Unexpected end-of-stream"; case HTTP_VERSION_NOT_SUPPORTED: return "HTTP Version Not Supported"; case REQUEST_CONTAINS_CONTENT_LENGTH_AND_TRANSFER_ENCODING: return "Bad request (request may not contain both Content-Length and Transfer-Encoding)"; case UPGRADE_NOT_ALLOWED_WHEN_REQUEST_BODY_EXISTS: return "Bad request (Connection upgrading is only allowed for requests without request body)"; case UPGRADE_NOT_ALLOWED_FOR_HEAD_REQUESTS: return "Bad request (Connection upgrading is not allowed for HEAD requests)"; case RESPONSE_CONTAINS_CONTENT_LENGTH_AND_TRANSFER_ENCODING: return "Response may not contain both Content-Length and Transfer-Encoding"; case SECURITY_PASSWORD_MISMATCH: return "Security password mismatch"; case SECURITY_PASSWORD_DUPLICATE: return "A duplicate security password header was encountered"; case ERROR_SECURE_HEADER_NOT_ALLOWED: return "A secure header was provided, but no security password was provided"; case NORMAL_HEADER_NOT_ALLOWED_AFTER_SECURITY_PASSWORD: return "A normal header was encountered after the security password header"; case EARLY_EOF_DETECTED: return "The client connection is closed before the request is done processing"; default: if (errcode <= HTTP_PARSER_ERRNO_BEGIN) { return llhttp_get_error_description((llhttp_errno_t) (-errcode + HTTP_PARSER_ERRNO_BEGIN)); } else { return std::strerror(errcode); } } } } // namespace ServerKit } // namespace Passenger #endif /* _PASSENGER_SERVER_KIT_ERRORS_H_ */