The Request ProcessorBy Pete SuOverview
This document is a brief introduction to the OpenACS &version; Request Processor;
more details can be found in the . Here we cover the high level concepts behind the
system, and implications and usage for the application developer.
The Old Way
In older versions of the OpenACS, the mapping between URLs and pages was
simple. AOLserver (the usual webserver for the OpenACS) would find the
appropriate file by appending the server's page-root to the path in
the URL and returning that file to the user. For example, a user's
request for a URL like "http://foo-service.com/bar.html" would cause
the server to look in the filesystem for
/web/foo-service/www/bar.html, and return that file.
This was simple enough, but OpenACS did not provide a clean centralized
mechanism for the following requirements of larger web services:
Support for more flexible mappings from URLs to content
Robust user authentication
Page level access control
To achieve this functionality above in OpenACS 3.x, developers used an ad
hoc combination of AOLserver filters, the ns_perm call,
special purpose code in pages, and other procedures. In OpenACS &version;, the
Request Processor, along with the OpenACS Package Manager, centralizes and
unifies this functionality, making it more transparent and readily
available to developers.
The New Way
The &version; Request Processor is a global filter and set of Tcl procs that
respond to every incoming URL reaching the server. The following
diagram summarizes the stages of the request processor assuming a URL
request like http://someserver.com/notes/somepage.adp.
This is an image of the flow in the Request ProcessorStage 1: Search Site Map
The first thing the RP does is to map the given URL to the appropriate
physical directory in the filesystem, from which to serve content. We
do this by searching the site map data model (touched on in the , and further
discussed in ). This data model maps URLs to objects representing
content, and these objects are typically package instances.
After looking up the appropriate object, the RP stores the URL, the ID
of the object it found, and the package and package instance the
object belongs to into the environment of the connection. This
environment can be queried using the ad_conn procedure,
which is described in detail in . The page
development tutorial shows you how to use this interface to make
your pages aware of which instance was requested.
Stage 2: Authentication
Next, the Request Processor examines the request for session
information. Session information is generally sent from the client
(the user's browser) to the server via cookies. The security/session handler is described in
detail in its own document. It examines the client request and either
extracts or sets up new session tokens for the user.
Stage 3: Authorization
Next, the Request Processor checks if the user has appropriate access
privileges to the requested part of the site. In OpenACS &version;, access control
is dictated by the permissions system. In
this case, the RP checks if the user has "read" priviledges on the
object in the site map specified by the URL. This object is typically
a package instance, but it could easily be something more granular,
such as whehter the user can view a particular piece of content within
a package instance. This automatic check makes it easy to set up
sites with areas that are only accessible to specific groups of users.
Stage 4: URL Processing, File Search
Finally, the Request Processor finds the file we intend to serve,
searching the filesystem to locate the actual file that corresponds to
an abstract URL. It searches for files with predefined "magic"
extensions, i.e. files that end with: .html,
.tcl and .adp.
If the RP can't find any matching files with the expected extensions,
it will look for virtual-url-handler files, or .vuh
files. A .vuh file will be executed as if it were a Tcl
file, but with the tail end of the URL removed. This allows the code
in the .vuh file to act like a registered procedure for
an entire subtree of the URL namespace. Thus a .vuh file
can be thought of as a replacement for filters and registered procs,
except that they integrate cleanly and correctly with the RP's URL
mapping mechanisms. The details of how to use these files are
described in .
Once the appropriate file is found, it is either served directly if
it's static content, or sent to the template system or the standard
Tcl interpreter if it's a dynamic page.
Basic API
Once the flow of control reaches a dynamic page, the Request Processor
has populated the environment of the request with several pieces of
useful information. The RP's environment is accessible through the
ad_conn interface, and the following calls should be
useful to you when developing dynamic pages:
[ad_conn user_id]
The ID of the user associated with this request. By convention this is
zero if there is no user.
[ad_conn session_id]
The ID of the session associated with this request.
[ad_conn url]
The URL associated with the request.
[ad_conn urlv]
The URL associated with the request, represented as a list instead of
a single string.
[ad_conn file]
The actual local filesystem path of the file that is being served.
[ad_conn object_url]
If the URL refers to a site map object, this is the URL to the root
of the tree where the object is mounted.
[ad_conn package_url]
If the URL refers to a package instance, this is the URL to the root
of the tree where the package is mounted.
[ad_conn extra_url]
If we found the URL in the site map, this is the tail of the URL
following the part that matched a site map entry.
[ad_conn object_id]
If the URL refers to a site map object, this is the ID of that object.
[ad_conn package_id]
If the URL refers to a package instance, this is the ID of that
package instance.
[ad_conn package_key]
If the URL refers to a package instance, this is the unique key name
of the package.
($Id: rp.xml,v 1.3.2.1 2002/05/15 23:26:19 vinodk Exp $)