[0001]
[0002]
[0003]
[0004]
[0005]
[0006]
[0007]
[0008]
[0009]
[0010]
[0011]
[0012]
[0013]
[0014]
[0015]
[0016]
[0017]
[0018]
[0019]
[0020]
[0021]
[0022]
[0023]
[0024]
[0025]
[0026]
[0027]
[0028]
[0029]
[0030]
[0031]
[0032]
[0033]
[0034]
[0035]
[0036]
[0037]
[0038]
[0039]
[0040]
[0041]
[0042]
[0043]
[0044]
[0045]
[0046]
[0047]
[0048]
[0049]
[0050]
[0051]
[0052]
[0053]
[0054]
[0055]
[0056]
[0057]
[0058]
[0059]
[0060]
[0061]
[0062]
[0063]
[0064]
[0065]
[0066]
[0067]
[0068]
[0069]
[0070]
[0071]
[0072]
[0073]
[0074]
[0075]
[0076]
[0077]
[0078]
[0079]
[0080]
[0081]
[0082]
[0083]
[0084]
[0085]
[0086]
[0087]
[0088]
[0089]
[0090]
[0091]
[0092]
[0093]
[0094]
[0095]
[0096]
[0097]
[0098]
[0099]
[0100]
[0101]
[0102]
[0103]
[0104]
[0105]
[0106]
[0107]
[0108]
[0109]
[0110]
[0111]
[0112]
[0113]
[0114]
[0115]
[0116]
[0117]
[0118]
[0119]
[0120]
[0121]
[0122]
[0123]
[0124]
[0125]
[0126]
[0127]
[0128]
[0129]
[0130]
[0131]
[0132]
[0133]
[0134]
[0135]
[0136]
[0137]
[0138]
[0139]
[0140]
[0141]
[0142]
[0143]
[0144]
[0145]
[0146]
[0147]
[0148]
[0149]
[0150]
[0151]
[0152]
[0153]
[0154]
[0155]
[0156]
[0157]
[0158]
[0159]
[0160]
[0161]
[0162]
[0163]
[0164]
[0165]
[0166]
[0167]
[0168]
[0169]
[0170]
[0171]
[0172]
[0173]
[0174]
[0175]
[0176]
[0177]
[0178]
[0179]
[0180]
[0181]
[0182]
[0183]
[0184]
[0185]
[0186]
[0187]
[0188]
[0189]
[0190]
[0191]
[0192]
[0193]
[0194]
[0195]
[0196]
[0197]
[0198]
[0199]
[0200]
[0201]
[0202]
[0203]
[0204]
[0205]
[0206]
[0207]
[0208]
[0209]
[0210]
[0211]
[0212]
[0213]
[0214]
[0215]
[0216]
[0217]
[0218]
[0219]
[0220]
[0221]
[0222]
[0223]
[0224]
[0225]
[0226]
[0227]
[0228]
[0229]
[0230]
[0231]
[0232]
[0233]
[0234]
[0235]
[0236]
[0237]
[0238]
[0239]
[0240]
[0241]
[0242]
[0243]
[0244]
[0245]
[0246]
[0247]
[0248]
[0249]
[0250]
[0251]
[0252]
[0253]
[0254]
[0255]
[0256]
[0257]
[0258]
[0259]
[0260]
[0261]
[0262]
[0263]
[0264]
[0265]
[0266]
[0267]
[0268]
[0269]
[0270]
[0271]
[0272]
[0273]
[0274]
[0275]
[0276]
[0277]
[0278]
[0279]
[0280]
[0281]
[0282]
[0283]
[0284]
[0285]
[0286]
[0287]
[0288]
[0289]
[0290]
[0291]
[0292]
[0293]
[0294]
[0295]
[0296]
[0297]
[0298]
[0299]
[0300]
[0301]
[0302]
[0303]
[0304]
[0305]
[0306]
[0307]
[0308]
[0309]
[0310]
[0311]
[0312]
[0313]
[0314]
[0315]
[0316]
[0317]
[0318]
[0319]
[0320]
[0321]
[0322]
[0323]
[0324]
[0325]
[0326]
[0327]
[0328]
[0329]
[0330]
[0331]
[0332]
[0333]
[0334]
[0335]
[0336]
[0337]
[0338]
[0339]
[0340]
[0341]
[0342]
[0343]
[0344]
[0345]
[0346]
[0347]
[0348]
[0349]
[0350]
[0351]
[0352]
[0353]
[0354]
[0355]
[0356]
[0357]
[0358]
[0359]
[0360]
[0361]
[0362]
[0363]
[0364]
[0365]
[0366]
[0367]
[0368]
[0369]
[0370]
[0371]
[0372]
[0373]
[0374]
[0375]
[0376]
[0377]
[0378]
[0379]
[0380]
[0381]
[0382]
[0383]
[0384]
[0385]
[0386]
[0387]
[0388]
[0389]
[0390]
[0391]
[0392]
[0393]
[0394]
[0395]
[0396]
[0397]
[0398]
[0399]
[0400]
[0401]
[0402]
[0403]
[0404]
[0405]
[0406]
[0407]
[0408]
[0409]
[0410]
[0411]
[0412]
[0413]
[0414]
[0415]
[0416]
[0417]
[0418]
[0419]
[0420]
[0421]
[0422]
[0423]
[0424]
[0425]
[0426]
[0427]
[0428]
[0429]
[0430]
[0431]
[0432]
[0433]
[0434]
[0435]
[0436]
[0437]
[0438]
[0439]
[0440]
[0441]
[0442]
[0443]
[0444]
[0445]
[0446]
[0447]
[0448]
[0449]
[0450]
[0451]
[0452]
[0453]
[0454]
[0455]
[0456]
[0457]
[0458]
[0459]
[0460]
[0461]
[0462]
[0463]
[0464]
[0465]
[0466]
[0467]
[0468]
[0469]
[0470]
[0471]
[0472]
[0473]
[0474]
[0475]
[0476]
[0477]
[0478]
[0479]
[0480]
[0481]
[0482]
[0483]
[0484]
[0485]
[0486]
[0487]
[0488]
[0489]
[0490]
[0491]
[0492]
[0493]
[0494]
[0495]
[0496]
[0497]
[0498]
[0499]
[0500]
[0501]
[0502]
[0503]
[0504]
[0505]
[0506]
[0507]
[0508]
[0509]
[0510]
[0511]
[0512]
[0513]
[0514]
[0515]
[0516]
[0517]
[0518]
[0519]
[0520]
[0521]
[0522]
[0523]
[0524]
[0525]
[0526]
[0527]
[0528]
[0529]
[0530]
[0531]
[0532]
[0533]
[0534]
[0535]
[0536]
[0537]
[0538]
[0539]
[0540]
[0541]
[0542]
[0543]
[0544]
[0545]
[0546]
[0547]
[0548]
[0549]
[0550]
[0551]
[0552]
[0553]
[0554]
[0555]
[0556]
[0557]
[0558]
[0559]
[0560]
[0561]
[0562]
[0563]
[0564]
[0565]
[0566]
[0567]
[0568]
[0569]
[0570]
[0571]
[0572]
[0573]
[0574]
[0575]
[0576]
[0577]
[0578]
[0579]
[0580]
[0581]
[0582]
[0583]
[0584]
[0585]
[0586]
[0587]
[0588]
[0589]
[0590]
[0591]
[0592]
[0593]
[0594]
[0595]
[0596]
[0597]
[0598]
[0599]
[0600]
[0601]
[0602]
[0603]
[0604]
[0605]
[0606]
[0607]
[0608]
[0609]
[0610]
[0611]
[0612]
[0613]
[0614]
[0615]
[0616]
[0617]
[0618]
[0619]
[0620]
[0621]
[0622]
[0623]
[0624]
[0625]
[0626]
[0627]
[0628]
[0629]
[0630]
[0631]
[0632]
[0633]
[0634]
[0635]
[0636]
[0637]
[0638]
[0639]
[0640]
[0641]
[0642]
[0643]
[0644]
[0645]
[0646]
[0647]
[0648]
[0649]
[0650]
[0651]
[0652]
[0653]
[0654]
[0655]
[0656]
[0657]
[0658]
[0659]
[0660]
[0661]
[0662]
[0663]
[0664]
[0665]
[0666]
[0667]
[0668]
[0669]
[0670]
[0671]
[0672]
[0673]
[0674]
[0675]
[0676]
[0677]
[0678]
[0679]
[0680]
[0681]
[0682]
[0683]
[0684]
[0685]
[0686]
[0687]
[0688]
[0689]
[0690]
[0691]
[0692]
[0693]
[0694]
[0695]
[0696]
[0697]
[0698]
[0699]
[0700]
[0701]
[0702]
[0703]
[0704]
[0705]
[0706]
[0707]
[0708]
[0709]
[0710]
[0711]
[0712]
[0713]
[0714]
[0715]
[0716]
[0717]
[0718]
[0719]
[0720]
[0721]
[0722]
[0723]
[0724]
[0725]
[0726]
[0727]
[0728]
[0729]
[0730]
[0731]
[0732]
[0733]
[0734]
[0735]
[0736]
[0737]
[0738]
[0739]
[0740]
[0741]
[0742]
[0743]
[0744]
[0745]
[0746]
[0747]
[0748]
[0749]
[0750]
[0751]
[0752]
[0753]
[0754]
[0755]
[0756]
[0757]
[0758]
[0759]
[0760]
[0761]
[0762]
[0763]
[0764]
[0765]
[0766]
[0767]
[0768]
[0769]
[0770]
[0771]
[0772]
[0773]
[0774]
[0775]
[0776]
[0777]
[0778]
[0779]
[0780]
[0781]
[0782]
[0783]
[0784]
[0785]
[0786]
[0787]
[0788]
[0789]
[0790]
[0791]
[0792]
[0793]
[0794]
[0795]
[0796]
[0797]
[0798]
[0799]
[0800]
[0801]
[0802]
[0803]
[0804]
[0805]
[0806]
[0807]
[0808]
[0809]
[0810]
[0811]
[0812]
[0813]
[0814]
[0815]
[0816]
[0817]
[0818]
[0819]
[0820]
[0821]
[0822]
[0823]
[0824]
[0825]
[0826]
[0827]
[0828]
[0829]
[0830]
[0831]
[0832]
[0833]
[0834]
[0835]
[0836]
[0837]
[0838]
[0839]
[0840]
[0841]
[0842]
[0843]
[0844]
[0845]
[0846]
[0847]
[0848]
[0849]
[0850]
[0851]
[0852]
[0853]
[0854]
[0855]
[0856]
[0857]
[0858]
[0859]
[0860]
[0861]
[0862]
[0863]
[0864]
[0865]
[0866]
[0867]
[0868]
[0869]
[0870]
[0871]
[0872]
[0873]
[0874]
[0875]
[0876]
[0877]
[0878]
[0879]
[0880]
[0881]
[0882]
[0883]
[0884]
[0885]
[0886]
[0887]
[0888]
[0889]
[0890]
[0891]
[0892]
[0893]
[0894]
[0895]
[0896]
[0897]
[0898]
[0899]
[0900]
[0901]
[0902]
[0903]
[0904]
[0905]
[0906]
[0907]
[0908]
[0909]
[0910]
[0911]
[0912]
[0913]
[0914]
[0915]
[0916]
[0917]
[0918]
[0919]
[0920]
[0921]
[0922]
[0923]
[0924]
[0925]
[0926]
[0927]
[0928]
[0929]
[0930]
[0931]
[0932]
[0933]
[0934]
[0935]
[0936]
[0937]
[0938]
[0939]
[0940]
[0941]
[0942]
[0943]
[0944]
[0945]
[0946]
[0947]
[0948]
[0949]
[0950]
[0951]
[0952]
[0953]
[0954]
[0955]
[0956]
[0957]
[0958]
[0959]
[0960]
[0961]
[0962]
[0963]
[0964]
[0965]
[0966]
[0967]
[0968]
[0969]
[0970]
[0971]
[0972]
[0973]
[0974]
[0975]
[0976]
[0977]
[0978]
[0979]
[0980]
[0981]
[0982]
[0983]
[0984]
[0985]
[0986]
[0987]
[0988]
[0989]
[0990]
[0991]
[0992]
[0993]
[0994]
[0995]
[0996]
[0997]
[0998]
[0999]
[1000]
[1001]
[1002]
[1003]
[1004]
[1005]
[1006]
[1007]
[1008]
[1009]
[1010]
[1011]
[1012]
[1013]
[1014]
[1015]
[1016]
[1017]
[1018]
[1019]
[1020]
[1021]
[1022]
[1023]
[1024]
[1025]
[1026]
[1027]
[1028]
[1029]
[1030]
[1031]
[1032]
[1033]
[1034]
[1035]
[1036]
[1037]
[1038]
[1039]
[1040]
[1041]
[1042]
[1043]
[1044]
[1045]
[1046]
[1047]
[1048]
[1049]
[1050]
[1051]
[1052]
[1053]
[1054]
[1055]
[1056]
[1057]
[1058]
[1059]
[1060]
[1061]
[1062]
[1063]
[1064]
[1065]
[1066]
[1067]
[1068]
[1069]
[1070]
[1071]
[1072]
[1073]
[1074]
[1075]
[1076]
[1077]
[1078]
[1079]
[1080]
[1081]
[1082]
[1083]
[1084]
[1085]
[1086]
[1087]
[1088]
[1089]
[1090]
[1091]
[1092]
[1093]
[1094]
[1095]
[1096]
[1097]
[1098]
[1099]
[1100]
[1101]
[1102]
[1103]
[1104]
[1105]
[1106]
[1107]
[1108]
[1109]
[1110]
[1111]
[1112]
[1113]
[1114]
[1115]
[1116]
[1117]
[1118]
[1119]
[1120]
[1121]
[1122]
[1123]
[1124]
[1125]
[1126]
[1127]
[1128]
[1129]
[1130]
[1131]
[1132]
[1133]
[1134]
[1135]
[1136]
[1137]
[1138]
[1139]
[1140]
[1141]
[1142]
[1143]
[1144]
[1145]
[1146]
[1147]
[1148]
[1149]
[1150]
[1151]
[1152]
[1153]
[1154]
[1155]
[1156]
[1157]
[1158]
[1159]
[1160]
[1161]
[1162]
[1163]
[1164]
[1165]
[1166]
[1167]
[1168]
[1169]
[1170]
[1171]
[1172]
[1173]
[1174]
[1175]
[1176]
[1177]
[1178]
[1179]
[1180]
[1181]
[1182]
[1183]
[1184]
[1185]
[1186]
[1187]
[1188]
[1189]
[1190]
[1191]
[1192]
[1193]
[1194]
[1195]
[1196]
[1197]
[1198]
[1199]
[1200]
[1201]
[1202]
[1203]
[1204]
[1205]
[1206]
[1207]
[1208]
[1209]
[1210]
[1211]
[1212]
[1213]
[1214]
[1215]
[1216]
[1217]
[1218]
[1219]
[1220]
[1221]
[1222]
[1223]
[1224]
[1225]
[1226]
[1227]
[1228]
[1229]
[1230]
[1231]
[1232]
[1233]
[1234]
[1235]
[1236]
[1237]
[1238]
[1239]
[1240]
[1241]
[1242]
[1243]
[1244]
[1245]
[1246]
[1247]
[1248]
[1249]
[1250]
[1251]
[1252]
[1253]
[1254]
[1255]
[1256]
[1257]
[1258]
[1259]
[1260]
[1261]
[1262]
[1263]
[1264]
[1265]
[1266]
[1267]
[1268]
[1269]
[1270]
[1271]
[1272]
[1273]
[1274]
[1275]
[1276]
[1277]
[1278]
[1279]
[1280]
[1281]
[1282]
[1283]
[1284]
[1285]
[1286]
[1287]
[1288]
[1289]
[1290]
[1291]
[1292]
[1293]
[1294]
[1295]
[1296]
[1297]
[1298]
[1299]
[1300]
[1301]
[1302]
[1303]
[1304]
[1305]
[1306]
[1307]
[1308]
[1309]
[1310]
[1311]
[1312]
[1313]
[1314]
[1315]
[1316]
[1317]
[1318]
[1319]
[1320]
[1321]
[1322]
[1323]
[1324]
[1325]
[1326]
[1327]
[1328]
[1329]
[1330]
[1331]
[1332]
[1333]
[1334]
[1335]
[1336]
[1337]
[1338]
[1339]
[1340]
[1341]
[1342]
[1343]
[1344]
[1345]
[1346]
[1347]
[1348]
[1349]
[1350]
[1351]
[1352]
[1353]
[1354]
[1355]
[1356]
[1357]
[1358]
[1359]
[1360]
[1361]
[1362]
[1363]
[1364]
[1365]
[1366]
[1367]
[1368]
[1369]
[1370]
[1371]
[1372]
[1373]
[1374]
[1375]
[1376]
[1377]
[1378]
[1379]
[1380]
[1381]
[1382]
[1383]
[1384]
[1385]
[1386]
[1387]
[1388]
[1389]
[1390]
[1391]
[1392]
[1393]
[1394]
[1395]
[1396]
[1397]
[1398]
[1399]
[1400]
[1401]
[1402]
[1403]
[1404]
[1405]
[1406]
[1407]
[1408]
[1409]
[1410]
[1411]
[1412]
[1413]
[1414]
[1415]
[1416]
[1417]
[1418]
[1419]
[1420]
[1421]
[1422]
[1423]
[1424]
[1425]
[1426]
[1427]
[1428]
[1429]
[1430]
[1431]
[1432]
[1433]
[1434]
[1435]
[1436]
[1437]
[1438]
[1439]
[1440]
[1441]
[1442]
[1443]
[1444]
[1445]
[1446]
[1447]
[1448]
[1449]
[1450]
[1451]
[1452]
[1453]
[1454]
[1455]
[1456]
[1457]
[1458]
[1459]
[1460]
[1461]
[1462]
[1463]
[1464]
[1465]
[1466]
[1467]
[1468]
[1469]
[1470]
[1471]
[1472]
[1473]
[1474]
[1475]
[1476]
[1477]
[1478]
[1479]
[1480]
[1481]
[1482]
[1483]
[1484]
[1485]
[1486]
[1487]
[1488]
[1489]
[1490]
[1491]
[1492]
[1493]
[1494]
[1495]
[1496]
[1497]
[1498]
[1499]
[1500]
[1501]
[1502]
[1503]
[1504]
[1505]
[1506]
[1507]
[1508]
[1509]
[1510]
[1511]
[1512]
[1513]
[1514]
[1515]
[1516]
[1517]
[1518]
[1519]
[1520]
[1521]
[1522]
[1523]
[1524]
[1525]
[1526]
[1527]
[1528]
[1529]
[1530]
[1531]
[1532]
[1533]
[1534]
[1535]
[1536]
[1537]
[1538]
[1539]
[1540]
[1541]
[1542]
[1543]
[1544]
[1545]
[1546]
[1547]
[1548]
[1549]
[1550]
[1551]
[1552]
[1553]
[1554]
[1555]
[1556]
[1557]
[1558]
[1559]
[1560]
[1561]
[1562]
[1563]
[1564]
[1565]
[1566]
[1567]
[1568]
[1569]
[1570]
[1571]
[1572]
[1573]
[1574]
[1575]
[1576]
[1577]
[1578]
[1579]
[1580]
[1581]
[1582]
[1583]
[1584]
[1585]
[1586]
[1587]
[1588]
[1589]
[1590]
[1591]
[1592]
[1593]
[1594]
[1595]
[1596]
[1597]
[1598]
[1599]
[1600]
[1601]
[1602]
[1603]
[1604]
[1605]
[1606]
[1607]
[1608]
[1609]
[1610]
[1611]
[1612]
[1613]
[1614]
[1615]
[1616]
[1617]
[1618]
[1619]
[1620]
[1621]
[1622]
[1623]
[1624]
[1625]
[1626]
[1627]
[1628]
[1629]
[1630]
[1631]
[1632]
[1633]
[1634]
[1635]
[1636]
[1637]
[1638]
[1639]
[1640]
[1641]
[1642]
[1643]
[1644]
[1645]
[1646]
[1647]
[1648]
[1649]
[1650]
[1651]
[1652]
[1653]
[1654]
[1655]
[1656]
[1657]
[1658]
[1659]
[1660]
[1661]
[1662]
[1663]
[1664]
[1665]
[1666]
[1667]
[1668]
[1669]
[1670]
[1671]
[1672]
[1673]
[1674]
[1675]
[1676]
[1677]
[1678]
[1679]
[1680]
[1681]
[1682]
[1683]
[1684]
[1685]
[1686]
[1687]
[1688]
[1689]
[1690]
[1691]
[1692]
[1693]
[1694]
[1695]
[1696]
[1697]
[1698]
[1699]
[1700]
[1701]
[1702]
[1703]
[1704]
[1705]
[1706]
[1707]
[1708]
[1709]
[1710]
[1711]
[1712]
[1713]
[1714]
[1715]
[1716]
[1717]
[1718]
[1719]
[1720]
[1721]
[1722]
[1723]
[1724]
[1725]
[1726]
[1727]
[1728]
[1729]
[1730]
[1731]
[1732]
[1733]
[1734]
[1735]
[1736]
[1737]
[1738]
[1739]
[1740]
[1741]
[1742]
[1743]
[1744]
[1745]
[1746]
[1747]
[1748]
[1749]
[1750]
[1751]
[1752]
[1753]
[1754]
[1755]
[1756]
[1757]
[1758]
[1759]
[1760]
[1761]
[1762]
[1763]
[1764]
[1765]
[1766]
[1767]
[1768]
[1769]
[1770]
[1771]
[1772]
[1773]
[1774]
[1775]
[1776]
[1777]
[1778]
[1779]
[1780]
[1781]
[1782]
[1783]
[1784]
[1785]
[1786]
[1787]
[1788]
[1789]
[1790]
[1791]
[1792]
[1793]
[1794]
[1795]
[1796]
[1797]
[1798]
[1799]
[1800]
[1801]
[1802]
[1803]
[1804]
[1805]
[1806]
[1807]
[1808]
[1809]
[1810]
[1811]
[1812]
[1813]
[1814]
[1815]
[1816]
[1817]
[1818]
[1819]
[1820]
[1821]
[1822]
[1823]
[1824]
[1825]
[1826]
[1827]
[1828]
[1829]
[1830]
[1831]
[1832]
[1833]
[1834]
[1835]
[1836]
[1837]
[1838]
[1839]
[1840]
[1841]
[1842]
[1843]
[1844]
[1845]
[1846]
[1847]
[1848]
[1849]
[1850]
[1851]
[1852]
[1853]
[1854]
[1855]
[1856]
[1857]
[1858]
[1859]
[1860]
[1861]
[1862]
[1863]
[1864]
[1865]
[1866]
[1867]
[1868]
[1869]
[1870]
[1871]
[1872]
[1873]
[1874]
[1875]
[1876]
[1877]
[1878]
[1879]
[1880]
[1881]
[1882]
[1883]
[1884]
[1885]
[1886]
[1887]
[1888]
[1889]
[1890]
[1891]
[1892]
[1893]
[1894]
[1895]
[1896]
[1897]
[1898]
[1899]
[1900]
[1901]
[1902]
[1903]
[1904]
[1905]
[1906]
[1907]
[1908]
[1909]
[1910]
[1911]
[1912]
[1913]
[1914]
[1915]
[1916]
[1917]
[1918]
[1919]
[1920]
[1921]
[1922]
[1923]
[1924]
[1925]
[1926]
[1927]
[1928]
[1929]
[1930]
[1931]
[1932]
[1933]
[1934]
[1935]
[1936]
[1937]
[1938]
[1939]
[1940]
[1941]
[1942]
[1943]
[1944]
[1945]
[1946]
[1947]
[1948]
[1949]
[1950]
[1951]
[1952]
[1953]
[1954]
[1955]
[1956]
[1957]
[1958]
[1959]
[1960]
[1961]
[1962]
[1963]
[1964]
[1965]
[1966]
[1967]
[1968]
[1969]
[1970]
[1971]
[1972]
[1973]
[1974]
[1975]
[1976]
[1977]
[1978]
[1979]
[1980]
[1981]
[1982]
[1983]
[1984]
[1985]
[1986]
[1987]
[1988]
[1989]
[1990]
[1991]
[1992]
[1993]
[1994]
[1995]
[1996]
[1997]
[1998]
[1999]
[2000]
[2001]
[2002]
[2003]
[2004]
[2005]
[2006]
[2007]
[2008]
[2009]
[2010]
[2011]
[2012]
[2013]
[2014]
[2015]
[2016]
[2017]
[2018]
[2019]
[2020]
[2021]
[2022]
[2023]
[2024]
[2025]
[2026]
[2027]
[2028]
[2029]
[2030]
[2031]
[2032]
[2033]
[2034]
[2035]
[2036]
[2037]
[2038]
[2039]
[2040]
[2041]
[2042]
[2043]
[2044]
[2045]
[2046]
[2047]
[2048]
[2049]
[2050]
[2051]
[2052]
[2053]
[2054]
[2055]
[2056]
[2057]
[2058]
[2059]
[2060]
[2061]
[2062]
[2063]
[2064]
[2065]
[2066]
[2067]
[2068]
[2069]
[2070]
[2071]
[2072]
[2073]
[2074]
[2075]
[2076]
[2077]
[2078]
[2079]
[2080]
[2081]
[2082]
[2083]
[2084]
[2085]
[2086]
[2087]
[2088]
[2089]
[2090]
[2091]
[2092]
[2093]
[2094]
[2095]
[2096]
[2097]
[2098]
[2099]
[2100]
[2101]
[2102]
[2103]
[2104]
[2105]
[2106]
[2107]
[2108]
[2109]
[2110]
[2111]
[2112]
[2113]
[2114]
[2115]
[2116]
[2117]
[2118]
[2119]
[2120]
[2121]
[2122]
[2123]
[2124]
[2125]
[2126]
[2127]
[2128]
[2129]
[2130]
[2131]
[2132]
[2133]
[2134]
[2135]
[2136]
[2137]
[2138]
[2139]
[2140]
[2141]
[2142]
[2143]
[2144]
[2145]
[2146]
[2147]
[2148]
[2149]
[2150]
[2151]
[2152]
[2153]
[2154]
[2155]
[2156]
[2157]
[2158]
[2159]
[2160]
[2161]
[2162]
[2163]
[2164]
[2165]
[2166]
[2167]
[2168]
[2169]
[2170]
[2171]
[2172]
[2173]
[2174]
[2175]
[2176]
[2177]
[2178]
[2179]
[2180]
[2181]
[2182]
[2183]
[2184]
[2185]
[2186]
[2187]
[2188]
[2189]
[2190]
[2191]
[2192]
[2193]
[2194]
[2195]
[2196]
[2197]
[2198]
[2199]
[2200]
[2201]
[2202]
[2203]
[2204]
[2205]
[2206]
[2207]
[2208]
[2209]
[2210]
[2211]
[2212]
[2213]
[2214]
[2215]
[2216]
[2217]
[2218]
[2219]
[2220]
[2221]
[2222]
[2223]
[2224]
[2225]
[2226]
[2227]
[2228]
[2229]
[2230]
[2231]
[2232]
[2233]
[2234]
[2235]
[2236]
[2237]
[2238]
[2239]
[2240]
[2241]
[2242]
[2243]
[2244]
[2245]
[2246]
[2247]
[2248]
[2249]
[2250]
[2251]
[2252]
[2253]
[2254]
[2255]
[2256]
[2257]
[2258]
[2259]
[2260]
[2261]
[2262]
[2263]
[2264]
[2265]
[2266]
[2267]
[2268]
[2269]
[2270]
[2271]
[2272]
[2273]
[2274]
[2275]
[2276]
[2277]
[2278]
[2279]
[2280]
[2281]
[2282]
[2283]
[2284]
[2285]
[2286]
[2287]
[2288]
[2289]
[2290]
[2291]
[2292]
[2293]
[2294]
[2295]
[2296]
[2297]
[2298]
[2299]
[2300]
[2301]
[2302]
[2303]
[2304]
[2305]
[2306]
[2307]
[2308]
[2309]
[2310]
[2311]
[2312]
[2313]
[2314]
[2315]
[2316]
[2317]
[2318]
[2319]
[2320]
[2321]
[2322]
[2323]
[2324]
[2325]
[2326]
[2327]
[2328]
[2329]
[2330]
[2331]
[2332]
[2333]
[2334]
[2335]
[2336]
[2337]
[2338]
[2339]
[2340]
[2341]
[2342]
[2343]
[2344]
[2345]
[2346]
[2347]
[2348]
[2349]
[2350]
[2351]
[2352]
[2353]
[2354]
[2355]
[2356]
[2357]
[2358]
[2359]
[2360]
[2361]
[2362]
[2363]
[2364]
[2365]
[2366]
[2367]
[2368]
[2369]
[2370]
[2371]
[2372]
[2373]
[2374]
[2375]
[2376]
[2377]
[2378]
[2379]
[2380]
[2381]
[2382]
[2383]
[2384]
[2385]
[2386]
[2387]
[2388]
[2389]
[2390]
[2391]
[2392]
[2393]
[2394]
[2395]
[2396]
[2397]
[2398]
[2399]
[2400]
[2401]
[2402]
[2403]
[2404]
[2405]
[2406]
[2407]
[2408]
[2409]
[2410]
[2411]
[2412]
[2413]
[2414]
[2415]
[2416]
[2417]
[2418]
[2419]
[2420]
[2421]
[2422]
[2423]
[2424]
[2425]
[2426]
[2427]
[2428]
[2429]
[2430]
[2431]
[2432]
[2433]
[2434]
[2435]
[2436]
[2437]
[2438]
[2439]
[2440]
[2441]
[2442]
[2443]
[2444]
[2445]
[2446]
[2447]
[2448]
[2449]
[2450]
[2451]
[2452]
[2453]
[2454]
[2455]
[2456]
[2457]
[2458]
[2459]
[2460]
[2461]
[2462]
[2463]
[2464]
[2465]
[2466]
[2467]
[2468]
[2469]
[2470]
[2471]
[2472]
[2473]
[2474]
[2475]
[2476]
[2477]
[2478]
[2479]
[2480]
[2481]
[2482]
[2483]
[2484]
[2485]
[2486]
[2487]
[2488]
[2489]
[2490]
[2491]
[2492]
[2493]
[2494]
[2495]
[2496]
[2497]
[2498]
[2499]
[2500]
[2501]
[2502]
[2503]
[2504]
[2505]
[2506]
[2507]
[2508]
[2509]
[2510]
[2511]
[2512]
[2513]
[2514]
[2515]
[2516]
[2517]
[2518]
[2519]
[2520]
[2521]
[2522]
[2523]
[2524]
[2525]
[2526]
[2527]
[2528]
[2529]
[2530]
[2531]
[2532]
[2533]
[2534]
[2535]
[2536]
[2537]
[2538]
[2539]
[2540]
[2541]
[2542]
[2543]
[2544]
[2545]
[2546]
[2547]
[2548]
[2549]
[2550]
[2551]
[2552]
[2553]
[2554]
[2555]
[2556]
[2557]
[2558]
[2559]
[2560]
[2561]
[2562]
[2563]
[2564]
[2565]
[2566]
[2567]
[2568]
[2569]
[2570]
[2571]
[2572]
[2573]
[2574]
[2575]
[2576]
[2577]
[2578]
[2579]
[2580]
[2581]
[2582]
[2583]
[2584]
[2585]
[2586]
[2587]
[2588]
[2589]
[2590]
[2591]
[2592]
[2593]
[2594]
[2595]
[2596]
[2597]
[2598]
[2599]
[2600]
[2601]
[2602]
[2603]
[2604]
[2605]
[2606]
[2607]
[2608]
[2609]
[2610]
[2611]
[2612]
[2613]
[2614]
[2615]
[2616]
[2617]
[2618]
[2619]
[2620]
[2621]
[2622]
[2623]
[2624]
[2625]
[2626]
[2627]
[2628]
[2629]
[2630]
[2631]
[2632]
[2633]
[2634]
[2635]
[2636]
[2637]
[2638]
[2639]
[2640]
[2641]
[2642]
[2643]
[2644]
[2645]
[2646]
[2647]
[2648]
[2649]
[2650]
[2651]
[2652]
[2653]
[2654]
[2655]
[2656]
[2657]
[2658]
[2659]
[2660]
[2661]
[2662]
[2663]
[2664]
[2665]
[2666]
[2667]
[2668]
[2669]
[2670]
[2671]
[2672]
[2673]
[2674]
[2675]
[2676]
[2677]
[2678]
[2679]
[2680]
[2681]
[2682]
[2683]
[2684]
[2685]
[2686]
[2687]
[2688]
[2689]
[2690]
[2691]
[2692]
[2693]
[2694]
[2695]
[2696]
[2697]
[2698]
[2699]
[2700]
[2701]
[2702]
[2703]
[2704]
[2705]
[2706]
[2707]
[2708]
[2709]
[2710]
[2711]
[2712]
[2713]
[2714]
[2715]
[2716]
[2717]
[2718]
[2719]
[2720]
[2721]
[2722]
[2723]
[2724]
[2725]
[2726]
[2727]
[2728]
[2729]
[2730]
[2731]
[2732]
[2733]
[2734]
[2735]
[2736]
[2737]
[2738]
[2739]
[2740]
[2741]
[2742]
[2743]
[2744]
[2745]
[2746]
[2747]
[2748]
[2749]
[2750]
[2751]
[2752]
[2753]
[2754]
[2755]
[2756]
[2757]
[2758]
[2759]
[2760]
[2761]
[2762]
[2763]
[2764]
[2765]
[2766]
[2767]
[2768]
[2769]
[2770]
[2771]
[2772]
[2773]
[2774]
[2775]
[2776]
[2777]
[2778]
[2779]
[2780]
[2781]
[2782]
[2783]
[2784]
[2785]
[2786]
[2787]
[2788]
[2789]
[2790]
[2791]
[2792]
[2793]
[2794]
[2795]
[2796]
[2797]
[2798]
[2799]
[2800]
[2801]
[2802]
[2803]
[2804]
[2805]
[2806]
[2807]
[2808]
[2809]
[2810]
[2811]
[2812]
[2813]
[2814]
[2815]
[2816]
[2817]
[2818]
[2819]
[2820]
[2821]
[2822]
[2823]
[2824]
[2825]
[2826]
[2827]
[2828]
[2829]
[2830]
[2831]
[2832]
[2833]
[2834]
[2835]
[2836]
[2837]
[2838]
[2839]
[2840]
[2841]
[2842]
[2843]
[2844]
[2845]
[2846]
[2847]
[2848]
[2849]
[2850]
[2851]
[2852]
[2853]
[2854]
[2855]
[2856]
[2857]
[2858]
[2859]
[2860]
[2861]
[2862]
[2863]
[2864]
[2865]
[2866]
[2867]
[2868]
[2869]
[2870]
[2871]
[2872]
[2873]
[2874]
[2875]
[2876]
[2877]
[2878]
[2879]
[2880]
[2881]
[2882]
[2883]
[2884]
[2885]
[2886]
[2887]
[2888]
[2889]
[2890]
[2891]
[2892]
[2893]
[2894]
[2895]
[2896]
[2897]
[2898]
[2899]
[2900]
[2901]
[2902]
[2903]
[2904]
[2905]
[2906]
[2907]
[2908]
[2909]
[2910]
[2911]
[2912]
[2913]
[2914]
[2915]
[2916]
[2917]
[2918]
[2919]
[2920]
[2921]
[2922]
[2923]
[2924]
[2925]
[2926]
[2927]
[2928]
[2929]
[2930]
[2931]
[2932]
[2933]
[2934]
[2935]
[2936]
[2937]
[2938]
[2939]
[2940]
[2941]
[2942]
[2943]
[2944]
[2945]
[2946]
[2947]
[2948]
[2949]
[2950]
[2951]
[2952]
[2953]
[2954]
[2955]
[2956]
[2957]
[2958]
[2959]
[2960]
[2961]
[2962]
[2963]
[2964]
[2965]
[2966]
[2967]
[2968]
[2969]
[2970]
[2971]
[2972]
[2973]
[2974]
[2975]
[2976]
[2977]
[2978]
[2979]
[2980]
[2981]
[2982]
[2983]
[2984]
[2985]
[2986]
[2987]
[2988]
[2989]
[2990]
[2991]
[2992]
[2993]
[2994]
[2995]
[2996]
[2997]
[2998]
[2999]
[3000]
[3001]
[3002]
[3003]
[3004]
[3005]
[3006]
[3007]
[3008]
[3009]
[3010]
[3011]
[3012]
[3013]
[3014]
[3015]
[3016]
[3017]
[3018]
[3019]
[3020]
[3021]
[3022]
[3023]
[3024]
[3025]
[3026]
[3027]
[3028]
[3029]
[3030]
[3031]
[3032]
[3033]
[3034]
[3035]
[3036]
[3037]
[3038]
[3039]
[3040]
[3041]
[3042]
[3043]
[3044]
[3045]
[3046]
[3047]
[3048]
[3049]
[3050]
[3051]
[3052]
[3053]
[3054]
[3055]
[3056]
[3057]
[3058]
[3059]
[3060]
[3061]
[3062]
[3063]
[3064]
[3065]
[3066]
[3067]
[3068]
[3069]
[3070]
[3071]
[3072]
[3073]
[3074]
[3075]
[3076]
[3077]
[3078]
[3079]
[3080]
[3081]
[3082]
[3083]
[3084]
[3085]
[3086]
[3087]
[3088]
[3089]
[3090]
[3091]
[3092]
[3093]
[3094]
[3095]
[3096]
[3097]
[3098]
[3099]
[3100]
[3101]
[3102]
[3103]
[3104]
[3105]
[3106]
[3107]
[3108]
[3109]
[3110]
[3111]
[3112]
[3113]
[3114]
[3115]
[3116]
[3117]
[3118]
[3119]
[3120]
[3121]
[3122]
[3123]
[3124]
[3125]
[3126]
[3127]
[3128]
[3129]
[3130]
[3131]
[3132]
[3133]
[3134]
[3135]
[3136]
[3137]
[3138]
[3139]
[3140]
[3141]
[3142]
[3143]
[3144]
[3145]
[3146]
[3147]
[3148]
[3149]
[3150]
[3151]
[3152]
[3153]
[3154]
[3155]
[3156]
[3157]
[3158]
[3159]
[3160]
[3161]
[3162]
[3163]
[3164]
[3165]
[3166]
[3167]
[3168]
[3169]
[3170]
[3171]
[3172]
[3173]
[3174]
[3175]
[3176]
[3177]
[3178]
[3179]
[3180]
[3181]
[3182]
[3183]
[3184]
[3185]
[3186]
[3187]
[3188]
[3189]
[3190]
[3191]
[3192]
[3193]
[3194]
[3195]
[3196]
[3197]
[3198]
[3199]
[3200]
[3201]
[3202]
[3203]
[3204]
[3205]
[3206]
[3207]
[3208]
[3209]
[3210]
[3211]
[3212]
[3213]
[3214]
[3215]
[3216]
[3217]
[3218]
[3219]
[3220]
[3221]
[3222]
[3223]
[3224]
[3225]
[3226]
[3227]
[3228]
[3229]
[3230]
[3231]
[3232]
[3233]
[3234]
[3235]
[3236]
[3237]
[3238]
[3239]
[3240]
[3241]
[3242]
[3243]
[3244]
[3245]
[3246]
[3247]
[3248]
[3249]
[3250]
[3251]
[3252]
[3253]
[3254]
[3255]
[3256]
[3257]
[3258]
[3259]
[3260]
[3261]
[3262]
[3263]
[3264]
[3265]
[3266]
[3267]
[3268]
[3269]
[3270]
[3271]
[3272]
[3273]
[3274]
[3275]
[3276]
[3277]
[3278]
[3279]
[3280]
[3281]
[3282]
[3283]
[3284]
[3285]
[3286]
[3287]
[3288]
[3289]
[3290]
[3291]
[3292]
[3293]
[3294]
[3295]
[3296]
[3297]
[3298]
[3299]
[3300]
[3301]
[3302]
[3303]
[3304]
[3305]
[3306]
[3307]
[3308]
[3309]
[3310]
[3311]
[3312]
[3313]
[3314]
[3315]
[3316]
[3317]
[3318]
[3319]
[3320]
[3321]
[3322]
[3323]
[3324]
[3325]
[3326]
[3327]
[3328]
[3329]
[3330]
[3331]
[3332]
[3333]
[3334]
[3335]
[3336]
[3337]
[3338]
[3339]
[3340]
[3341]
[3342]
[3343]
[3344]
[3345]
[3346]
[3347]
[3348]
[3349]
[3350]
[3351]
[3352]
[3353]
[3354]
[3355]
[3356]
[3357]
[3358]
[3359]
[3360]
[3361]
[3362]
[3363]
[3364]
[3365]
[3366]
[3367]
[3368]
[3369]
[3370]
[3371]
[3372]
[3373]
[3374]
[3375]
[3376]
[3377]
[3378]
[3379]
[3380]
[3381]
[3382]
[3383]
[3384]
[3385]
[3386]
[3387]
[3388]
[3389]
[3390]
[3391]
[3392]
[3393]
[3394]
[3395]
[3396]
[3397]
[3398]
[3399]
[3400]
[3401]
[3402]
[3403]
[3404]
[3405]
[3406]
[3407]
[3408]
[3409]
[3410]
[3411]
[3412]
[3413]
[3414]
[3415]
[3416]
[3417]
[3418]
[3419]
[3420]
[3421]
[3422]
[3423]
[3424]
[3425]
[3426]
[3427]
[3428]
[3429]
[3430]
[3431]
[3432]
[3433]
[3434]
[3435]
[3436]
[3437]
[3438]
[3439]
[3440]
[3441]
[3442]
[3443]
[3444]
[3445]
[3446]
[3447]
[3448]
[3449]
[3450]
[3451]
[3452]
[3453]
[3454]
[3455]
[3456]
[3457]
[3458]
[3459]
[3460]
[3461]
[3462]
[3463]
[3464]
[3465]
[3466]
[3467]
[3468]
[3469]
[3470]
[3471]
[3472]
[3473]
[3474]
[3475]
[3476]
[3477]
[3478]
[3479]
[3480]
[3481]
[3482]
[3483]
[3484]
[3485]
[3486]
[3487]
[3488]
[3489]
[3490]
[3491]
[3492]
[3493]
[3494]
[3495]
[3496]
[3497]
[3498]
[3499]
[3500]
[3501]
[3502]
[3503]
[3504]
[3505]
[3506]
[3507]
[3508]
[3509]
[3510]
[3511]
[3512]
[3513]
[3514]
[3515]
[3516]
[3517]
[3518]
[3519]
[3520]
[3521]
[3522]
[3523]
[3524]
[3525]
[3526]
[3527]
[3528]
[3529]
[3530]
[3531]
[3532]
[3533]
[3534]
[3535]
[3536]
[3537]
[3538]
[3539]
[3540]
[3541]
[3542]
[3543]
[3544]
[3545]
[3546]
[3547]
[3548]
[3549]
[3550]
[3551]
[3552]
[3553]
[3554]
[3555]
[3556]
[3557]
[3558]
[3559]
[3560]
[3561]
[3562]
[3563]
[3564]
[3565]
[3566]
[3567]
[3568]
[3569]
[3570]
[3571]
[3572]
[3573]
[3574]
[3575]
[3576]
[3577]
[3578]
[3579]
[3580]
[3581]
[3582]
[3583]
[3584]
[3585]
[3586]
[3587]
[3588]
[3589]
[3590]
[3591]
[3592]
[3593]
[3594]
[3595]
[3596]
[3597]
[3598]
[3599]
[3600]
[3601]
[3602]
[3603]
[3604]
[3605]
[3606]
[3607]
[3608]
[3609]
[3610]
[3611]
[3612]
[3613]
[3614]
[3615]
[3616]
[3617]
[3618]
[3619]
[3620]
[3621]
[3622]
[3623]
[3624]
[3625]
[3626]
[3627]
[3628]
[3629]
[3630]
[3631]
[3632]
[3633]
[3634]
[3635]
[3636]
[3637]
[3638]
[3639]
[3640]
[3641]
[3642]
[3643]
[3644]
[3645]
[3646]
[3647]
[3648]
[3649]
[3650]
[3651]
[3652]
[3653]
[3654]
[3655]
[3656]
[3657]
[3658]
[3659]
[3660]
[3661]
[3662]
[3663]
[3664]
[3665]
[3666]
[3667]
[3668]
[3669]
[3670]
[3671]
[3672]
[3673]
[3674]
[3675]
[3676]
[3677]
[3678]
[3679]
[3680]
[3681]
[3682]
[3683]
[3684]
[3685]
[3686]
[3687]
[3688]
[3689]
[3690]
[3691]
[3692]
[3693]
[3694]
[3695]
[3696]
[3697]
[3698]
[3699]
[3700]
[3701]
[3702]
[3703]
[3704]
[3705]
[3706]
[3707]
[3708]
[3709]
[3710]
[3711]
[3712]
[3713]
[3714]
[3715]
[3716]
[3717]
[3718]
[3719]
[3720]
[3721]
[3722]
[3723]
[3724]
[3725]
[3726]
[3727]
[3728]
[3729]
[3730]
[3731]
[3732]
[3733]
[3734]
[3735]
[3736]
[3737]
[3738]
[3739]
[3740]
[3741]
[3742]
[3743]
[3744]
[3745]
[3746]
[3747]
[3748]
[3749]
[3750]
[3751]
[3752]
[3753]
[3754]
[3755]
[3756]
[3757]
[3758]
[3759]
[3760]
[3761]
[3762]
[3763]
[3764]
[3765]
[3766]
[3767]
[3768]
[3769]
[3770]
[3771]
[3772]
[3773]
[3774]
[3775]
[3776]
[3777]
[3778]
[3779]
[3780]
[3781]
[3782]
[3783]
[3784]
[3785]
[3786]
[3787]
[3788]
[3789]
[3790]
[3791]
[3792]
[3793]
[3794]
[3795]
[3796]
[3797]
[3798]
[3799]
[3800]
[3801]
[3802]
[3803]
[3804]
[3805]
[3806]
[3807]
[3808]
[3809]
[3810]
[3811]
[3812]
[3813]
[3814]
[3815]
[3816]
[3817]
[3818]
[3819]
[3820]
[3821]
[3822]
[3823]
[3824]
[3825]
[3826]
[3827]
[3828]
[3829]
[3830]
[3831]
[3832]
[3833]
[3834]
[3835]
[3836]
[3837]
[3838]
[3839]
[3840]
[3841]
[3842]
[3843]
[3844]
[3845]
[3846]
[3847]
[3848]
[3849]
[3850]
[3851]
[3852]
[3853]
[3854]
[3855]
[3856]
[3857]
[3858]
[3859]
[3860]
[3861]
[3862]
[3863]
[3864]
[3865]
[3866]
[3867]
[3868]
[3869]
[3870]
[3871]
[3872]
[3873]
[3874]
[3875]
[3876]
[3877]
[3878]
[3879]
[3880]
[3881]
[3882]
[3883]
[3884]
[3885]
[3886]
[3887]
[3888]
[3889]
[3890]
[3891]
[3892]
[3893]
[3894]
[3895]
[3896]
[3897]
[3898]
[3899]
[3900]
[3901]
[3902]
[3903]
[3904]
[3905]
[3906]
[3907]
[3908]
[3909]
[3910]
[3911]
[3912]
[3913]
[3914]
[3915]
[3916]
[3917]
[3918]
[3919]
[3920]
[3921]
[3922]
[3923]
[3924]
[3925]
[3926]
[3927]
[3928]
[3929]
[3930]
[3931]
[3932]
[3933]
[3934]
[3935]
[3936]
[3937]
[3938]
[3939]
[3940]
[3941]
[3942]
[3943]
[3944]
[3945]
[3946]
[3947]
[3948]
[3949]
[3950]
[3951]
[3952]
[3953]
[3954]
[3955]
[3956]
[3957]
[3958]
[3959]
[3960]
[3961]
[3962]
[3963]
[3964]
[3965]
[3966]
[3967]
[3968]
[3969]
[3970]
[3971]
[3972]
[3973]
[3974]
[3975]
[3976]
[3977]
[3978]
[3979]
[3980]
[3981]
[3982]
[3983]
[3984]
[3985]
[3986]
[3987]
[3988]
[3989]
[3990]
[3991]
[3992]
[3993]
[3994]
[3995]
[3996]
[3997]
[3998]
[3999]
[4000]
[4001]
[4002]
[4003]
[4004]
[4005]
[4006]
[4007]
[4008]
[4009]
[4010]
[4011]
[4012]
[4013]
[4014]
[4015]
[4016]
[4017]
[4018]
[4019]
[4020]
[4021]
[4022]
[4023]
[4024]
[4025]
[4026]
[4027]
[4028]
[4029]
[4030]
[4031]
[4032]
[4033]
[4034]
[4035]
[4036]
[4037]
[4038]
[4039]
[4040]
[4041]
[4042]
[4043]
[4044]
[4045]
[4046]
[4047]
[4048]
[4049]
[4050]
[4051]
[4052]
[4053]
[4054]
[4055]
[4056]
[4057]
[4058]
[4059]
[4060]
[4061]
[4062]
[4063]
[4064]
[4065]
[4066]
[4067]
[4068]
[4069]
[4070]
[4071]
[4072]
[4073]
[4074]
[4075]
[4076]
[4077]
[4078]
[4079]
[4080]
[4081]
[4082]
[4083]
[4084]
[4085]
[4086]
[4087]
[4088]
[4089]
[4090]
[4091]
[4092]
[4093]
[4094]
[4095]
[4096]
[4097]
[4098]
[4099]
[4100]
[4101]
[4102]
[4103]
[4104]
[4105]
[4106]
[4107]
[4108]
[4109]
[4110]
[4111]
[4112]
[4113]
[4114]
[4115]
[4116]
[4117]
[4118]
[4119]
[4120]
[4121]
[4122]
[4123]
[4124]
[4125]
[4126]
[4127]
[4128]
[4129]
[4130]
[4131]
[4132]
[4133]
[4134]
[4135]
[4136]
[4137]
[4138]
[4139]
[4140]
[4141]
[4142]
[4143]
[4144]
[4145]
[4146]
[4147]
[4148]
[4149]
[4150]
[4151]
[4152]
[4153]
[4154]
[4155]
[4156]
[4157]
[4158]
[4159]
[4160]
[4161]
[4162]
[4163]
[4164]
[4165]
[4166]
[4167]
[4168]
[4169]
[4170]
[4171]
[4172]
[4173]
[4174]
[4175]
[4176]
[4177]
[4178]
[4179]
[4180]
[4181]
[4182]
[4183]
[4184]
[4185]
[4186]
[4187]
[4188]
[4189]
[4190]
[4191]
[4192]
[4193]
[4194]
[4195]
[4196]
[4197]
[4198]
[4199]
[4200]
[4201]
[4202]
[4203]
[4204]
[4205]
[4206]
[4207]
[4208]
[4209]
[4210]
[4211]
[4212]
[4213]
[4214]
[4215]
[4216]
[4217]
[4218]
[4219]
[4220]
[4221]
[4222]
[4223]
[4224]
[4225]
[4226]
[4227]
[4228]
[4229]
[4230]
[4231]
[4232]
[4233]
[4234]
[4235]
[4236]
[4237]
[4238]
[4239]
[4240]
[4241]
[4242]
[4243]
[4244]
[4245]
[4246]
[4247]
[4248]
[4249]
[4250]
[4251]
[4252]
[4253]
[4254]
[4255]
[4256]
[4257]
[4258]
[4259]
[4260]
[4261]
[4262]
[4263]
[4264]
[4265]
[4266]
[4267]
[4268]
[4269]
[4270]
/*****************************************************************************/
#ifdef COMMENTS_WITH_COMMENTS
/*
                                MapUrl.c

Functions supporting mapping of URLs to VMS file specifications and VMS 
specifications to URLs, uses the HTTPd rule mapping file.  The number of rules 
it can store is not fixed, but is limited by available memory and the 
practical considerations of processing large, linear rule databases. 

Comment lines may be provided by beginning a line with a '#' character.

Lines may be continued by ensuring the last character on the line is a '\'.

Virtual server syntax is the same as for authentication/authorization rules,
[[virtual-host]] (all ports of host) or [[virtual-host:virtual-port]] (
matching specified port of host) for a specific host and [[*]] to resume rules
for all virtual hosts.


Wildcards
---------
A single '*' wildcard matches intervening text up until the first character
encountered that matches the character immediately following the wildcard.

The rule

  map /one/*/three/* /first/*/third/*

would map the following request path

  /one/two/three/four

into

  /first/two/third/four

but would not match the request path

  /one/two/and-a-half/three/four

Two consecutive ('**') wildcards match intervening text up until the next
string that matches the string following the wildcard.

The rule

  map /one/**/three/* /first/*/third/*

would map the following request paths

  /one/two/three/four
  /one/two/and-a-half/three/four

respectively into

  /first/two/third/four
  /first/two/and-a-half/third/four

Historically (pre v8.1) the template wildcard-matched portions of path strings
could only be substituted in the positions of corresponding wildcards in the
result string.  There can be ocassions where there is not a one-to-one
relationship between these wildcard sections in the source (template) and
target (result) strings.  It is sometimes useful to be able to drop one or more
strings from the template and/or change the order of substitution.

The use of 'positional wildcards' (for want of an even marginally better term)
will allow this.  When a wildcard is used in the result string it may
optionally be followed by a single apostrophe character (') and a single digit
character '1'..'9'.  The digit is used to indicate which of the template
wildcards is intended (first to last).

The following request path

  /one/two/three/four/five.six

would be processed by the rule

  pass /one/*/three/*/* /*'2/one/*'1/*'3

into the mapped path

  /four/one/two/five.six

Using this notation all template wildcards must be specified 'positionally' :^)
This rule is not legal.

  pass /one/*/three/* /two/*'2/four/*

Positional wildcards ONLY APPLY to PASS, MAP, REDIRECT and USER rules.
They cannot be used with EXEC, SCRIPT and UXEC rules.


Extended File Specification
---------------------------
Extended file specifications (required for ODS-5) are supported.  A rule is
used to flag such paths for ODS-5 tailored processing.  Things that are not
done to ODS-5 paths; case-changes and character substitution.  Things that are
done to ODS-5 paths; escaping to and from the extended file specification
canonical escape syntax (i.e. '^').

Paths located on ODS-5 volumes need to have the ODS-5 rule SET against them.

  set /extended/* ODS-5

It is possible to explicitly mark a path as ODS-2 also, although as this is the
default it is usually unnecessary.  One situation where this might be useful is
where all paths are ODS-5 except a small minority, in which case a rule such as
the following might be used.

  set /* ODS-5
  set /old-path/* ODS-2

Paths derived using the USER rule are specially processed.  The SYSUAF user
home directory's structure is determined using a sys$getdvi() to determined
it's ACPTYPE.  Hence no explicit rule is required for these.


Mapping Rules
-------------
[[virtual-host:optional-virtual-port]]
EXEC       template  result           [setting(s)] [conditional(s)]
EXEC       (runtime)template  result  [setting(s)] [conditional(s)]
EXEC+      template  result           [setting(s)] [conditional(s)]
FAIL       template                                [conditional(s)]
MAP        template  result           [setting(s)] [conditional(s)]
PASS       template                                [conditional(s)]
PASS       template  result           [setting(s)] [conditional(s)]
PROTECT    template  access-control   [setting(s)] [conditional(s)]
REDIRECT   template  result           [setting(s)] [conditional(s)]
SCRIPT     template  result           [setting(s)] [conditional(s)]
SCRIPT     (runtime)template  result  [setting(s)] [conditional(s)]
SCRIPT+    template  result           [setting(s)] [conditional(s)]
SET        template  setting(s)                    [conditional(s)]
USER       template  result           [setting(s)] [conditional(s)]
UXEC       template  result           [setting(s)] [conditional(s)]
UXEC       (runtime)template  result  [setting(s)] [conditional(s)]
UXEC+      template  result           [setting(s)] [conditional(s)]

(Somewhat awkwardly the square brackets both denote optional fields and to
literally delimit a conditional.  Please do not confuse the two!)

Note that as of V8.0 path settings (anything that can be set with a SET rule)
can also follow the result string.  If the rule applies and any conditional is
matched then the settings are applied to the path BEFORE the mapping is done.

PASS rules can map to a result comprising an HTTP status code (e.g. 403) with a
following textual message (including white-space).  Just delimit the result
string with double or single quotes, or within curly braces.  For example:

Similarly, PASS rules can map to a result comprising an 200 HTTP status code
with a following dollar symbol and CLI command string which is passed to the
script processor.

PASS /private/stuff/* "403 Can't go in there!" [!ho:my.host.name]
PASS /private/stuff/* '403 "/private/stuff/" is off-limits!' [!ho:my.host.name]

EXEC rules can be used to map both directories and file types.  The former only
requires a single, trailing wildcard (example 1).  The latter requires two
wildcards (examples 2 and 3).  The  irst to locate the script, the second to
map any path.  This format can be used to globally map a file type, or confine
that mapping to specified part of a tree.

EXEC /cgi-bin/*
EXEC *.cgi* *.cgi*
EXEC /specified/path/*.cgi* /specified/path/*.cgi*

PROTECT rules can be used require authorization for for the matching path.  It
complements the facility available via the WASD_CONFIG_AUTH configuration file,
providing a simpler (and to certain extent less capble) authorization schema. 
See the relevant section in the description to AUTH.C module.


General Run-Time Mapping
------------------------
This is distinct from "Run-Time (RTE) Environment" scripting discussed below. 
It also uses a similar rule construct and historically came much after RTE
mappings.  Hence the '!' kludge mentioned shortly.  The historical way to map
script file types (other than .EXE and .COM which are handled implicitly) has
been to add [DclScriptRunTime] entries to WASD_CONFIG_GLOBAL.  The (very small)
disadvantage to using this is the need to completely restart the server to
apply changes.  Design-wise the better place for these sorts of mappings (file
types to run-time engine) is here in WASD_CONFIG_MAP (it also allows /DO=MAP to
change these).  From v8.2 we can use an RTE-like construct to specify what
non-RTE engine should be activated to process the specified script.  It can be
an executable, a DCL procedure or even verb.  Here's how we might activate Perl
using these rules:

  exec /cgi-bin/*.pl* (!perl)/cgi-bin/*.pl*
  exec /cgi-bin/*.pl* (!$perl_root:[000000]perl.exe)/cgi-bin/*.pl*
  exec /cgi-bin/*.pl* (!@cgi-bin:[000000]perl.com)/cgi-bin/*.pl*
  script /this_one* (!$perl_root:[000000]perl.exe)/cgi-bin/this_one.pl*

The first uses a CLI verb, the second activates a specified executable and the
last executes a DCL procedure (which in this presumably sets up some
environment before activating Perl).

Note the leading '!'.  This is a bit of a kludge but not too onerous.


Mapping Logical-Name Content
----------------------------
Generally logical names only provide concealed devices into the file-system
for "root"ing some part of the web-space.  That is the value of the logical
name is only used in RMS (file-system) parsing, etc.

There is a single exception.  When template and result patterns contain no
wildcard(s) a one-to-one mapping if performed.  For example

  pass /this_is_an_example /dka0/example/this.txt

and the file content at

  DKA0:[EXAMPLE]THIS.TXT

is returned.

With a one-to-one mapping the result string can represent a logical name and
the translation of that name used as the mapping element.  For a PASS rule the
logical name value is used as the VMS result of the mapping (and therefore a
VMS file specification).  For a REDIRECT rule it should be a URL undertood by
redirection.  Here are examples:

  $ DEFINE /SYSTEM /EXEC EXAMPLE_OF DKA0:[EXAMPLE]ONE.TXT
  $ DEFINE /SYSTEM /EXEC EXAMPLE_GO "/wasd_root/runtime/httpd/"

  pass /of EXAMPLE_OF
  redirect /go EXAMPLE_GO

Using this capability, the target of a rule may be changed simply by modifying
the translated value of a logical name.

Note that the mapping rule logical name translation is case-sensitive, and so
common use of logical names (all upper-case) means the rule must be all upper
case.  With all lower or mixed case the rule must specify exact case, as in
this example:

  $ DEFINE /SYSTEM /EXEC "EXAMPLE_go_two" "/wasd_root/src/httpd/"

  redirect /go_2 EXAMPLE_go_two


Run-Time Environment (RTE) Mapping
----------------------------------
Each persistent run-time environment must have it's own mapping environment. 
This may, or may not, correspond to physically distinct directory areas.  It is
the mapping rules that identify run-time environments.  A parenthesized
interprester specification leads the result component of the rule.  This is
first extracted and then the EXEC rule behaves as normal.  Hence the following 
example shows two such environments each with it's own interpreter.

  exec /plbin/* (cgi-bin:[000000]perlrte.exe)/ht_root/perl_local/*
  exec /pybin/* (cgi-bin:[000000]pyrte.exe)/ht_root/python_local/*
  script /this_one* (cgi-bin:[000000]oneeng.exe)/cgi-bin/this.one*

The "/plbin/*" identifies request paths beginning with this string as a
hypothetical, persistent Perl run-time interpreter, with the Perl source
scripts available to it from HT_ROOT:[PERL_LOCAL].  Similarly with a
hypothetical Java Environment.

If a request with the following URI is given to the server

  http://the.host.name/plbin/plsearch/web/doc/

the following components will be derived

  run-time interpreter ... CGI-BIN:[000000]PERLRT.EXE
  Perl source script ..... HT_ROOT:[PERL_LOCAL]PLSEARCH.PL
  request path-info ...... WEB:[DOC]


Mapping User Directories
------------------------
The USER rule effectively PASSes the user's SYSUAF default device and directory
as the first wildcard substitution in the rule.  Accounts that are disusered,
captive or have expired passwords are never mapped, they are always "denied
access by default".  In the same way privileged accounts (those possessing
SYSPRV) cannot be mapped this way (see below for a workaround).

An example; if the user name DANIEL has the default device USER$DISK: and
default directory [DANIEL] the following request path

  /~daniel/

would be mapped to the result and VMS file specification

  /user$disk/daniel/www/
  USER$DISK:[DANIEL.WWW]

using the following rule.

  USER  /~*/*  /*/www/

Note the "/www" subdirectory component.  It is recommended that user
directories always be mapped to a subdirectory of the physcial area.  This
effectively "sandboxes" Web access to that subdirectory hierarchy, allowing the
user privacy elsewhere in the home area.

To accomodate request user paths that do not incorporate a trailing delimiter
after the username the following redirect may be used to cause the browser to
re-request with a more appropriate path.

  REDIRECT  /~*  ///*/www/

WASD also "reverse maps" VMS specifications into paths and so requires
additional rules to provides these mappings.  (Reverse mapping is required
during directory listings and error reporting.)  In the above case the
following rules would actually be required (and in the stated order).

  USER  /~*/*  /*/www/
  PASS  /~*/*  /user$disk/*/www/*

Where user home directories are spread over multiple devices (physical or
concealed logical) a reverse-mapping rule would be required for each. Consider
the following situation, where user directories are distributed across these
devices (concealed logicals)

  USER$GROUP1:
  USER$GROUP2:
  USER$GROUP2:
  USER$OTHER:

This would require the following mapping rules (in the stated order).

  USER  /~*/*  /*/www/
  PASS  /~*/*  /user$group1/*/www/*
  PASS  /~*/*  /user$group2/*/www/*
  PASS  /~*/*  /user$group3/*/www/*
  PASS  /~*/*  /user$other/*/www/*

Of course vanilla mapping rules may be used to provide for special cases.  For
instance, if there is requirement for a particular, privileged account to have
a user mapping that could be provided as in the following (rather exagerated)
example.

  PASS  /~system/*  /sys$common/sysmgr/www/*
  USER  /~*/*  /*/www/
  PASS  /~*/*  /user$disk/*/www/*


Path SETings
------------
As of v12... see MAPSET.C


[CONFIGFILE]
------------
The non-global [IncludeFile] equivalent [ConfigFile] designed for local,
per-service configuration management can include a subset of the full set of
mapping rules and settings.  The following are ALLOWED:

  FAIL
  MAP
  PASS
  PROTECT
  REDIRECT

  SET [NO]ACCEPT= 
  SET CHARSET= 
  SET [NO]EXPIRED
  SET [NO]HTML=
  SET INDEX=
  SET [NO]MAP=ONCE
  SET QUERY-STRING=
  SET RESPONSE=HEADER=

Those that cannot be used in [ConfigFile] are reported as errors during
configuration load.


MAP=ROOT Mapping
----------------
This path SETing allows for the more straight-forward mapping of virtual
service paths into a virtual-service-specific directory structure.  It ensures
that for all applicable rules the specified string is prepended to the mapped
path before it is converted into a file-system specification.  This remove the
need to do it with each virtual-service-specific rule.  It needs to be redone
or undone (e.g. set to empty) for each virtual service or when reverting to
general rules.  For example

  [[a.virtual.host]]
  set * map=root=/dka0/a/
  # 'a' has no access to any scripts at all
  pass /* /*
  fail *
  [[b.virtual.host]]
  set * map=root=/dka0/b/
  # 'b' are allowed to execute their own scripts
  exec /cgi-bin/* /cgi-bin/*
  pass /* /*
  fail *
  [[c.virtual.host]]
  # 'c' is allowed to execute the general server scripts
  exec /cgi-bin/* /cgi-bin/*
  set * map=root=/dka0/c/
  pass /* /*
  fail *
  [[*]]
  set * map=root=
  exec /cgi-bin/* /cgi-bin/*
  pass /* /web/*
  fail *


PERSONA-based User Scripting
----------------------------
For use with VMS V6.2 and greater (or 6.0 and 6.1 if compiled with the
PERSONA_MACRO build option), with the /PERSONA qualifier active.
The following rule set will allow user account based scripting.

  SET   /~*/www/cgi-bin/*  script=as=~
  UXEC  /~*/cgi-bin/*  /*/www/cgi-bin/*
  USER  /~*/*  /*/www/*
  REDIRECT  /~*  /~*/
  PASS  /~*/*  /dka0/users/*/*


DECnet-based User Scripting
---------------------------
If DECnet/OSU scripting is enabled then the following rule will activate a
script in the specified user's directory (all other things being equal).
Always map to some unique and specific subdirectory of the home directory.

exec /~*/cgi-bin/* /0""::/where/ever/*/cgi-bin/*

It's a little like the user-mapping rules:

pass /~* /where/ever/*


Mapping Conditionals
--------------------

 ***************
 * OBSOLESCENT *
 ***************

 ALTHOUGH MAPPING RULE CONDITIONALS DESCRIBED BELOW WILL CONTINUE
 TO BE SUPPORTED IN THE FORESEEABLE FUTURE THE PREFERED POST-7.2
 MECHANISM FOR CONDITIONAL PROCESSING OF RULES IS PROVIDED BY THE
 META-CONFIG CONDITIONAL STRUCTURES AND DIRECTIVES.

Conditionals are new to v4.4 and allow mapping rules to be applied
conditionally! That is, the conditionals contain strings that are matched to
specific elements of the request and only if matched are the corresponding
rules applied. The conditionals may contain the '*' and '%' wildcards, and
optionally be negated by an '!' at the start of the conditional string.

Conditionals must follow the rule and are delimited by '[' and ']'. Multiple,
space-separated conditions may be included within one '[...]'. This behaves as
a logical OR (i.e. the condition is true if only one is matched). Multiple
'[...]' conditionals may be included against a rule. These act as a logical
AND (i.e. all must have at least one condition matched). The result of an
entire conditional may be optionally negated by prefixing the '[' with a '!'.

If a conditional is not met the line is completely ignored.  Conditional rules
are not used for 'backward' translation (i.e. from VMS to URL path) so another
rule must exist somewhere to do these mappings.  Conditional rules are only
used by the HTTPd server, they are completely ignored by any scripts using the
MapUrl.c module.

[!]ac:accept               'Accept:'
[!]al:accept-language      'Accept-Language:'
[!]as:accept-charset       'Accept-Charset:'
[!]ca:                     boolean, callout in progress?
[!]ck:cookie               'Cookie:'
[!]dr:string               document root (set map=root=)
[!]ex:                     boolean, extended file specification path
[!]fo:host-name/address    'Forwarded:', proxies/gateways
[!]ho:host-name/address    client's of course!
[!]hm:host network mask    client mask, see immediately below
[!]me:http-method          GET, POST, ?, etc.
[!]mp:string               derived mapped path (after script or map rule)
[!]no:string               notepad keywords/tokens
[!]pa:digit                1 if first pass, 2 if second pass through rules
[!]pi:path-info            request path information
[!]qs:query-string         request query string
[!]rc:[digit]              internally redirected count, 0..4, or boolean
[!]rf:refering-URL         'Referer:'
[!]rq:string               request field (e.g. "Keep-Alive: 300")
[!]ru:string               request URI - non-decoded path string
[!]sc:scheme               request scheme 'http:', 'http', 'https:' or 'https'
[!]sn:server-name          server host name
[!]sp:server-port          server port
[!]st:script-name          if during second pass compare to script name
[!]ua:user-agent           'User-Agent:'
[!]vs:host-name/address    virtual server, "Host:", destination
[!]xf:client               "X-Forwarded-For:" proxied cleint details

The host-mask ('HM') directive is a dotted-decimal network address, a slash,
then a dotted-decimal mask.  For example "[HM:131.185.250.0/255.255.255.192]". 
This has a 6 bit subnet.  It operates by bitwise-ANDing the client host address
with the mask, bitwise-ANDing the network address supplied with the mask, then
comparing the two results for equality.  Using the above example the host
131.185.250.250 would be accepted, but 131.185.250.50 would be rejected.


VERSION HISTORY
---------------
27-MAY-2021  MGD  carve out path SETing functions to MAPSET.C module
14-APR-2021  MGD  pass /whatever "200 $ CLI command" to RequestMappedToStatus()
20-MAR-2021  MGD  SET response=var=asis
28-FEB-2021  MGD  SET proxy=rework=<string>
16-OCT-2020  MGD  SET webdav=all and webdav=auth
26-SEP-2020  MGD  bugfix; ODS=ADS missing from reporting
12-FEB-2020  MGD  SET response=[no]csp=<string> ("content-security-policy:")
                  SET response=[no]cspro=<string> ("..policy-report-only:")
                  refactor MapUrl_ExplainPathSet()
20-JAN-2020  MGD  quieten string overflow reports
30-JAN-2019  MGD  SET response=200=203 for request tracking and log analysis
15-AUG-2018  MGD  bugfix; for DECnet tasks when StringSliceValue() modified
                    (25-MAY-2017 allow quote-delim inside space-delimited)
13-AUG-2018  MGD  SET response=var=crlf
                  SET response=var=lf
                  SET response=var=none
06-APR-2018  MGD  MapUrl__Map() allow one-to-one logical name content
05-APR-2018  MGD  bugfix; longstanding MapUrl__Map() mutiple template wildcards
                    when reverse mapping (search for the version log date)
25-JAN-2018  MGD  SET dir=title=default
                  SET dir=title=owner
                  SET dir=title=remote
                  SET dir=title=<integer>
                  SET dir=title=this=<string>
15-JUN-2017  MGD  MapUrl_GuaranteeAccess() mapping as well as authorisation
25-MAY-2017  MGD  bugfix; MapUrl_ExplainPathSet() response=header=add=..
07-MAR-2017  MGD  SET proxy=header=<name>[=<string>]
26-OCT-2015  MGD  SET dict=<key>[=<value>]
                  SET http2=streams=max=<integer>
                  SET http2=protocol=1.1
                  SET http2=write=[low|normal|high]
                  SET http2=send=goaway[=<integer>]
                  SET http2=send=ping
                  SET http2=send=reset[=<integer>]
                  SET sslcgi=apache_mod_ssl_client
                  SET sslcgi=apache_mod_ssl_extens
17-APR-2015  MGD  #define MAP_BUFFER_SIZE for fundamental mapping buffers
04-APR-2015  MGD  bugfix; MapUrl_ExplainPathSet() ->ResponseChunked
24-MAR-2015  MGD  SET response=sts=<value> (Strict-Transport-Security: header)
21-NOV-2014  MGD  MapUrl_SetClientAddress() and MapUrl_ResetClientAddress()
                    call WatchFilterClientService() if client address changed
06-NOV-2014  MGD  SET client=[forwarded|if=forwarded|literal=|reset|
                              if=xforwardedfor|xforwardedfor]
06-SEP-2014  MGD  SET dir=font=[inherit|monospace(D)]
                  SET dir=style=TABLE (new default)
                  SET ods=name=8bit, ods=name=utf8, ods=name=default
                  SET webdav=[no]hidden
                  SET webdav=meta=dir=<string>
28-SEP-2013  MGD  SET cors=<detail>
27-SEP-2013  MGD  SET dir=versions=<integer>|*
17-AUG-2013  MGD  put=rfm=[STM|STMCD|UDF] added to FIX512,STMLF
                  bugfix; MapUrl__Map() MAPURL_REPORT_MATCH_RULENOCOND
25-JUN-2013  MGD  SET dir=delimit=<which>
                  SET dir=[no]ilink
                  SET dir=style=sort (plus the dir=style=<which>2)
                  SET dir=sort=<char>[+|-]
                  SET dir=target=<string>
                  SET dir=these=<wildcard1>[,<wildcard2>]
30-MAY-2013  MGD  bugfix; MapUrl__Map() reverse mapping wildcard copy
15-SEP-2011  MGD  SET map=uri
                  bugfix; map=noonce
06-MAR-2011  MGD  SET cache=[no]cookie
26-FEB-2011  MGD  bugfix; set rule 'CacheSetting' boolean with any CACHE=..
02-JAN-2011  MGD  SET regex=<keyword>
07-SEP-2010  MGD  SET proxy=tunnel=request=<string>
18-JUL-2010  MGD  Uni Malaga pushes report items from !3ZL to !4ZL :-)
01-JUL-2010  MGD  bugfix; MapUrl_ControlReload()
19-JUN-2010  MGD  put=max=* represents no (effective) limit
27-FEB-2010  MGD  SET proxy=chain=cred=<string>
09-FEB-2010  MGD  SET script=lifetime=<hh:mm:ss>
                  SET response=HTTP=original
23-JAN-2010  MGD  SET service=<string>
                  SET websocket=<keyword>
                  SET notimeout (short-hand for timeout=none,none,none)
11-JAN-2010  JPP  MapUrl__Map() increase some buffer sizes
05-SEP-2009  MGD  allow "pass:-1" to indicate reverse-mapping
23-AUG-2009  MGD  SET css=<style-sheet-URL>
                  bugfix; MapUrl__Map() to URL use request ODS not path ODS
21-JUN-2009  MGD  SET put=max=<kbytes>, put=rfm=[FIX512|STMLF]
08-OCT-2008  MGD  bugfix; MapUrl__Map() proxy 'fall-thru'
19-APR-2008  MGD  SET script=agent=as=<account>
23-MAY-2007  MGD  refine loading and mapping of path SETings,
                  MapUrl_Map()/__Map() now have a REQUEST_PATHSET parameter
                  (to better decouple file-system mapping and path SETing)
11-MAY-2007  MGD  bugfix; MapUrl_Map() auth agent modifying path SETings
01-MAY-2007  MGD  SET access=[no]access, access=[no]profile,
                      access=[no]read, access=[no]write,
                      webdav=[no]access, webdav=[no]profile,
                      webdav=[no]read, webdav=[no]write,
                      webdav=[no]lock, webdav=[no]prop,
                      webdav=lock=timeout=
22-APR-2006  MGD  SET proxy=[no]affinity
26-JAN-2006  MGD  increase MapUrl__Map() WildBuffer[] storage to 4096
26-OCT-2005  MGD  bugfix; MapUrl__Map() SCRIPT result copy not checking
                  for null resulting in occasional overflow error status
10-SEP-2005  JPP  SET proxy=reverse=[no]auth
01-JUN-2005  MGD  SET script=symbol=[no]truncate
21-MAY-2005  MGD  SET throttle=<integer>/<integer> per-user throttle
08-JAN-2005  MGD  SET script=control=<...>
16-DEC-2004  MGD  SET response=[no]chunked
04-NOV-2004  MGD  SET script=syntax=[no]unix
16-OCT-2004  MGD  SET response=gzip=<...>,
                  SET script=body=[no]decode,
                  allow a throttle of zero to be set,
                  throttle=none to reset previously mapped throttle,
                  unbundle some functionality into MAPCON.C, MAPODS.C and
                  MAPUSER.C modules (been wanting to do this for ages)
24-SEP-2004  MGD  bugfix; auth=revalidate= is minutes not seconds
31-AUG-2004  MGD  SET report=tunnel
12-AUG-2004  MGD  bugfix; parse timeout=n,n,n allowing to specify "none"
20-JUL-2004  MGD  SET timeout=keepalive= superceded by timeout=persistent=
20-APR-2004  MGD  actual on-disk structure for each PASS result (ODS-2 or
                  ODS-5) is applied to a path unless otherwise SET with ODS=,
                  don't bother translating a PASS unless it looks file-system
                  (consumes a few less cycles for things like proxy)
08-MAR-2004  MGD  MapUrl_Map() increase wildcard buffer space
26-FEB-2004  MGD  SET script=default=<directory>
13-JAN-2004  MGD  review string SETings for empty string behaviour
10-JAN-2004  MGD  SET ssi=exec=<string>
08-JAN-2004  MGD  SET response=header=[no]add[="<string>"]
16-DEC-2003  MGD  mapping now URL-encodes a redirect wildcard path portions
20-NOV-2003  MGD  SET proxy=reverse=location, proxy=reverse=verify
28-SEP-2003  MGD  when do a callout path mapping use a 'throw-away' path
                  SETing structure to prevent modification of request itself,
                  SET path=set=[no]ignore, 
                      path=set=[no]request 
                  prevent ODS-2 directory paths from containing single periods
01-SEP-2003  MGD  SET map=root=<string> (groan %^p)
                  'DR' conditional (parallels metacon "document-root:")
07-JUL-2003  MGD  SET script=command=<string>,
                  SET cache=[no]cgi, cache=expires=.., cache=[no]file,
                      cache=[no]net, cache=maxkbytes=.., cache=[no]nph,
                      cache=[no]script, cache=[no]ssi,
                      response=header=[append|full|none]
                  bugfix; do not allow SET mapping during a callout
27-JUN-2003  MGD  bugfix; request Html.. memory allocation (jpp@esme.fr)
24-MAY-2003  MGD  SET cache=[no]permanent, cache=max=<integer>
09-MAY-2003  MGD  regular expression support,
                  SET notepad=[+]<string> (associated 'NO' conditional),
                  SET map=restart,
                  SET proxy=unknown
                  'RQ' conditional (parallels metacon "request:")
22-APR-2003  MGD  improve SET rule error reporting (if no rule or no template)
02-APR-2003  MGD  SET proxy=xforwardedfor=[disabled|enabled|address|unknown]
                  SET proxy=forwarded=[disabled|by|for|address]
                  added 'XF' conditional, removed 'UD' (meaningless)
26-MAR-2003  MGD  SET alert=nnn (were 'nnn' can be 500, 599, 403, etc.)
08-MAR-2003  MGD  SET html=[bodytag|header|headertag|footer|footertag]=[..],
                  dir=style[=default|original|anchor|htdir]
15-FEB-2002  MGD  SET [no]search=none,
                  script=params=+(name=value) concatenates to any existing
17-JAN-2003  MGD  general (non-RTE) run-time allowed with (!..) syntax,
                  both run-time specifications allowed with SCRIPT rule
                  SET cgiplusin=[none|cr|lf|crlf],
                  SET cgiplusin=eof,
                  SET script=query=none,
                  SET script=path=find
10-JAN-2003  MGD  SET script=query=relaxed
16-NOV-2002  MGD  SET auth=all (all access must be authorized or fail)
06-NOV-2002  MGD  added 'MP', 'RC' and 'ST' conditionals
12-OCT-2002  MGD  refine metacon reporting,
                  refine mapping rule processing to ensure that paths with
                  forbidden syntax (e.g. multiple '/') generate RMS bad syntax
05-OCT-2002  MGD  'positional' wildcards,
                  SET query-string=,
                  provide 'rqptr->MetaConPass', 
                  confine script=as= to first pass (script resolution)
                  added 'PA' conditional
24-SEP-2002  MGD  added 'PI' and 'RU' conditionals
16-SEP-2002  MGD  MapOdsElementsToVms() excise parent directory syntax,
                  SET path [no]map=ellipsis (off by default),
                  SET report=4nn=nnn for mapping HTTP status
14-SEP-2002  MGD  only use MapUrl_VmsUserName() path ODS if not already set,
                  SET dir=charset= directory listing charset mapping rule
10-SEP-2002  MGD  add en/decoding for Advanced Server (Samba) file names
15-AUG-2002  MGD  SET alert=map, alert=auth, alert=end variants for ALERT,
                  SET ods=2, ods=5, now ods=pwk and ods=sri for below,
                  rework ..UrlToVms() and ..VmsToUrl() to allow for mapping
                  to and from SRI encoding (NFS) and PATHWORKS encoding
                  (and VMS to URL functions no longer explicitly URL-encode)
07-AUG-2002  MGD  bugfix; 'script' and 'exec' MetaConParseReset() state
04-AUG-2002  MGD  allow for 'pass /* 400' (i.e. no trailing message),
                  bugfix; template/result wildcard checking for scripting rules
31-MAY-2001  MGD  SET dir=access, dir=noaccess, dir=access=selective,
                  dir=impliedwildcard, dir=noimpliedwildcard,
                  dir=wildcard, dir=nowildcard
13-MAY-2002  MGD  SET auth=SYSUAF=pwdexpURL=
07-APR-2002  MGD  exchange DEVICE:[DIRECTORY]FILE.TYPE for the hopefully
                  more informative NO:[REVERSE.MAPPING.FOR.THIS]FILE.PATH
14-MAR-2002  MGD  bugfix; throttle report (jf.pieronne@laposte.net)
14-JAN-2002  MGD  added '**' and '*!' wildcard match and discard to template,
                  eliminate device:[.directory] (multiple consecutive '/'),
                  bugfix; arrghhh - wildcard substitution in MapUrl__Map()
18-NOV-2001  MGD  path SETings may now trail any rule with a result string,
                  and are applied to the matched path before mapping occurs,
                  SET http=accept-charset=, accept=lang
28-OCT-2001  MGD  bugfix; DECnet user script mapping
13-OCT-2001  MGD  ensure a conditional is not mistaken for a missing template,
                  script=params=(name=value[,name="value1 value2"]),
                  proxy=bind=IP-address, proxy=chain=host:port, alert,
                  auth=revalidate=hh:mm:ss,
                  bugfix; wildcard substitution in MapUrl__Map()
25-AUG-2001  MGD  meta-config (even workin' on my birthday, sigh)
04-AUG-2001  MGD  support module WATCHing
15-MAY-2001  MGD  bugfix; remove 'RU' conditional (mapping before auth!)
10-MAY-2001  MGD  modify throttle parameter meanings,
                  set rule SCRIPT=CPU= for limiting script process CPU
13-APR-2001  MGD  add queue length to THROTTLE=n[,n,n,hh:mm:ss,hh:mm:ss]
                  add SCRIPT=BIT-BUCKET=hh:mm:ss,
                  bugfix; conditions for NetThisVirtualService() call
05-APR-2001  MGD  bugfix; 'HM' network mask processing
28-MAR-2001  MGD  EXEC of file type
13-MAR-2001  MGD  set rules THROTTLE=n[,n,n,n] & TIMEOUT=n,n,n
                  "hh:mm:ss" for providing a more versatile period
28-FEB-2001  MGD  OdsLoadTextFile(), OdsParseTextFile(), [IncludeFile]
22-DEC-2000  MGD  use of backslash to escape non-wildcard reserved characters
                  in rule and conditional strings (i.e. \] for ])
19-NOV-2000  MGD  bugfix; mapping '/'
10-NOV-2000  MGD  bugfix; MapOdsUrlToVms() final ';'
01-OCT-2000  MGD  set rule SCRIPT=AS=,
                  rework mapping code somewhat,
                  MapUrl_VmsUserNameCache() on reset free entries
31-AUG-2000  MGD  bugfix; MapOdsUrlToVms() escaped version semi-colon
24-JUN-2000  MGD  add network-mask to conditionals,
                  persistent run-time environment in EXEC rule (...),
                  change 'HH' to 'VS' (virtual service) backward compatible
06-APR-2000  MGD  set rules SSLCGI= and MAP=
04-MAR-2000  MGD  use FaolToNet(), et.al.
02-JAN-2000  MGD  config file opened via ODS module,
                  detection of a path's on-disk-structure (ODS-2 or ODS-5),
                  modify URL->VMS and VMS->URL mapping for extended syntax,
                  avoid confusion; redirect indicators changed from '^' and
                  '@' for local and remote, to '<' and '>' respectively,
                  bugfix; trailing wildcard in set rule comparison
24-OCT-1999  MGD  groan; ensure storage does not overflow!!
                  (plus copious quantities of self-flagellation),
                  SYSUAF-based user directory mapping via a "USER" rule,
                  CGIprefix, [no]profile and [no]authonce SET rules,
                  happy seventh wedding anniversary
12-SEP-1999  MGD  virtual services modifications
10-MAY-1999  MGD  conditional mapping on HTTP cookie and referer,
                  increase the size of scratch storage,
                  mapping endless-loop detection
16-JAN-1999  MGD  allow for proxy service mappings by removing requirement
                  for template and result paths to be absolute ("/...") paths
                  (every time I have to deal with this module I groan)
10-JAN-1999  MGD  bugfix; pass rules not returning mapped path
17-OCT-1998  MGD  SET mapping rule,
                  virtual services via "[[virtual-host:virtual-port]]",
                  "qs:" query string conditional,
                  invalid RMS file name/character substitution configurable
12-AUG-1998  MGD  MapOdsVmsToUrl() now only optionally absorbs MFD
19-JUL-1998  MGD  'E'xec DECnet-based user scripts
10-MAR-1998  MGD  allow for local redirects (using '^' detect character)
07-FEB-1998  MGD  added "sc:" scheme/protocol conditional for SSL support
20-DEC-1997  MGD  added DECnet support in _UrlToVms(),
                  result paths can now begin with an '*'
25-OCT-1997  MGD  added "as:", "fo:", and "hh:" conditionals,
                  bugfix; MsgFor() required request pointer to find langauge
15-SEP-1997  MGD  MsgFor() was not returning a leading-null message (does now),
                  HTTP status code rules (e.g. "pass /no/* 403 forbidden"),
                  removed two consecutive slashes inhibiting rule mapping
07-SEP-1997  MGD  added "sn:" and "sp:" conditionals
09-AUG-1997  MGD  v4.3, message database, mapping "conditionals",
                  more cart-wheels, hand-stands and contortions (see 01-OCT-96)
05-JUN-1997  MGD  v4.2, CGIplus "exec+" and "script+" rules
01-FEB-1997  MGD  HTTPd version 4, major changes for form-based config
01-OCT-1996  MGD  not proud of how I shoe-horned the reporting features in,
                  good example of slop-down or object-disoriented programming,
                  :^( will rework the whole thing one day, sigh!
                  bugfix; requiring use of 'TheFirstRuleWillBeTheNextRule'
06-APR-1996  MGD  modified conversion of non-VMS characters in MapOdsUrlToVms()
15-FEB-1995  MGD  bugfix; redirect rule
01-DEC-1995  MGD  v3.0
24-MAR-1995  MGD  bugfix; end-of-string sometimes not detected when matching
20-DEC-1994  MGD  revised for multi-threaded HTTP daemon
20-JUN-1994  MGD  single-threaded daemon
*/
#endif /* COMMENTS_WITH_COMMENTS */
/*****************************************************************************/

#ifdef WASD_VMS_V7
#undef _VMS__V6__SOURCE
#define _VMS__V6__SOURCE
#undef __VMS_VER
#undef __VMS_VER
#undef __CRTL_VER
#define __CRTL_VER 70000000
#endif

/* standard C header files */
#include <ctype.h>
#include <errno.h>
#include <stdio.h>
#include <string.h>

/* VMS related header files */
#include <devdef.h>
#include <dvidef.h>
#include <prvdef.h>
#include <ssdef.h>
#include <stsdef.h>
#include <uaidef.h>

#include "wasd.h"

#define WASD_MODULE "MAPURL"

/* fundamental buffer size */
#ifdef __ALPHA
#define MAP_BUFFER_SIZE (8192 * 2)
#else
/* IA64 and whatever else may follow */
#define MAP_BUFFER_SIZE (8192 * 4)
#endif

/**********/
/* macros */
/**********/

#define MAPURL_RMS_SUBSTITUTION_DEFAULT '$'

#define WATCH_MODULE_DETAIL (WATCH_MODULE(WATCH_MOD_MAPURL) && \
                             WATCH_MODULE(WATCH_MOD__DETAIL))

/******************/
/* global storage */
/******************/

BOOL  MapUrlExtensionMethod,
      MapUrlPathOds5;

MAPPING_META  MappingMeta;
MAPPING_META  *MappingMetaPtr;

/********************/
/* external storage */
/********************/

extern BOOL  AuthPromiscuous,
             AuthProtectRule,
             AuthPolicySysUafRelaxed,
             CliOdsExtendedDisabled,
             CliOdsExtendedEnabled,
             OdsExtended;

extern int  EfnWait,
            ServerPort,
            ServerHostNameLength;

extern unsigned long  SysPrvMask[];

extern char  *FaoUrlEncodeTable[];

extern int  ToLowerCase[],
            ToUpperCase[];

extern char  ErrorSanityCheck[],
             ErrorWatchSysFao[],
             ServerHostName[],
             ServerHostPort[],
             SoftwareID[];

extern LIST_HEAD  MapUrlUserNameCacheList;
extern int  MapUrlUserNameCacheEntries;

extern CONFIG_STRUCT  Config;
extern HTTPD_GBLSEC  *HttpdGblSecPtr;
extern META_CONFIG  *MetaGlobalMappingPtr;
extern MSG_STRUCT  Msgs;
extern SYS_INFO  SysInfo;
extern WATCH_STRUCT  Watch;

/*****************************************************************************/
/*
This overly-long function (sorry) is not AST reentrant, but when executed 
within the context of the HTTPd, is executed either without the possibility of 
AST interruption, or during AST processing and so provides atomic 
functionality.  Pointers to any strings returned must be used immediately 
(before leaving AST context), or copied into storage maintained by the calling 
routine. 

Maps from URL format to VMS file specification, and REVERSE-MAPS from VMS file 
specification to URL format.  Maps scripts.

Always returns a pointer to char.  An error message is detected by being  
returned as a pointer to a string beginning with a null-character!  The 
message begins from character one. 

Call with 'PathPtr' pointing at a string containing the URL path and 'VmsPtr' 
pointing to the storage to contain the mapped VMS equivalent.

Call with 'VmsPtr' pointing to a VMS file specification (dev:[dir]file.ext) 
and 'PathPtr' pointing to an empty string, used as storage to contain the 
REVERSE-MAPPED file specification.

Call with 'PathPtr' pointing at a string containing the URL path, 'VmsPtr' 
pointing to storage to contain the mapped VMS equivalent, 'ScriptPtr' pointing 
to storage for the URL format script path and 'ScriptVmsPtr' pointing to 
storage to contain the VMS specification of the script procedure/image.

The MapUrl_Map() just wraps MapUrl__Map() so that it's function can be WATCHed.

See alter-egos defined in MapUrl.h
*/ 

char* MapUrl_Map
(
char *PathPtr,
int SizeOfPathPtr,
char *VmsPtr,
int SizeOfVmsPtr,
char *ScriptPtr,
int SizeOfScriptPtr,
char *ScriptVmsPtr,
int SizeOfScriptVmsPtr,
char *RunTimePtr,
int SizeOfRunTimePtr,
int *PathOdsPtr,
REQUEST_STRUCT *rqptr,
REQUEST_PATHSET *PathSetPtr
)
{
   BOOL  VmsToPath;
   char  *cptr, *sptr;
   char  OdsNote [32];

   /*********/
   /* begin */
   /*********/

   if (!rqptr || !WATCHPNT(rqptr))
   {
      cptr = MapUrl__Map (PathPtr, SizeOfPathPtr,
                          VmsPtr, SizeOfVmsPtr,
                          ScriptPtr, SizeOfScriptPtr,
                          ScriptVmsPtr, SizeOfScriptVmsPtr,
                          RunTimePtr, SizeOfRunTimePtr,
                          PathOdsPtr, rqptr, PathSetPtr);
      if (rqptr)
      {
         rqptr->MetaConPass = 0;
         rqptr->MetaConMappedPtr = rqptr->MetaConScriptPtr = NULL;
      }
      return (cptr);
   }

   if (!WATCH_CATEGORY(WATCH_MAPPING))
   {
      cptr = MapUrl__Map (PathPtr, SizeOfPathPtr,
                          VmsPtr, SizeOfVmsPtr,
                          ScriptPtr, SizeOfScriptPtr,
                          ScriptVmsPtr, SizeOfScriptVmsPtr,
                          RunTimePtr, SizeOfRunTimePtr,
                          PathOdsPtr, rqptr, PathSetPtr);
      if (rqptr)
      {
         rqptr->MetaConPass = 0;
         rqptr->MetaConMappedPtr = rqptr->MetaConScriptPtr = NULL;
      }
      return (cptr);
   }

#if WATCH_CAT

   VmsToPath = false;
   if (PathPtr && PathPtr[0])
      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "PATH !AZ", PathPtr); 
   else
   if (VmsPtr && VmsPtr[0])
   {
      VmsToPath = true;
      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "VMS !AZ", VmsPtr); 
   }

   cptr = MapUrl__Map (PathPtr, SizeOfPathPtr,
                       VmsPtr, SizeOfVmsPtr, 
                       ScriptPtr, SizeOfScriptPtr,
                       ScriptVmsPtr, SizeOfScriptVmsPtr,
                       RunTimePtr, SizeOfRunTimePtr,
                       PathOdsPtr, rqptr, PathSetPtr);

   if (VmsToPath)
      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "RESULT !AZ", cptr);
   else
   {
      if (!PathPtr) PathPtr = "";
      if (!VmsPtr) VmsPtr = "";
      if (!ScriptPtr) ScriptPtr = "";
      if (!ScriptVmsPtr) ScriptVmsPtr = "";
      if (!RunTimePtr) RunTimePtr = "";

      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "RESULT");
      if (!cptr[0] && cptr[1])
         WatchDataFormatted ("Error: !AZ\n", cptr+1);
      else
      if (cptr[0] == '\1')
         WatchDataFormatted ("Redirect: !AZ\n", cptr+1);
      else
      {
         switch (PathOdsPtr ? *PathOdsPtr : rqptr->PathOds)
         {
            case MAPURL_PATH_ODS_2 : sptr = " (ODS-2)"; break;
            case MAPURL_PATH_ODS_5 : sptr = " (ODS-5)"; break;
            case MAPURL_PATH_ODS_ADS : sptr = " (ADS)"; break;
            case MAPURL_PATH_ODS_PWK : sptr = " (PWK)"; break;
            case MAPURL_PATH_ODS_SMB : sptr = " (SMB)"; break;
            case MAPURL_PATH_ODS_SRI : sptr = " (SRI)"; break;
            default : sptr = " (ods-2)";
         }
         WatchDataFormatted ("\
     Mapped: !AZ\n\
 Translated: !AZ!AZ\n\
     Script: !AZ\n\
Script-File: !AZ\n\
   Run-Time: !AZ\n",
           cptr, VmsPtr, VmsPtr[0] ? sptr : "",
           ScriptPtr, ScriptVmsPtr, RunTimePtr);
      }
   }

   if (rqptr)
   {
      rqptr->MetaConPass = 0;
      rqptr->MetaConMappedPtr = rqptr->MetaConScriptPtr = NULL;
   }
   return (cptr);

#endif /* WATCH_CAT */
}

char* MapUrl__Map
(
char *PathPtr,
int SizeOfPathPtr,
char *VmsPtr,
int SizeOfVmsPtr,
char *ScriptPtr,
int SizeOfScriptPtr,
char *ScriptVmsPtr,
int SizeOfScriptVmsPtr,
char *RunTimePtr,
int SizeOfRunTimePtr,
int *PathOdsPtr,
REQUEST_STRUCT *rqptr,
REQUEST_PATHSET *PathSetPtr
)
{
   static char  DerivedPathBuffer [MAP_BUFFER_SIZE+128],
                PathBuffer [MAP_BUFFER_SIZE+128],
                VmsBuffer [MAP_BUFFER_SIZE+128];

   BOOL  EvanescentZeroed,
         ExecFileType,
         LoadingRules,
         MapEllipsis,
         MapPathToVms,
         StatusCodeMapping,
         SubstituteForUserName;
   int  idx, widx, status,
        MapRootLength,
        MetaConPass,
        MetaConRestartCount,
        PathOds,
        SetPathIgnore,
        TotalLength,
        WatchThisMatch,
        WatchThisOne,
        WildStringCount;
   unsigned short  Length;
   char  ch,
         RmsSubChar;
   char  *cptr, *eptr, *pptr, *rptr, *sptr, *tptr, *uptr, *zptr,
         *MapRootPtr;
   char  *WildString [REGEX_PMATCH_MAX];
   char  Scratch [MAP_BUFFER_SIZE+128],
         UserDefault [256],
         VmsUserMappedBuffer [256],
         WildBuffer [(MAP_BUFFER_SIZE*4)+128];
   MAP_RULE_META  *mrptr;
   MAP_SET_META  *mrpsptr;
   METACON_LINE  *mclptr;
   REQUEST_PATHSET  EvanescentPathSet;
   REQUEST_PATHSET  *rqpsptr;
   regex_t  *pregptr;
   regmatch_t  pmatch [REGEX_PMATCH_MAX];

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_Map() !UL !&Z !UL !&Z !UL !&Z !UL",
                 SizeOfPathPtr, PathPtr, SizeOfVmsPtr, VmsPtr,
                 SizeOfScriptPtr, ScriptPtr, SizeOfScriptVmsPtr);

   /* if just loading the rules then free any previous set */
   if (LoadingRules = (!PathPtr && !VmsPtr && !ScriptPtr))
      MetaConUnload (&MetaGlobalMappingPtr, &MapUrl_ConfigUnloadLineData);

   if (!MetaGlobalMappingPtr)
   {
      /*********************/
      /* read mapping file */
      /*********************/

      MapUrl_ConfigLoad (&MetaGlobalMappingPtr);
   }

   /* if just (re)loading rules then return now */
   if (LoadingRules) return ("\0\0");

   /*****************************************/
   /* map from the URL or VMS to VMS or URL */
   /*****************************************/

   if (!PathPtr)
   {
      SET2(PathBuffer,'\0\0');
      PathPtr = PathBuffer + 1;
      SizeOfPathPtr = sizeof(PathBuffer);
   }
   if (!VmsPtr)
   {
      *(VmsPtr = VmsBuffer) = '\0';
      SizeOfVmsPtr = sizeof(VmsBuffer);
   }
   /* making 'ScriptPtr' non-empty means "exec" and "script" are ignored */
   if (!ScriptPtr) ScriptPtr = "?";

   if (PathPtr[0])
   {
      /* if the URL is not an empty string then force the conversion to VMS */
      MapPathToVms = true;
      *VmsPtr = '\0';
      MetaConPass = 1;
   }
   else
   {
      /* URL was an empty string, convert from VMS to URL */
      MapPathToVms = false;
      /* generate a URL-style version of the VMS specification */
      MapOdsVmsToUrl (PathPtr, VmsPtr, SizeOfPathPtr, true, rqptr->PathOds);
      MetaConPass = -1;
   }

   /***********************/
   /* loop thru the rules */
   /***********************/

   if (!MetaGlobalMappingPtr)
      return (MsgFor(rqptr,MSG_MAPPING_DENIED_NO_RULES)-1);

   WatchThisOne = WatchThisMatch = 0;
   if (WATCHPNT(rqptr))
   {
      if (WATCH_CATEGORY(WATCH_MAPPING)) WatchThisOne = WATCH_MAPPING;
      if (WATCH_CATEGORY(WATCH_MATCH)) WatchThisMatch = WATCH_MATCH;
   }

   MapRootLength = PathOds = 0;
   RmsSubChar = MAPURL_RMS_SUBSTITUTION_DEFAULT;
   EvanescentZeroed = MapEllipsis = SetPathIgnore = false;
   MapRootPtr = NULL;
   MetaConRestartCount = 0;

   if (rqptr)
   {
      rqptr->MetaConPass = MetaConPass;
      rqptr->MetaConRestartCount = MetaConRestartCount;
      rqptr->MetaConMappedPtr = rqptr->MetaConScriptPtr = NULL;
   }

   if (!PathSetPtr)
   {
      PathSetPtr = &EvanescentPathSet;
      memset (&EvanescentPathSet, 0, sizeof(EvanescentPathSet));
      EvanescentZeroed = true;
   }

   rqpsptr = PathSetPtr;

   MetaConParseReset (MetaGlobalMappingPtr, true);
   for (;;)
   {
      mclptr = MetaGlobalMappingPtr->ParsePtr =
         MetaGlobalMappingPtr->ParseNextPtr;

      if (WATCH_MODULE_DETAIL)
         WatchDataFormatted ("!&X !UL !UL !UL !UL !&X !&Z\n",
            mclptr, mclptr->Size, mclptr->Token, mclptr->Number,
            mclptr->Length, mclptr->LineDataPtr, mclptr->TextPtr);

      /* if terminating empty "line" */
      if (!mclptr->Size) break;

      if (mclptr->Token == METACON_TOKEN_TEXT)
      {
         /* get required data, adjust the parse context to the next "line" */
         cptr = mclptr->TextPtr;
         mrptr = mclptr->LineDataPtr;
         MetaGlobalMappingPtr->ParseNextPtr =
            (METACON_LINE*)((char*)mclptr + mclptr->Size);
      }
      else
      if (mclptr->Token != METACON_TOKEN_DIRECTORY)
      {
         /* not a simple text line, have meta-config parse this one for us */
         cptr = MetaConParse (rqptr, MetaGlobalMappingPtr, &mclptr,
                              WatchThisOne);
         /* if the end of rules */
         if (!cptr) break;

         /* if error string */
         if (!*cptr && *(cptr+1)) return (cptr);
         /* if inline rule and expression was false */
         if (SAME4 (cptr, '\0\0\0\1')) continue;
         mrptr = mclptr->LineDataPtr;
      }

      if (mclptr->Token == METACON_TOKEN_DIRECTORY)
      {
         /* get required data, adjust the parse context to the next "line" */
         cptr = mclptr->TextPtr + sizeof("[ConfigDirectory]");
         while (*cptr && ISLWS(*cptr)) cptr++;
         zptr = (sptr = rqptr->ConfigDirectory) +
                sizeof(rqptr->ConfigDirectory)-1;
         while (*cptr && sptr < zptr) *sptr++ = *cptr++;
         *sptr = '\0';
         rqptr->ConfigDirectoryLength = sptr - rqptr->ConfigDirectory;
         MetaGlobalMappingPtr->ParseNextPtr =
            (METACON_LINE*)((char*)mclptr + mclptr->Size);
         continue;
      }

      /* there was a problem in initializing the rule */
      if (!mrptr)
      {
         if (WatchThisOne) WatchDataFormatted ("?!AZ\n", cptr);
         continue;
      }

      if (WATCH_MODULE_DETAIL)
         WatchDataFormatted ("!&X !UL !&Z !&Z !&Z\n", 
            mrptr, mrptr->RuleType, mrptr->TemplatePtr,
            mrptr->ResultPtr, mrptr->ConditionalPtr);

      /* hmmm, endless loop!! */
      if (MetaConPass > 2)
         return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);

      if (rqptr->rqPathSet.MapUri)
      {
         /* substitute the request URI (raw path plus query) for rewriting */
         rqptr->rqPathSet.MapUri = false;
         zptr = (pptr = PathPtr = PathBuffer+1) + sizeof(PathBuffer)-1;
         for (cptr = rqptr->rqHeader.RequestUriPtr;
              *cptr && pptr < zptr;
              *pptr++ = *cptr++);
         if (pptr >= zptr)
            return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
         *pptr = '\0';
      }

      /* if 'ScriptPtr' is not to be used then ignore "exec" and "script" */
      if (ScriptPtr[0] &&
          (mrptr->RuleType == MAPURL_RULE_EXEC ||
           mrptr->RuleType == MAPURL_RULE_SCRIPT ||
           mrptr->RuleType == MAPURL_RULE_UXEC))
      {
         if (WatchThisOne)
            MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                              MAPURL_REPORT_MATCH_NOT, SetPathIgnore);
         continue;
      }

      if (cptr = MapUrl_GuaranteeAccess (rqptr, PathPtr))
         return (cptr);

      /*****************************************************************/
      /* compare the URL with the template/result in the mapping entry */
      /*****************************************************************/

      if (mrptr->RuleType == MAPURL_RULE_SET ||
          mrptr->RuleType == MAPURL_RULE_PROTECT)
      {
         /*********************/
         /* SET/PROTECT rules */
         /*********************/

         /* cheap check obvious non-/match before using expensive functions */
         tptr = mrptr->TemplatePtr;
         pregptr = &mrptr->RegexPregTemplate;
         pptr = PathPtr;
         if (Config.cfMisc.RegexSyntax && *tptr == REGEX_CHAR) tptr++;
         /* while matching vanilla characters */
         while ((isalnum(*tptr) || *tptr == '/' ||
                 *tptr == '-' || *tptr == '_') &&
                TOLO(*pptr) == TOLO(*tptr))
         {
            pptr++;
            tptr++;
         }
         /* if non-matching vanilla character */
         if (isalnum(*tptr) || *tptr == '/' || *tptr == '-' || *tptr == '_')
         {
            if (WatchThisMatch)
               WatchThis (WATCHITM(rqptr), WATCH_MATCH, "NO !&Z", tptr);
            if (WatchThisOne)
               MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                 MAPURL_REPORT_MATCH_NOT, SetPathIgnore);
            continue;
         }

         /* if a trailing wildcard then it's a match already! */
         if (SAME2(tptr,'*\0'))
         {
            if (WatchThisMatch)
               WatchThis (WATCHITM(rqptr), WATCH_MATCH, "YES");
         }
         else
         {
            /* expensive comparison of path and template */
            if (!StringMatchAndRegex (rqptr, PathPtr, mrptr->TemplatePtr,
                                      SMATCH_STRING_REGEX, pregptr, NULL))
            {
               /* not matched then straight to next rule */
               if (!WatchThisOne) continue;
               MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                 MAPURL_REPORT_MATCH_NOT, SetPathIgnore);
               continue;
            }
         }

         if (WATCH_MODULE(WATCH_MOD_MAPURL))
            WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "MATCHED");
      }
      else
      {
         /***************/
         /* other rules */
         /***************/

         /* when mapping VMS to URL then ignore all BUT "pass" & "set" rules */
         if (!MapPathToVms && mrptr->RuleType != MAPURL_RULE_PASS) continue;

         /* if reverse-mapping VMS to URL use the result if available */
         if (!MapPathToVms && mrptr->ResultPtr[0])
         {
            if (MapRootPtr)
            {
               /* if a mapping root is set then eliminate this first */
               cptr = MapRootPtr;
               pptr = PathPtr;
               while (*cptr && *pptr && TOLO(*cptr) == TOLO(*pptr))
               {
                  cptr++;
                  pptr++;
               }
               if (*cptr || !*pptr)
               {
                  /* the path and root do not match */
                  if (!WatchThisMatch) continue;
                  WatchThis (WATCHITM(rqptr), WATCH_MATCH, "NO (root) !&Z", cptr);
                  continue;
                }
            }
            cptr = tptr = mrptr->ResultPtr;
            pregptr = NULL;
         }
         else
         {
            cptr = tptr = mrptr->TemplatePtr;
            pregptr = &mrptr->RegexPregTemplate;
         }

         /* cheap check obvious non-/match before using expensive functions */
         if (Config.cfMisc.RegexSyntax && *tptr == REGEX_CHAR) tptr++;
         pptr = PathPtr;
         /* while matching vanilla characters */
         while ((isalnum(*tptr) || *tptr == '/' ||
                 *tptr == '-' || *tptr == '_') &&
                TOLO(*pptr) == TOLO(*tptr))
         {
            pptr++;
            tptr++;
         }
         /* if non-matching vanilla character */
         if (isalnum(*tptr) || *tptr == '/' || *tptr == '-' || *tptr == '_')
         {
            if (WatchThisMatch)
               WatchThis (WATCHITM(rqptr), WATCH_MATCH, "NO !&Z", tptr);
            if (WatchThisOne)
               MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                 MAPURL_REPORT_MATCH_NOT, SetPathIgnore);
            continue;
         }

         /* if a trailing wildcard then it's a match already! */
         if (SAME2(tptr,'*\0'))
         {
            if (WatchThisMatch)
               WatchThis (WATCHITM(rqptr), WATCH_MATCH, "YES");
            /* simulate the setting of the 'pmatch' data */
            pmatch[0].rm_so = 0;
            pmatch[1].rm_so = pptr - PathPtr;
            while (*pptr) pptr++;
            pmatch[0].rm_eo = pmatch[1].rm_eo = pptr - PathPtr;
            for (idx = 2; idx < REGEX_PMATCH_MAX; idx++)
                pmatch[idx].rm_so = pmatch[idx].rm_eo = -1;
         }
         else
         {
            /* expensive comparison of path and template */
            if (!StringMatchAndRegex (rqptr, PathPtr, cptr,
                                      SMATCH_STRING_REGEX, pregptr, &pmatch))
            {
               /* not matched then straight to next rule */
               if (!WatchThisOne) continue;
               MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                 MAPURL_REPORT_MATCH_NOT, SetPathIgnore);
               continue;
            }
         }

         /************/
         /* matched! */
         /************/

         /* copy using 'regmatch_t' data, strings into 'WildBuffer' */
         zptr = (sptr = WildBuffer) + sizeof(WildBuffer);
         for (idx = WildStringCount = 0; idx < REGEX_PMATCH_MAX; idx++)
         {
            WildString[idx] = "";
            if (pmatch[idx].rm_so == -1 || pmatch[idx].rm_eo == -1) continue;
            WildString[WildStringCount++] = sptr;
            pptr = PathPtr + pmatch[idx].rm_so;
            cptr = PathPtr + pmatch[idx].rm_eo;
            while (pptr < cptr && sptr < zptr) *sptr++ = *pptr++;
            if (sptr >= zptr) break;
            *sptr++ = '\0';
         }
         if (sptr >= zptr) 
            return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
         /* the actual number of wildcard/group matched strings */
         if (WildStringCount) WildStringCount--;

         if (WATCH_MODULE(WATCH_MOD_MAPURL))
         {
            WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "MATCHED");
            StringWatchPmatch (PathPtr, &pmatch);
            WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "WILDSTRING");
            for (idx = 1; idx <= WildStringCount; idx++)
               WatchDataFormatted ("!UL. !&Z\n", idx, WildString[idx]);
         }
      }

      if (mrptr->ConditionalPtr[0])
      {
         /***************/
         /* conditional */
         /***************/

         /* when not mapping using a request then ignore conditionals */
         if (rqptr)
         {
            /* if condition not met then continue */
            if (!MapConString ((REQUEST_STRUCT*)rqptr, mrptr, rqpsptr))
            {
               if (WatchThisOne)
                  MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                    MAPURL_REPORT_MATCH_RULE, SetPathIgnore);
               continue;
            }

            /* report rule and conditional matched */
            if (WatchThisOne)
               MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                                 MAPURL_REPORT_MATCH_RULECOND, SetPathIgnore);
         }

         if (WATCH_MODULE_DETAIL)
            WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "CONDITIONAL MATCHED");
      }
      else
      {
         /* report rule, there was no conditional */
         if (WatchThisOne)
            MapUrl_WatchRule (rqptr, mrptr, mclptr, PathPtr, PathOds,
                              MAPURL_REPORT_MATCH_RULENOCOND, SetPathIgnore);
      }

      if (mrptr->PathSet)
      {
         /****************/
         /* path SETings */
         /****************/

         mrpsptr = &mrptr->mpPathSet;

         if (mrpsptr->MapSetIgnore)
         {
            /* takes effect immediately */
            SetPathIgnore = true;
            continue;
         }
         else
         if (mrpsptr->MapSetNoIgnore)
            SetPathIgnore = false;
 
         /* ignoring path SETings (except for the above of course ;^) */
         if (SetPathIgnore) continue;

         /***********************/
         /* being ignored? - no */
         /***********************/

         if (mrpsptr->MapRestart)
         {
            MetaConRestartCount++;
            if (WatchThisOne)
               WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                          "RESTART !UL", MetaConRestartCount); 
            if (MetaConRestartCount > MAPURL_RESTART_MAX)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            if (rqptr) rqptr->MetaConRestartCount = MetaConRestartCount;
            MetaConParseReset (MetaGlobalMappingPtr, true);
            continue;
         }

         /* some SETings must be applied in this function! */

         if (!(rqptr->AgentRequestPtr ||
               rqptr->rqCgi.CalloutInProgress))
         {
            if (mrpsptr->MapSetRequest)
               rqpsptr = &PathSetPtr;
            else
            if (mrpsptr->MapSetNoRequest)
            {
               rqpsptr = &EvanescentPathSet;
               if (!EvanescentZeroed)
               {
                  memset (&EvanescentPathSet, 0, sizeof(EvanescentPathSet));
                  EvanescentZeroed = true;
               }
            }
         }

         if (mrpsptr->NoMapEllipsis)
            rqpsptr->MapEllipsis = MapEllipsis = false;
         else
         if (mrpsptr->MapEllipsis)
            rqpsptr->MapEllipsis = MapEllipsis = true;

         if (mrpsptr->MapRootPtr)
         {
            /* empty string resets */
            if (mrpsptr->MapRootLength)
            {
               MapRootPtr = mrpsptr->MapRootPtr;
               MapRootLength = mrpsptr->MapRootLength;
               rqpsptr->MapRootPtr =
                  VmGetHeap (rqptr, mrpsptr->MapRootLength+1);
               memcpy (rqpsptr->MapRootPtr,
                       mrpsptr->MapRootPtr,
                       mrpsptr->MapRootLength+1);
            }
            else
            {
               MapRootPtr = rqpsptr->MapRootPtr = NULL;
               MapRootLength = 0;
            }
         }

         if (mrpsptr->RmsSubChar)
            RmsSubChar = mrpsptr->RmsSubChar;

         if (rqptr->AgentRequestPtr)
         {
            /* bypass evanecsent structure by SETing directly into request! */
            if (MetaConPass == 1 &&
                mrpsptr->ScriptAgentAsPtr)
            {
               /* empty string resets */
               if (mrpsptr->ScriptAgentAsLength)
               {
                  rqptr->rqPathSet.ScriptAgentAsPtr =
                     VmGetHeap (rqptr, mrpsptr->ScriptAgentAsLength+1);
                  memcpy (rqptr->rqPathSet.ScriptAgentAsPtr,
                          mrpsptr->ScriptAgentAsPtr,
                          mrpsptr->ScriptAgentAsLength+1);
               }
               else
                  rqptr->rqPathSet.ScriptAgentAsPtr = NULL;
            }
         }

         if (MetaConPass == 1 &&
             mrpsptr->ScriptAsPtr)
         {
            /* empty string resets */
            if (mrpsptr->ScriptAsLength)
            {
               rqpsptr->ScriptAsPtr =
                  VmGetHeap (rqptr, mrpsptr->ScriptAsLength+1);
               memcpy (rqpsptr->ScriptAsPtr,
                       mrpsptr->ScriptAsPtr,
                       mrpsptr->ScriptAsLength+1);
            }
            else
               rqpsptr->ScriptAsPtr = NULL;
         }

         /* others can be applied in an independent function */

         MapSetPath (rqptr, rqpsptr, mrpsptr);

         /* when mapping VMS to URL then ignore all BUT "pass" rules */
         if (!MapPathToVms && mrptr->RuleType != MAPURL_RULE_PASS) continue;

         /* must be immediately detected and actioned by the calling routine */
         if (rqpsptr->Http2ToHttp11) return ("\0\0");
         
         if (rqpsptr->ClientAddress &&
             rqpsptr == &rqptr->rqPathSet)
         {
            if (rqpsptr->ClientAddress == MAPURL_CLIENT_RESET)
               MapUrl_ResetClientAddress (rqptr);
            else
            if (cptr = MapUrl_SetClientAddress (rqptr))
               return (cptr);
         }
      }

      /***************/
      /* end SETings */
      /***************/

      if (rqpsptr->PathOds)
      {
         /* path file-system has been set, perhaps to turn off ODS-5! */
         if (rqpsptr->PathOds == MAPURL_PATH_ODS_0)
            PathOds = rqptr->PathOds = rqpsptr->PathOds = 0;
         else
            PathOds = rqptr->PathOds = rqpsptr->PathOds; 
      }
      else
      {
         /* set from the $GETDVI volume file-system */
         PathOds = rqptr->PathOds = mrptr->ResultPathOds;
      }
      if (PathOdsPtr) *PathOdsPtr = PathOds;

      if (MapPathToVms)
      {
         /***************************/
         /* mapping from URL to VMS */
         /***************************/

         switch (mrptr->RuleType)
         {
         case MAPURL_RULE_EXEC :
         case MAPURL_RULE_UXEC :

            /*******************/
            /* EXEC/UXEC rule */
            /*******************/

            if (!WildStringCount)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);

            /* first get the script component from the request */
            tptr = mrptr->TemplatePtr;
            zptr = (sptr = ScriptPtr) + SizeOfScriptPtr;
            if (mrptr->RuleType == MAPURL_RULE_UXEC)
            {
               if (!rqpsptr->ScriptAsPtr ||
                   rqpsptr->ScriptAsPtr[0] != '~')
               {
                  /* hmmm, not enabled with a mapping rule!! */
                  return (MsgFor(rqptr,MSG_GENERAL_DISABLED)-1);
               }
               /* first insert the /~username component */
               while (*tptr && *tptr != '*' && sptr < zptr) *sptr++ = *tptr++;
               if (*tptr) tptr++;
               cptr = WildString[1];
               while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               cptr = WildString[2];
            }
            else
            if (SAME2(tptr,'/~'))
            {
               /* mapping a DECnet username based script */
               while (*tptr && *tptr != '*' && sptr < zptr) *sptr++ = *tptr++;
               while (*tptr == '*') tptr++;
               cptr = WildString[1];
               while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               cptr = WildString[2];
            }
            else
            {
               /* mapping a vanilla exec rule */
               cptr = WildString[1];
            }

            while (*tptr && *tptr != '*' && sptr < zptr) *sptr++ = *tptr++;
            while (*tptr && SAME2(tptr,'**')) tptr++;
            if (SAME2(tptr,'*.'))
            {
               /* EXECing a file type here */
               ExecFileType = true;
               while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               /* now get the script file type (e.g. ".cgi") */
               tptr++;
               while (*tptr && *tptr != '*' && sptr < zptr) *sptr++ = *tptr++;
            }
            else
            {
               /* EXECing a directory here */
               ExecFileType = false;
               while (*cptr && *cptr != '/' && sptr < zptr) *sptr++ = *cptr++;
            }

            if (sptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *sptr = '\0';

            if (mrptr->RuleType == MAPURL_RULE_UXEC)
            {
               /* "append" the username to the circumflex */
               rqpsptr->ScriptAsPtr = sptr =
                   VmGetHeap (rqptr, strlen(WildString[1])+2);
               *sptr++ = '~';
               for (cptr = WildString[1]; *cptr; *sptr++ = TOUP(*cptr++));
               *sptr = '\0';
            }

            /* now get what it's mapped into (the more complex bit ;^) */
            rptr = mrptr->ResultPtr;

            if (*rptr == '(')
            {
               /* run-time, e.g. exec /plbin/@ (ht_exe:pl.exe)/plbin/@ */
               rptr++;
               zptr = (sptr = RunTimePtr) + SizeOfRunTimePtr;
               while (*rptr && *rptr != ')' && sptr < zptr) *sptr++ = *rptr++;
               if (sptr >= zptr)
                  return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
               *sptr = '\0';
               if (*rptr) rptr++;
            }

            zptr = (sptr = Scratch) + sizeof(Scratch);

            if (mrptr->RuleType == MAPURL_RULE_UXEC)
            {
               /* begin with the mapped user instead of the /~username */
               if (rqpsptr->PathOds)
                  uptr = MapUserName (rqptr, WildString[1], NULL);
               else
               {
                  uptr = MapUserName (rqptr, WildString[1], &PathOds);
                  rqptr->PathOds = PathOds;
                  if (PathOdsPtr) *PathOdsPtr = PathOds;
               }
               if (!uptr[0]) return (uptr);
               /* copy in the now-mapped username */
               while (*uptr && sptr < zptr) *sptr++ = *uptr++;
               /* skip over the equivalent in the result (i.e. "/~*") */
               while (*rptr && *rptr != '*') rptr++;
               if (*rptr) rptr++;
               /* skip the first wildcarded string (username) */
               cptr = WildString[widx=2];
            }
            else
            if (SAME2(mrptr->TemplatePtr,'/~'))
            {
               /*
                  e.g. exec /~@/cgi-bin/@ /0""::/web/user/@/cgi-bin/@
                  i.e. the user part must be prepended to the script part.
               */
               while (*rptr && *rptr != '*' && sptr < zptr)
               {
                  if (*rptr != '\"' || !SAME4(rptr,'\"\"::'))
                  {
                     *sptr++ = *rptr++;
                     continue;
                  }
                  /* mapping a DECnet username based script */
                  *sptr++ = *rptr++;
                  cptr = WildString[1];
                  while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               }
               while (*rptr == '*') rptr++;
               cptr = WildString[1];
               while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               cptr = WildString[widx=2];
            }
            else
            {
               /* vanilla script exec */
               if (MapRootPtr)
               {
                  if (WATCHING (rqptr, WATCH_MAPPING))
                     WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                                "ROOT !AZ", MapRootPtr);
                  for (cptr = MapRootPtr;
                       *cptr && sptr < zptr;
                       *sptr++ = *cptr++);
               }
               cptr = WildString[widx=1];
            }

            /* now the leading script-location part of the result */
            while (*rptr && *rptr != '*' && sptr < zptr) *sptr++ = *rptr++;
            while (*rptr == '*') rptr++;

            if (WATCH_MODULE_DETAIL)
               WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "!&Z", cptr);
            if (ExecFileType)
            {
               /* EXECing a file type here, script name (full buffer) */
               while (*cptr && sptr < zptr) *sptr++ = *cptr++;
               cptr = WildString[++widx];
               /* now get the script file type (e.g. ".cgi") */
               while (*rptr && *rptr != '*' && sptr < zptr) *sptr++ = *rptr++;
            }
            else
            {
               /* EXECing a directory here, script name */
               while (*cptr && *cptr != '/' && sptr < zptr) *sptr++ = *cptr++;
            }

            if (sptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *sptr = '\0';

            /* generate the VMS script name */
            MapOdsUrlToVms (Scratch, ScriptVmsPtr, SizeOfScriptVmsPtr,
                            RmsSubChar, MapEllipsis, PathOds);

            /* indicate CGIplus script via leading '+' instead of '/' */
            if (mrptr->IsCgiPlusScript && (!RunTimePtr || !RunTimePtr[0]))
               ScriptPtr[0] = '+';

            /* get all including and after the first slash as the new path */
            zptr = (sptr = DerivedPathBuffer) + sizeof(DerivedPathBuffer);
            rqptr->MetaConMappedPtr = sptr;
            /* continue copying from the wildcard string */
            while (*cptr && sptr < zptr) *sptr++ = *cptr++;
            if (sptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *sptr++ = '\0';
            TotalLength = sptr - DerivedPathBuffer;

            if (WATCH_MODULE_DETAIL)
               WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "E/UXEC !&Z !&Z !&Z",
                          ScriptPtr, ScriptVmsPtr, DerivedPathBuffer);

            if (!rqpsptr->MapEmpty && !DerivedPathBuffer[0])
               return ("\0\0");

            if (rqpsptr->MapOnce)
            {
               /* convert the URL-style to a VMS-style specification */
               MapOdsUrlToVms (DerivedPathBuffer, VmsPtr, SizeOfVmsPtr,
                               RmsSubChar, MapEllipsis, PathOds);
               if (WATCH_MODULE_DETAIL)
                  WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                             "E/UXEC !&Z !&Z", DerivedPathBuffer, VmsPtr);
               return (DerivedPathBuffer);
            }

            /* restarting at first rule map the path derived from the script */
            MetaConPass++;
            if (rqptr)
            {
               rqptr->MetaConPass = MetaConPass;
               rqptr->MetaConScriptPtr = ScriptPtr;
            }
            *VmsPtr = '\0';
            PathPtr = DerivedPathBuffer;
            RmsSubChar = MAPURL_RMS_SUBSTITUTION_DEFAULT;
            MapEllipsis = rqpsptr->MapEllipsis = false;
            MetaConParseReset (MetaGlobalMappingPtr, true);
            continue;

         case MAPURL_RULE_FAIL :

            /*************/
            /* FAIL rule */
            /*************/

            if (WATCH_MODULE_DETAIL)
               WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "FAIL !&Z", PathPtr);
            return (MsgFor(rqptr,MSG_MAPPING_DENIED_RULE)-1);

         case MAPURL_RULE_MAP :

            /************/
            /* MAP rule */
            /************/

            /* place this in a buffer so not to overwrite original path */
            zptr = (pptr = PathPtr = PathBuffer+1) + sizeof(PathBuffer)-1;
            rqptr->MetaConMappedPtr = pptr;
            widx = 1;
            /* scan through the result string */
            rptr = mrptr->ResultPtr;
            while (*rptr)
            {
               while (*rptr && *rptr != '*' && pptr < zptr) *pptr++ = *rptr++;
               if (!*rptr || pptr >= zptr) break;
               /* a wildcard asterisk, substitute from original path */
               while (*rptr == '*') rptr++;
               if (*rptr == '\'')
               {
                  /* specific wildcard component, e.g. "*'1" */
                  rptr++;
                  if (isdigit(*rptr))
                  {
                     idx = *rptr++ - '0';
                     cptr = WildString[idx];
                  }
                  else
                     cptr = "";
               }
               else
               if (widx < REGEX_PMATCH_MAX)
                  cptr = WildString[widx++];
               else
                  cptr = "";
               while (*cptr && pptr < zptr) *pptr++ = *cptr++;
            }
            if (pptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *pptr = '\0';

            /* continue with the substituted URL mapping */
            if (WATCH_MODULE_DETAIL)
               WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "MAP !&Z", PathPtr);
            continue;

         case MAPURL_RULE_PASS :
         case MAPURL_RULE_REDIRECT :
         case MAPURL_RULE_USER :

            /****************************/
            /* PASS/REDIRECT/USER rules */
            /****************************/

            cptr = WildString[widx=1];
            rptr = mrptr->ResultPtr; 
            zptr = (pptr = PathBuffer+1) + sizeof(PathBuffer)-1;

            /* if there is no result to map just pass back the original path */
            if (!*rptr) 
            {
               if (mrptr->RuleType == MAPURL_RULE_PASS && MapRootPtr)
               {
                  if (WATCHING (rqptr, WATCH_MAPPING))
                     WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                                "ROOT !AZ", MapRootPtr);
                  for (cptr = MapRootPtr;
                       *cptr && pptr < zptr;
                       *pptr++ = *cptr++);
                  for (cptr = PathPtr; *cptr && pptr < zptr; *pptr++ = *cptr++);
                  if (pptr >= zptr)
                     return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
                  *pptr = '\0';
                  pptr = PathBuffer;
               }
               else
                  pptr = PathPtr;

               if (*pptr != '/')
               {
                  /* doesn't look like file-system, don't bother translating */
                  return (PathPtr);
               }

               /* convert the URL-style to a VMS-style specification */
               MapOdsUrlToVms (pptr, VmsPtr, SizeOfVmsPtr,
                               RmsSubChar, MapEllipsis, PathOds);
               if (WATCH_MODULE_DETAIL)
                  WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                              "PASS !&Z !&Z", PathPtr, VmsPtr);
               return (PathPtr);
            }

            /* if redirect rule leave room for the redirection indicator */
            if (mrptr->RuleType == MAPURL_RULE_REDIRECT) pptr++;

            if (mrptr->RuleType == MAPURL_RULE_USER)
            {
               /* begin with the mapped user instead of the /~username */
               if (rqpsptr->PathOds)
                  uptr = MapUserName (rqptr, WildString[1], NULL);
               else
               {
                  uptr = MapUserName (rqptr, WildString[1], &PathOds);
                  rqptr->PathOds = PathOds;
                  if (PathOdsPtr) *PathOdsPtr = PathOds;
               }
               if (!uptr[0]) return (uptr);
               /* copy in the-now mapped username */
               while (*uptr && pptr < zptr) *pptr++ = *uptr++;
               /* skip over the equivalent in the result (i.e. "/~*") */
               while (*rptr && *rptr != '*') rptr++;
               if (*rptr) rptr++;
               /* skip first wildcard string (username) */
               cptr = WildString[widx=2];
            }

            if (mrptr->RuleType == MAPURL_RULE_PASS ||
                mrptr->RuleType == MAPURL_RULE_REDIRECT)
            {
               if (!WildStringCount)
               {
                  if (cptr = SysTrnLnm (mrptr->ResultPtr))
                  {
                     /****************************/
                     /* use logical name content */
                     /****************************/

                     if (WATCHING (rqptr, WATCH_MAPPING))
                        WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                                   "TRLNM !AZ \"!AZ\"", mrptr->ResultPtr, cptr);

                     if (mrptr->RuleType == MAPURL_RULE_PASS)
                     {
                        zptr = (sptr = VmsPtr) + SizeOfVmsPtr;
                        while (*cptr && sptr < zptr) *sptr++ = *cptr++;
                        if (sptr >= zptr)
                           return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
                        *sptr = '\0';

                        zptr = (sptr = PathBuffer+1) + sizeof(PathBuffer)-1;
                        cptr = mrptr->ResultPtr;
                     }
                     else
                     {
                        zptr = (sptr = PathBuffer+1) + sizeof(PathBuffer)-1;
                        /* the redirection indicator */
                        *sptr++ = '\1';
                     }

                     while (*cptr && sptr < zptr) *sptr++ = *cptr++;
                     if (sptr >= zptr)
                        return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
                     *sptr = '\0';
                     return (PathBuffer+1);
                  }
               }
            }

            if (mrptr->RuleType == MAPURL_RULE_PASS)
            {
               /* scan through the result string */
               if (rptr[0] == '\"' || rptr[0] == '\'')
                  if (isdigit(rptr[1]) && isdigit(rptr[2]) &&
                      isdigit(rptr[3]) && (!rptr[4] || rptr[4] == ' '))
                     StatusCodeMapping = true;
                  else
                     StatusCodeMapping = false;
               else
               if (isdigit(rptr[0]) && isdigit(rptr[1]) &&
                   isdigit(rptr[2]) && (!rptr[3] || rptr[3] == ' '))
                  StatusCodeMapping = true;
               else
                  StatusCodeMapping = false;

               if (StatusCodeMapping)
                  while (*rptr && pptr < zptr) *pptr++ = *rptr++;
            }
            else
               StatusCodeMapping = false;

            if (!StatusCodeMapping)
            {                                  
               if (mrptr->RuleType == MAPURL_RULE_PASS && MapRootPtr)
               {
                  if (WATCHING (rqptr, WATCH_MAPPING))
                     WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                                "ROOT !AZ", MapRootPtr);
                  for (cptr = MapRootPtr;
                       *cptr && pptr < zptr;
                       *pptr++ = *cptr++);
               }
               /* map wildcard asterisks */
               while (*rptr)
               {
                  while (*rptr && *rptr != '*' && pptr < zptr)
                     *pptr++ = *rptr++;
                  if (!*rptr) break;
                  /* wildcard asterisk, substitute from the wildcard buffer */
                  while (*rptr == '*') rptr++;
                  if (*rptr == '\'')
                  {
                     /* specific wildcard component, e.g. "*'1" */
                     rptr++;
                     if (isdigit(*rptr))
                     {
                        idx = *rptr++ - '0';
                        cptr = WildString[idx];
                     }
                     else
                        cptr = "";
                  }
                  else
                  if (widx < REGEX_PMATCH_MAX)
                     cptr = WildString[widx++];
                  else
                     cptr = "";
                  if (mrptr->RuleType == MAPURL_RULE_REDIRECT)
                  {
                     /* URL-encode wildcard portions from the path */
                     while (*cptr && pptr < zptr)
                     {
                        for (eptr = FaoUrlEncodeTable[*(unsigned char*)cptr];
                             *eptr && pptr < zptr;
                             *pptr++ = *eptr++);
                        cptr++;
                     }
                  }
                  else
                     while (*cptr && pptr < zptr) *pptr++ = *cptr++;
                  if (pptr >= zptr) break;
               }
            }
            if (pptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *pptr = '\0';

            if (mrptr->RuleType == MAPURL_RULE_PASS ||
                mrptr->RuleType == MAPURL_RULE_USER)
            {
               /* if status code mapping return leading null char */
               if (StatusCodeMapping)
               {
                  PathBuffer[0] = '\0';
                  return (PathBuffer);
               }

               if (PathBuffer[1] != '/')
               {
                  /* doesn't look like file-system, don't bother translating */
                  return (PathBuffer+1);
               }

               /* convert the URL-style to a VMS-style specification */
               MapOdsUrlToVms (PathBuffer+1, VmsPtr, SizeOfVmsPtr,
                               RmsSubChar, MapEllipsis, PathOds);
               if (WATCH_MODULE_DETAIL)
                  WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                             "PASS !&Z !&Z", PathPtr, VmsPtr);
               return (PathBuffer+1);
            }
            else
            {
               if (WATCH_MODULE_DETAIL)
                  WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                             "REDIRECT !&Z !&Z", PathPtr, VmsPtr);
               /* indicate it's a redirect */
               PathBuffer[1] = '\1';
               return (PathBuffer+1);
            }

         case MAPURL_RULE_SCRIPT :

            /***************/
            /* SCRIPT rule */
            /***************/

            tptr = mrptr->TemplatePtr;
            zptr = (pptr = ScriptPtr) + SizeOfScriptPtr;
            while (*tptr && *tptr != '*' && pptr < zptr) *pptr++ = *tptr++;
            if (pptr > ScriptPtr && pptr[-1] == '/') pptr--;
            if (pptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *pptr = '\0';

            rptr = mrptr->ResultPtr;

            if (*rptr == '(')
            {
               /* run-time, e.g. exec /plbin/@ (ht_exe:pl.exe)/plbin/@ */
               rptr++;
               zptr = (sptr = RunTimePtr) + SizeOfRunTimePtr;
               while (*rptr && *rptr != ')' && sptr < zptr) *sptr++ = *rptr++;
               if (sptr >= zptr)
                  return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
               *sptr = '\0';
               if (*rptr) rptr++;
            }

            zptr = (sptr = Scratch) + sizeof(Scratch);
            if (MapRootPtr)
            {
               if (WATCHING (rqptr, WATCH_MAPPING))
                  WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                             "ROOT !AZ", MapRootPtr);
               for (cptr = MapRootPtr; *cptr && sptr < zptr; *sptr++ = *cptr++);
            }
            while (*rptr &&
                   *rptr != '*' &&
                   !SAME2(rptr,'/*') &&
                   sptr < zptr) *sptr++ = *rptr++;
            if (sptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            *sptr = '\0';

            /* convert the URL-format script to VMS specification */
            MapOdsUrlToVms (Scratch, ScriptVmsPtr, SizeOfScriptVmsPtr,
                            RmsSubChar, MapEllipsis, PathOds);

            /* indicate CGIplus script via leading '+' instead of '/' */
            if (mrptr->IsCgiPlusScript && (!RunTimePtr || !RunTimePtr[0]))
               ScriptPtr[0] = '+';

            /* get wildcard matched second section of path as new path */
            zptr = (sptr = DerivedPathBuffer) + sizeof(DerivedPathBuffer);
            rqptr->MetaConMappedPtr = sptr;
            if (rqpsptr->MapOnce && MapRootPtr)
            {
               if (WATCHING (rqptr, WATCH_MAPPING))
                  WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                             "ROOT !AZ", MapRootPtr);
               for (cptr = MapRootPtr; *cptr && sptr < zptr; *sptr++ = *cptr++);
            }
            while (*rptr && *rptr != '*' && sptr < zptr) *sptr++ = *rptr++;
            cptr = WildString[1];
            while (*cptr && sptr < zptr) *sptr++ = *cptr++;
            if (sptr < zptr) *sptr++ = '\0';
            if (sptr >= zptr)
               return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
            TotalLength = sptr - DerivedPathBuffer;

            if (WATCH_MODULE_DETAIL)
               WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                          "SCRIPT !&Z !&Z !&Z",
                          ScriptPtr, ScriptVmsPtr, DerivedPathBuffer);

            if (!rqpsptr->MapEmpty && !DerivedPathBuffer[0])
               return ("\0\0");

            if (rqpsptr->MapOnce)
            {
               /* convert the URL-style to a VMS-style specification */
               MapOdsUrlToVms (DerivedPathBuffer, VmsPtr, SizeOfVmsPtr,
                               RmsSubChar, MapEllipsis, PathOds);
               if (WATCH_MODULE_DETAIL)
                  WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                             "SCRIPT !&Z !&Z", DerivedPathBuffer, VmsPtr);
               return (DerivedPathBuffer);
            }

            /* restarting at first rule map the path derived from the script */
            MetaConPass++;
            if (rqptr)
            {
               rqptr->MetaConPass = MetaConPass;
               rqptr->MetaConScriptPtr = ScriptPtr;
            }
            *VmsPtr = '\0';
            PathPtr = DerivedPathBuffer;
            RmsSubChar = MAPURL_RMS_SUBSTITUTION_DEFAULT;
            MapEllipsis = rqpsptr->MapEllipsis = false;
            MetaConParseReset (MetaGlobalMappingPtr, true);
            continue;

         case MAPURL_RULE_PROTECT :

            /****************/
            /* PROTECT rule */
            /****************/

            if (MetaConPass == 1)
            {
               /* pass one protects the full path or script component */
               if (mrptr->ResultLength)
               {
                  rqptr->rqAuth.Protect1Ptr =
                     VmGetHeap (rqptr, mrptr->ResultLength+1);
                  rqptr->rqAuth.Protect1Length = mrptr->ResultLength;
                  memcpy (rqptr->rqAuth.Protect1Ptr,
                          mrptr->ResultPtr,
                          mrptr->ResultLength+1);
               }
               else
               {
                  /* empty result string cancels any previous authorization */
                  rqptr->rqAuth.Protect1Ptr = NULL;
                  rqptr->rqAuth.Protect1Length = 0;
               }
            }
            else
            {
               /* pass two protects any path following the script component */
               if (mrptr->ResultLength)
               {
                  rqptr->rqAuth.Protect2Ptr =
                     VmGetHeap (rqptr, mrptr->ResultLength+1);
                  rqptr->rqAuth.Protect2Length = mrptr->ResultLength;
                  memcpy (rqptr->rqAuth.Protect2Ptr,
                          mrptr->ResultPtr,
                          mrptr->ResultLength+1);
               }
               else
               {
                  /* empty result string cancels any previous authorization */
                  rqptr->rqAuth.Protect1Ptr = NULL;
                  rqptr->rqAuth.Protect1Length = 0;
               }
            }

            continue;

         case MAPURL_RULE_SET :

            /************/
            /* SET rule */
            /************/

            /* path SETings have already been applied */
            continue;
         }
      }
      else
      {
         /***************************/
         /* mapping from VMS to URL */
         /***************************/

         /* REVERSE maps a VMS "result" to a "template" :^) */

         cptr = WildString[idx = 1];
         if (MapRootPtr)
         {
            if (WATCHING (rqptr, WATCH_MAPPING))
               WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                          "ROOT !AZ", MapRootPtr);
            while (MapRootLength-- && *cptr) cptr++;
         }
         zptr = (pptr = PathPtr) + SizeOfPathPtr;
         tptr = mrptr->TemplatePtr;
         /* scan through the template string */
         while (*tptr)
         {
            while (*tptr && *tptr != '*' && pptr < zptr) *pptr++ = *tptr++;
            if (!*tptr) break;
            /* a wildcard asterisk, substitute from result path */
            while (*tptr == '*') tptr++;
            if (*cptr) while (*cptr && pptr < zptr) *pptr++ = *cptr++;
            /* three lines fix 05-APR-2018 longstanding bug */
            if (!*tptr) break;
            if (idx < REGEX_PMATCH_MAX) idx++;
            cptr = WildString[idx];
         }
         if (pptr >= zptr)
            return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
         *pptr = '\0';

         return (PathPtr);
      }
   }

   /***********************/
   /* a mapping not found */
   /***********************/

   if (WatchThisOne)
      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "END of mapping rules"); 

   if (MapPathToVms)
      return (MsgFor(rqptr,MSG_MAPPING_DENIED_DEFAULT)-1);
   else
      return (MAPURL_NO_REVERSE_PATH);
}

/*****************************************************************************/
/*
Load mapping rules into meta-config structure.
*/ 
 
int MapUrl_ConfigLoad (META_CONFIG **MetaConPtrPtr)

{
   int  status;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL, "MapUrl_ConfigLoad()");

   status = MetaConLoad (MetaConPtrPtr,
                         v10orPrev10(CONFIG_MAP_FILE_NAME,-1),
                         &MapUrl_ConfigLoadCallBack, true, true);
   if (*MetaConPtrPtr == MetaGlobalMappingPtr)
   {
      /* server startup/reload */
      MetaConStartupReport (MetaGlobalMappingPtr, "MAP");
      if (VMSnok (status)) exit (status);
   }
   return (status);
}

/*****************************************************************************/
/*
Called by MetaConUnload() to free resources allocated during mapping rule
configuration.
*/ 
 
MapUrl_ConfigUnload (META_CONFIG *mcptr)

{
   int  status;
   MAPPING_META  *mmptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL, "MapUrl_ConfigUnload()");

   if (mcptr->MappingMetaPtr)
   {
      if (mcptr->MappingMetaPtr == MappingMetaPtr)
      {
         memset (MappingMetaPtr, 0, sizeof(MAPPING_META));
         MappingMetaPtr = NULL;
      }
      else
         VmFree (mcptr->MappingMetaPtr, FI_LI);
      mcptr->MappingMetaPtr = NULL;
   }
}

/*****************************************************************************/
/*
Called by MetaConUnload() callback for each line's associated data, basically
to check for a regular expression structure and free it if present, then just
dispose of the line data itself.
*/ 
 
MapUrl_ConfigUnloadLineData (void *LineDataPtr)

{
   int  status;
   MAP_RULE_META  *mrptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL,
                 "MapUrl_ConfigUnloadLineData()");

   mrptr = (MAP_RULE_META*)LineDataPtr;
   if (mrptr->RegexPregTemplate.buffer) regfree (&mrptr->RegexPregTemplate);
   VmFree (mrptr, FI_LI);
}

/*****************************************************************************/
/*
For each non-meta-config directive line read by MetaConLoad() this function is
called to parse the line text's contents and to configure the private data
structure associated with each rule.
*/ 

BOOL MapUrl_ConfigLoadCallBack (META_CONFIG *mcptr)

{
   static char  Ods5Disabled [] = "ODS-5 processing CLI disabled",
                Ods5Enabled [] = "ODS-5 processing enabled",
                Ods5NotSupported [] = "ODS-5 not supported",
                ProblemAcceptLang [] =
                   "Set path \'accept=lang\' parameter problem",
                ProblemConditional [] = "Conditional problem",
                ProblemConfused [] = "Cannot understand this one at all",
                ProblemHostNameLookup [] = "Cannot resolve host name !AZ, !&m",
                ProblemNameValue [] = "Set path \'name=value\' pair problem",
                ProblemNotAllowed [] = "Rule cannot be used in [ConfigFile]",
                ProblemOverflow [] = "Storage overflow",
                ProblemProtect [] = "Protect path problem",
                ProblemProxyHeader [] = "Proxy header exceeded maximum",
                ProblemRegex [] = "Regex: !AZ",
                ProblemResultPath [] = "Problem with \'result\' path",
                ProblemResultRequired [] = "Requires a \'result\'",
                ProblemResultStatus [] = "Rule \'result\' cannot be a status",
                ProblemRmsSubstitution [] = "RMS substitution character",
                ProblemSetPath [] = "Set path problem",
                ProblemSpecifiedWildcardCannot [] =
                   "Cannot use \'specified\' wildcards with rule",
                ProblemSpecifiedWildcardMix [] =
                   "Mix of \'specified\' and non-\'specified\' wildcards",
                ProblemSpecifiedWildcardRange [] =
                   "Value of \'specified\' wildcard out-of-range",
                ProblemTemplateRequired [] = "Requires a \'template\'",
                ProblemThrottleValues [] =
                   "Successive dependent throttle values must be larger",
                ProblemWildcardMapping [] = "Wildcard mapping problem",
                ProblemTooManyWildcard [] = "Too many wildcards";

   BOOL  AllowedInConfigFile,
         ConfigProblem,
         IsCgiPlusScript,
         PathSet,
         VirtualServerUnknown;
   int  length, status,
        ConfigFileIndex,
        ResultPathOds,
        RuleType,
        TemplateWildcardCount,
        ResultWildcardCount,
        ResultSpecifiedWildcardCount;
   unsigned short  Length;
   char  *cptr, *sptr, *zptr,
         *ConditionalPtr,
         *ResultPtr,
         *RulePtr,
         *SetPathPtr,
         *TemplatePtr;
   char  Name [256],
         DiskDevice [64+1],
         Value [1024];
   MAPPING_META  *mmptr;
   MAP_RULE_META  *mrptr;
   MAP_SET_META  *mrpsptr;
   METACON_LINE  *mclptr;
   regex_t  RegexPreg;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
   {
      WatchThis (WATCHALL, WATCH_MOD_MAPURL,
                 "MapUrl_ConfigLoadCallBack() !&F !&X",
                 &MapUrl_ConfigLoadCallBack, mcptr);
      if (WATCH_MODULE(WATCH_MOD__DETAIL))
      {
         mclptr = mcptr->ParsePtr;
         WatchDataFormatted ("!&X !UL !UL !UL !UL !&X !&Z !&Z\n",
            mclptr, mclptr->Size, mclptr->Token, mclptr->Number,
            mclptr->Length, mclptr->LineDataPtr, mclptr->TextPtr,
            mclptr->InlineTextPtr);
      }
   }

   /* get a pointer to the current "line" */
   mclptr = mcptr->ParsePtr;

   /* if this is during server startup/reload set the global service pointer */
   if (mcptr == MetaGlobalMappingPtr)
      mmptr = mcptr->MappingMetaPtr = MappingMetaPtr = &MappingMeta;
   else
   /* if a report then conjure one up through quantum mechanics */
   if (!mcptr->MappingMetaPtr)
      mmptr = mcptr->MappingMetaPtr = VmGet (sizeof(MAPPING_META));
   else
      /* not the first time through */
      mmptr = mcptr->MappingMetaPtr;

   if (mclptr->Token == METACON_TOKEN_PRE)
   {
      /******************/
      /* pre-initialize */
      /******************/

      MapUrlPathOds5 = OdsExtended = false;

      return (true);
   }

   if (mclptr->Token == METACON_TOKEN_POST)
   {
      /****************/
      /* post-process */
      /****************/

      /* if global service pointer, during server startup or reload */
      if (mcptr == MetaGlobalMappingPtr)
      {
         /* if no ODS5 paths then EFS can be disabled */
#ifdef ODS_EXTENDED
         if (CliOdsExtendedDisabled)
         {
            OdsExtended = false;
            MetaConReport (mcptr, METACON_REPORT_INFORM, Ods5Disabled);
         }
         else
#endif /* ODS_EXTENDED */
         if (CliOdsExtendedEnabled || MapUrlPathOds5)
         {
#ifdef ODS_EXTENDED
            if (SysInfo.VersionInteger >= 720)
            {
               OdsExtended = true;
               MetaConReport (mcptr, METACON_REPORT_INFORM, Ods5Enabled);
            }
            else
#endif /* ODS_EXTENDED */
            {
               OdsExtended = false;
               MetaConReport (mcptr, METACON_REPORT_INFORM, Ods5NotSupported);
            }
         }
         else
            OdsExtended = false;

         /* reset the username cache */
         MapUserNameCache (NULL, NULL, NULL, NULL);

         /* initialize the throttled paths */
         ThrottleInit ();
      }

      return (true);
   }

   /***********/
   /* process */
   /***********/

   /* if it's not text/inline then mapping's not interested in it */
   if (mclptr->Token != METACON_TOKEN_TEXT && !mclptr->InlineTextPtr)
      return (true);

   if (mclptr->InlineTextPtr)
      cptr = mclptr->InlineTextPtr;
   else
      cptr = mclptr->TextPtr;
   for (sptr = cptr; *sptr; sptr++);

   /* allocate memory for the structure plus the null terminated strings */
   mrptr = (MAP_RULE_META*)VmGet (sizeof(MAP_RULE_META)+(sptr-cptr+1));

   /* copy to storage the configuration string */
   sptr = &mrptr->Storage;
   while (*cptr) *sptr++ = *cptr++;
   *sptr = '\0';

   /* point to the MAP_RULE_META */
   mrpsptr = &mrptr->mpPathSet;

   AllowedInConfigFile = ConfigProblem = IsCgiPlusScript = PathSet = false;

   /********/
   /* rule */
   /********/

   for (cptr = &mrptr->Storage; *cptr && ISLWS(*cptr); cptr++);

   RulePtr = cptr;
   if (StringSliceValue (&cptr) <= 0)
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemConfused);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   IsCgiPlusScript = false;
   if (strsame (RulePtr, "EXEC", -1))
      RuleType = MAPURL_RULE_EXEC;
   else
   if (strsame (RulePtr, "EXEC+", -1))
   {
      RuleType = MAPURL_RULE_EXEC;
      IsCgiPlusScript = true;
   }
   else
   if (strsame (RulePtr, "FAIL", -1))
   {
      RuleType = MAPURL_RULE_FAIL;
      AllowedInConfigFile = true;
   }
   else
   if (strsame (RulePtr, "MAP", -1))
   {
      RuleType = MAPURL_RULE_MAP;
      AllowedInConfigFile = true;
   }
   else
   if (strsame (RulePtr, "PASS", -1))
   {
      RuleType = MAPURL_RULE_PASS;
      AllowedInConfigFile = true;
   }
   else
   if (strsame (RulePtr, "REDIRECT", -1))
   {
      RuleType = MAPURL_RULE_REDIRECT;
      AllowedInConfigFile = true;
   }
   else
   if (strsame (RulePtr, "SCRIPT", -1))
      RuleType = MAPURL_RULE_SCRIPT;
   else
   if (strsame (RulePtr, "SCRIPT+", -1))
   {
      RuleType = MAPURL_RULE_SCRIPT;
      IsCgiPlusScript = true;
   }
   else
   if (strsame (RulePtr, "SET", -1))
      RuleType = MAPURL_RULE_SET;
   else
   if (strsame (RulePtr, "UXEC", -1) ||
       strsame (RulePtr, "UEXEC", -1))
      RuleType = MAPURL_RULE_UXEC;
   else
   if (strsame (RulePtr, "UXEC+", -1) ||
       strsame (RulePtr, "UEXEC+", -1))
   {
      RuleType = MAPURL_RULE_UXEC;
      IsCgiPlusScript = true;
   }
   else
   if (strsame (RulePtr, "USER", -1))
      RuleType = MAPURL_RULE_USER;
   else
   if (strsame (RulePtr, "PROTECT", -1))
   {
      RuleType = MAPURL_RULE_PROTECT;
      AllowedInConfigFile = true;
   }
   else
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemConfused);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   /* ensure a conditional is not mistaken for a missing template */
   if (!*cptr || *cptr == '[' || SAME2(cptr,'![')) 
   {
      /* there must be a "template" to map from */
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemTemplateRequired);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   /* extract template (the path the rule is applied to) */
   TemplatePtr = cptr;
   if (StringSliceValue (&cptr) <= 0)
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemTemplateRequired);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   /* note the position of an empty string in case none of these! */
   ResultPtr = SetPathPtr = ConditionalPtr = RulePtr + strlen(RulePtr);

   if (RuleType != MAPURL_RULE_SET)
   {
      /*********************/
      /* path mapping rule */
      /*********************/

      /* if this doesn't look like a conditional */
      if (*cptr && *cptr != '[' && !SAME2(cptr,'!['))
      {
         ResultPtr = cptr;
         if (StringSliceValue (&cptr) <= 0)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemConfused);
            VmFree (mrptr, FI_LI);
            return (true);
         }
      }
   }

   /* if it doesn't look like a conditional then assume it's SET directives */
   if (*cptr && *cptr != '[' && !SAME2(cptr,'!['))
   {
      /****************/
      /* path SETings */
      /****************/

      while (*cptr)
      {
         /* break if this looks like a conditional */
         if (*cptr == '[' || SAME2(cptr,'![')) break;

         SetPathPtr = cptr;
         if ((length = StringSliceValue (&cptr)) <= 0)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemSetPath);
            VmFree (mrptr, FI_LI);
            return (true);
         }

         if (!MapSetConfig (SetPathPtr, TemplatePtr,
                            mcptr, mrpsptr,
                            &AllowedInConfigFile))
         {
            /* problem with SETing */
            VmFree (mrptr, FI_LI);
            return (true);
         }

         PathSet = true;
      }
   }

   if (RuleType == MAPURL_RULE_SET && !PathSet)
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemSetPath);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   if (RuleType == MAPURL_RULE_PROTECT)
   {
      /****************/
      /* protect rule */
      /****************/

      /*
         PROTECT rules are always added to the mapping database, whether
         correct or not, so that even when incorrect the path is still
         access controlled (and in an incorrect case always denied!)
      */
      sptr = AuthConfigParseProtectRule (NULL, ResultPtr, strlen(ResultPtr));
      if (sptr)
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, sptr);
         ConfigProblem = true;
      }
      AuthProtectRule = true;
   }

   /* check for optional mapping conditional(s) */
   if (*cptr == '[' || SAME2(cptr,'!['))
   {
      /***************/
      /* conditional */
      /***************/

      ConditionalPtr = cptr;
      while (*cptr == '[' || SAME2(cptr,'!['))
      {
         while (*cptr == '[' || *cptr == '!') cptr++;
         while (*cptr && *cptr != ']')
         {
            while (ISLWS(*cptr)) cptr++;
            sptr = cptr;
            while (*cptr && *cptr != ':' && !ISLWS(*cptr) && *cptr != ']')
            {
               if (*cptr == '\\') cptr++;
               *cptr = TOUP(*cptr);
               if (*cptr) cptr++;
            }
            /* basic check of conditional rule */
            if (*sptr == '!') sptr++;
            if ((!SAME2(sptr,'AC') &&
                 !SAME2(sptr,'AL') &&
                 !SAME2(sptr,'AS') &&
                 !SAME2(sptr,'CA') &&
                 !SAME2(sptr,'CK') &&
                 !SAME2(sptr,'DR') &&
                 !SAME2(sptr,'EX') &&
                 !SAME2(sptr,'FO') &&
                 !SAME2(sptr,'HH') &&
                 !SAME2(sptr,'HM') &&
                 !SAME2(sptr,'HO') &&
                 !SAME2(sptr,'ME') &&
                 !SAME2(sptr,'MP') &&
                 !SAME2(sptr,'NO') &&
                 !SAME2(sptr,'PA') &&
                 !SAME2(sptr,'PI') &&
                 !SAME2(sptr,'QS') &&
                 !SAME2(sptr,'RC') &&
                 !SAME2(sptr,'RF') &&
                 !SAME2(sptr,'RQ') &&
                 !SAME2(sptr,'RU') &&
                 !SAME2(sptr,'SC') &&
                 !SAME2(sptr,'SN') &&
                 !SAME2(sptr,'SP') &&
                 !SAME2(sptr,'ST') &&
                 !SAME2(sptr,'UA') &&
                 !SAME2(sptr,'VS') &&
                 !SAME2(sptr,'XF')) ||
                sptr[2] != ':')
            {
               /***********************/
               /* conditional problem */
               /***********************/

               MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemConditional);
               VmFree (mrptr, FI_LI);
               return (true);
            }

            while (*cptr && !ISLWS(*cptr) && *cptr != ']')
            {
               if (*cptr == '\\') cptr++;
               if (*cptr) cptr++;
            }
            while (ISLWS(*cptr)) cptr++;
         }
         if (*cptr == ']') cptr++;
         while (ISLWS(*cptr)) cptr++;
      }
      /* terminate in the white-space following the conditional(s) */
      if (*cptr) *cptr = '\0';
   }

   /**********************/
   /* allowed rule check */
   /**********************/

   if (mclptr->MetaFileType == METACON_TYPE_CONFIG)
   {
      if (!AllowedInConfigFile)
      {
         MetaConReport (mcptr, METACON_REPORT_WARNING, ProblemNotAllowed);
         VmFree (mrptr, FI_LI);
         return (true);
      }
   }

   /***************************/
   /* rule consistency checks */
   /***************************/

   if (mrpsptr->RmsSubChar &&
       !isalnum(mrpsptr->RmsSubChar) && mrpsptr->RmsSubChar != '$' &&
       mrpsptr->RmsSubChar != '-' && mrpsptr->RmsSubChar != '_')
   {
      MetaConReport (mcptr, METACON_REPORT_WARNING, ProblemRmsSubstitution);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   TemplateWildcardCount = 0;
   cptr = TemplatePtr;
   while (*cptr)
   {
      if (*cptr++ != '*') continue;
      TemplateWildcardCount++;
      /* contiguous count as one! */
      while (*cptr == '*') cptr++;
   }

   if (TemplateWildcardCount > REGEX_PMATCH_MAX)
   {
      MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemTooManyWildcard);
      VmFree (mrptr, FI_LI);
      return (true);
   }

   memset (&RegexPreg, 0, sizeof(RegexPreg));
   if (Config.cfMisc.RegexSyntax && *TemplatePtr == REGEX_CHAR)
   {
      cptr = StringRegexCompile (TemplatePtr+1, &RegexPreg);
      if (cptr)
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemRegex, cptr);
         VmFree (mrptr, FI_LI);
         return (true);
      }
   }

   ResultWildcardCount = ResultSpecifiedWildcardCount = 0;
   cptr = ResultPtr;
   while (*cptr)
   {
      if (*cptr++ != '*') continue;
      ResultWildcardCount++;
      /* contiguous count as one! */
      while (*cptr == '*') cptr++;
      if (*cptr != '\'') continue;
      ResultSpecifiedWildcardCount++;
      cptr++;
      if (*cptr < '1' || *cptr > '9')
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR,
                        ProblemSpecifiedWildcardRange);
         VmFree (mrptr, FI_LI);
         return (true);
      }
   }

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL,
                 "!&Z !&Z !&Z !UL !UL !UL",
                 TemplatePtr, ResultPtr, ConditionalPtr,
                 TemplateWildcardCount, ResultWildcardCount,
                 ResultSpecifiedWildcardCount);

   ResultPathOds = 0;

   switch (RuleType)
   {
      case MAPURL_RULE_SCRIPT :

         if (!ResultPtr[0])
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultRequired);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (isdigit(ResultPtr[0]))
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultStatus);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (ResultSpecifiedWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           ProblemSpecifiedWildcardCannot);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (ResultWildcardCount != TemplateWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           ProblemWildcardMapping);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         break;

      case MAPURL_RULE_EXEC :
      case MAPURL_RULE_UXEC :

         if (!ResultPtr[0])
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultRequired);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (isdigit(ResultPtr[0]))
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultStatus);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (ResultSpecifiedWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           ProblemSpecifiedWildcardCannot);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (!ResultWildcardCount ||
             !TemplateWildcardCount ||
             ResultWildcardCount != TemplateWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           ProblemWildcardMapping);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         break;

      case MAPURL_RULE_FAIL :
         break;

      case MAPURL_RULE_PASS :

         if (ResultSpecifiedWildcardCount &&
             ResultSpecifiedWildcardCount != ResultWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_WARNING,
                           ProblemSpecifiedWildcardMix);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (((ResultPtr[0] == '\"' || ResultPtr[0] == '\'') &&
              !isdigit(ResultPtr[0]) &&
              ResultWildcardCount > TemplateWildcardCount) ||
             ((ResultPtr[0] != '\"' && ResultPtr[0] != '\'') &&
              !isdigit(ResultPtr[0]) &&
              ResultWildcardCount > TemplateWildcardCount))
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR,
                           ProblemWildcardMapping);
            VmFree (mrptr, FI_LI);
            return (true);
         }

#ifdef ODS_EXTENDED

         /* determine the on-disk structure */
         zptr = (sptr = DiskDevice) + sizeof(DiskDevice)-1;
         if (ResultPtr[0])
            cptr = ResultPtr;
         else
            cptr = TemplatePtr;
         if (*cptr == '/') cptr++;
         while (*cptr && *cptr != '/' && sptr < zptr) *sptr++ = *cptr++;
         if (sptr < zptr) *sptr++ = ':';
         *sptr = '\0';
         ResultPathOds = OdsVolumeStructure (DiskDevice);

#endif /* ODS_EXTENDED */

         break;

      case MAPURL_RULE_MAP :
      case MAPURL_RULE_REDIRECT :
      case MAPURL_RULE_USER :

         if (!ResultPtr[0])
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultRequired);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (isdigit(ResultPtr[0]))
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemResultStatus);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (ResultSpecifiedWildcardCount &&
             ResultSpecifiedWildcardCount != ResultWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_WARNING,
                           ProblemSpecifiedWildcardMix);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         if (ResultWildcardCount > TemplateWildcardCount)
         {
            MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemWildcardMapping);
            VmFree (mrptr, FI_LI);
            return (true);
         }
         break;

      case MAPURL_RULE_PROTECT :
      case MAPURL_RULE_SET :

         break;

      default :
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemConfused);
         VmFree (mrptr, FI_LI);
         return (true);
   }

   /*****************************/
   /* throttle integrity checks */
   /*****************************/

   if (mrpsptr->ThrottleSet &&
       !mrpsptr->ThrottleNoSet)
   {
      /* throttle=from,to,resume,busy,t/o-resume,t/o-busy */
      if ((mrpsptr->ThrottleTo &&
           mrpsptr->ThrottleTo <= mrpsptr->ThrottleFrom) ||
          (mrpsptr->ThrottleResume && !mrpsptr->ThrottleTo) ||
          (mrpsptr->ThrottleResume &&
           mrpsptr->ThrottleResume <= mrpsptr->ThrottleTo) ||
          (mrpsptr->ThrottleBusy && mrpsptr->ThrottleTo &&
           mrpsptr->ThrottleBusy <= mrpsptr->ThrottleTo) ||
          (mrpsptr->ThrottleBusy && mrpsptr->ThrottleResume &&
           mrpsptr->ThrottleBusy <= mrpsptr->ThrottleResume))
      {
         MetaConReport (mcptr, METACON_REPORT_WARNING, ProblemThrottleValues);
         VmFree (mrptr, FI_LI);
         return (true);
      }
   }

   /************************************/
   /* script=param=(name=value) checks */
   /************************************/

   if (mrpsptr->ScriptParamsPtr)
   {
      /* these will generally end up as DCL symbols for a script */
      cptr = mrpsptr->ScriptParamsPtr;
      for (;;)
      {
         status = StringParseNameValue (&cptr, true,
                                        Name, sizeof(Name),
                                        Value, sizeof(Value));
         if (VMSnok (status)) break;
      }
      if (status != SS$_ENDOFFILE)
      {
         MetaConReport (mcptr, METACON_REPORT_WARNING, ProblemNameValue);
         VmFree (mrptr, FI_LI);
         return (true);
      }
   }

   /*********************************/
   /* add the rule as the line data */
   /*********************************/

   /* set the meta-config data */
   mclptr->LineDataPtr = mrptr;
   mclptr->ConfigProblem = ConfigProblem;

   /* set the rule data */
   mrptr->MetaConNumber = mclptr->Number;
   mrptr->RuleType = RuleType;
   mrptr->TemplatePtr = TemplatePtr;
   mrptr->ResultPtr = ResultPtr;
   mrptr->ResultLength = strlen(ResultPtr);
   mrptr->ConditionalPtr = ConditionalPtr;
   mrptr->PathSet = PathSet;
   mrptr->IsCgiPlusScript = IsCgiPlusScript;

#ifdef ODS_EXTENDED

   if (ResultPathOds)
   {
      /* indicate that this path is located on an ODS-5 volume */
      mrptr->ResultPathOds = ResultPathOds;
      /* indicate that at least one mapped volume is ODS-5 */
      if (ResultPathOds == MAPURL_PATH_ODS_5) MapUrlPathOds5 = true;
   }

#endif /* ODS_EXTENDED */

   if (RegexPreg.buffer)
   {
      /* the template was a regular expression, create a compiled version */
      StringRegexCompile (TemplatePtr+1, &mrptr->RegexPregTemplate);
      /* free the temporary compiled version */
      regfree (&RegexPreg);
   }

   if (mrpsptr->ThrottleSet &&
       !mrpsptr->ThrottleNoSet)
   {
      mrpsptr->ThrottleIndex = mmptr->ThrottleIndex++;
      if (mmptr->ThrottleIndex > mmptr->ThrottleTotal)
         mmptr->ThrottleTotal = mmptr->ThrottleIndex;
   }

   if (mrpsptr->ProxyBindIpAddressLength)
   {
      status = TcpIpStringToAddress (mrpsptr->ProxyBindIpAddressPtr,
                                     &mrpsptr->ProxyBindIpAddress);
      if (VMSnok (status))
         MetaConReport (mcptr, METACON_REPORT_ERROR,
                        "Could not get bind address for !AZ",
                        mrpsptr->ProxyBindIpAddressPtr);
   }

   if (mrpsptr->ProxyChainHostPortLength)
   {
      IPADDRESS_ZERO4 (&mrpsptr->ProxyChainIpAddress) 
      status = NetHostNameLookup (mrpsptr->ProxyChainHostPortPtr,
                                  0, NULL, NULL, NULL,
                                  &mrpsptr->ProxyChainIpAddress,
                                  &mrpsptr->ProxyChainPort);
      if (!mrpsptr->ProxyChainPort)
         mrpsptr->ProxyChainPort = DEFAULT_HTTP_PROXY_PORT;
      if (VMSnok (status))
      {
         MetaConReport (mcptr, METACON_REPORT_ERROR, ProblemHostNameLookup, 
                        mrpsptr->ProxyChainHostPortPtr, status);
         /* make sure the connection can't succeed */
         IPADDRESS_SET_UNUSABLE (&mrpsptr->ProxyChainIpAddress)
         mrpsptr->ProxyChainPort = 0;
      }
   }

   /* note that we've got an extension-method rule */
   if (mrpsptr->MapExtensionMethod) MapUrlExtensionMethod = true;

   if (WATCH_MODULE_DETAIL)
      WatchDataFormatted ("!&X !UL !&Z !&Z (!UL) !&B !&Z\n",
         mrptr, mrptr->RuleType, mrptr->TemplatePtr,
         mrptr->ResultPtr, mrptr->ResultPathOds, mrptr->PathSet,
         mrptr->ConditionalPtr);

   return (true);
}

/*****************************************************************************/
/*
Given the current document's URL path and the specified document's URL path, 
generate a resultant URL path based on whether the specified document's path 
is absolute or relative the the current document's path.  Insufficient space to
contain the result path will not crash the function and the result will be set
to an empty string.
*/ 

int MapUrl_VirtualPath
(
char *CurrentPath,
char *DocumentPath,
char *ResultPath,
int SizeOfResultPath
)
{
   char  *cptr, *dptr, *sptr, *tptr, *zptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL,
                 "MapUrl_VirtualPath() !&Z !&Z !UL",
                 CurrentPath, DocumentPath, SizeOfResultPath);

   if (*(dptr = DocumentPath) == '/' || strstr (DocumentPath, "//")) 
   {
      /*****************/
      /* absolute path */
      /*****************/

      strcpy (ResultPath, dptr);
      zptr = (sptr = ResultPath) + SizeOfResultPath;
      while (*dptr && sptr < zptr) *sptr++ = *dptr++;
      if (sptr >= zptr) return (-1);
      *sptr = '\0';
      return (sptr - ResultPath);
   }

   /* step over any "relative to this directory" syntax ("./") */
   if (dptr[0] == '.' && dptr[1] == '/') dptr += 2;
   if (*dptr != '.')
   {
      /*****************/
      /* inferior path */
      /*****************/

      zptr = (sptr = tptr = ResultPath) + SizeOfResultPath;
      cptr = CurrentPath;
      while (*cptr && sptr < zptr)
      {
         if (*cptr == '/') tptr = sptr+1;
         *sptr++ = *cptr++;
      }
      sptr = tptr;
      while (*dptr && sptr < zptr) *sptr++ = *dptr++;
      if (sptr >= zptr) return (-1);
      *sptr = '\0';
      return (sptr - ResultPath);
   }

   /*****************/
   /* relative path */
   /*****************/

   zptr = (sptr = tptr = ResultPath) + SizeOfResultPath;
   cptr = CurrentPath;
   while (*cptr && sptr < zptr)
   {
      if (*cptr == '/') tptr = sptr;
      *sptr++ = *cptr++;
   }
   sptr = tptr;
   /* loop, stepping back one level for each "../" in the document path */
   while (dptr[0] == '.' && dptr[1] == '.' && dptr[2] == '/')
   {
      dptr += 3;
      if (sptr > ResultPath) sptr--;
      while (sptr > ResultPath && *sptr != '/') sptr--;
   }
   if (sptr > ResultPath && sptr < zptr)
      sptr++;
   else
   if (sptr < zptr)
      *sptr++ = '/';
   while (*dptr && sptr < zptr) *sptr++ = *dptr++;
   if (sptr >= zptr) return (-1);
   *sptr = '\0';
   return (sptr - ResultPath);
}

/*****************************************************************************/
/*
Modify the client's IP address data using the source indicated by the path
setting.  Used to support a transparent load balancer/accelerator/proxy
upstream from the server while retaining the original client address data. 
Return a NULL pointer to indicate success.  Return an error string if it fails
for some reason (e.g. header is not present).  A fail should abort mapping and
report the error.
*/ 
 
char* MapUrl_SetClientAddress (REQUEST_STRUCT *rqptr)

{
   int  ClientAddress;
   char  *cptr, *hptr, *sptr, *zptr;
   char  strbuf [256];
   CLIENT_STRUCT  *clptr;
   IPADDRESS  IpAddress;
   REQUEST_PATHSET  *rqpsptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_SetClientAddress()");

   /* do not reproduce again if multiple client data mappings */
   if (rqptr->ClientPtr->SetClientAddress)
      clptr = rqptr->ClientPtr;
   else
   {
      /* reproduce the existing client data and then use that */
      clptr = (CLIENT_STRUCT*)VmGetHeap (rqptr, sizeof(CLIENT_STRUCT));
      memcpy (clptr, &rqptr->ClientPtr, sizeof(CLIENT_STRUCT));
      rqptr->ClientResetPtr = rqptr->ClientPtr;
      rqptr->ClientPtr = clptr;
   }

   rqpsptr = &rqptr->rqPathSet;

   ClientAddress = rqpsptr->ClientAddress;
   rqpsptr->ClientAddress = 0;

   if (ClientAddress == clptr->SetClientAddress &&
       ClientAddress != MAPURL_CLIENT_LITERAL)
   {
      if (WATCHING (rqptr, WATCH_MAPPING))
         WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                    "CLIENT already set to this!!");
      return (NULL);
   }

   if (ClientAddress == MAPURL_CLIENT_XFORWARDEDFOR ||
       ClientAddress == MAPURL_CLIENT_IF_XFORWARDEDFOR)
   {
      cptr = rqptr->rqHeader.XForwardedForPtr;
      hptr = "X-Forwarded-For:";
   }
   else
   if (ClientAddress == MAPURL_CLIENT_FORWARDED ||
       ClientAddress == MAPURL_CLIENT_IF_FORWARDED)
   {
      cptr = rqptr->rqHeader.ForwardedPtr;
      hptr = "Forwarded:";
   }
   else
   if (ClientAddress == MAPURL_CLIENT_LITERAL)
   {
      /* really just for ease of testing */
      cptr = rqpsptr->ClientAddressLiteralPtr;
      hptr = "X-Literal:";
   }
   else
   {
      ErrorNoticed (rqptr, SS$_BUGCHECK, ErrorSanityCheck, FI_LI);
      return (MsgFor(rqptr,MSG_MAPPING_DENIED_INTERNAL)-1);
   }

   if (!cptr)
   {
      if (WATCHING (rqptr, WATCH_MAPPING))
         WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "CLIENT no !AZ", hptr);
      if (ClientAddress == MAPURL_CLIENT_IF_XFORWARDEDFOR ||
          ClientAddress == MAPURL_CLIENT_IF_FORWARDED) return (NULL);
      return (MsgFor(rqptr,MSG_MAPPING_DENIED_RULE)-1);
   }

   /* parse out the leading (IP address) string representing the client */
   zptr = (sptr = strbuf) + sizeof(strbuf)-1;
   while (ISLWS(*cptr)) cptr++;
   if (MATCH4(cptr,"for=")) cptr += 4;
   if (*cptr == '\"')
      for (cptr++; *cptr && *cptr != '\"' && sptr < zptr; *sptr++ = *cptr++);
   else
      while (*cptr && *cptr != ',' && !ISLWS(*cptr) && sptr < zptr)
         *sptr++ = *cptr++;
   *sptr = '\0';

   if (VMSnok (TcpIpStringToAddress (strbuf, &IpAddress)))
   {
      if (WATCHING (rqptr, WATCH_MAPPING))
         WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                    "CLIENT address error !AZ !AZ", hptr, strbuf);
      return (MsgFor(rqptr,MSG_MAPPING_DENIED_RULE)-1);
   }

   /* when not multiple client data mapping */
   if (!clptr->SetClientAddress)
   {
      /* buffer the TCP connection data (see MapUrl_ResetClientData()) */
      IPADDRESS_COPY (&clptr->UpstreamIpAddress, &clptr->IpAddress);
      strcpy (clptr->UpstreamIpAddressString, &clptr->IpAddressString);
      strcpy (clptr->UpstreamHostName, clptr->Lookup.HostName);
      clptr->UpstreamHostNameLength = clptr->Lookup.HostNameLength;
   }

   /* rewrite the client address data */
   clptr->SetClientAddress = ClientAddress;
   IPADDRESS_COPY (&clptr->IpAddress, &IpAddress);
   /* recreate a "clean" IP address string from the IP address above */
   cptr = TcpIpAddressToString (&IpAddress, 0);
   strcpy (&clptr->IpAddressString, cptr);
   strcpy (clptr->Lookup.HostName, cptr);
   clptr->Lookup.HostNameLength = strlen(cptr);

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "!AZ !&I !AZ !AZ -> !&I !AZ !AZ",
                 hptr, &clptr->UpstreamIpAddress,
                       clptr->UpstreamIpAddressString,
                       clptr->UpstreamHostName,
                       &clptr->IpAddress,
                       &clptr->IpAddressString,
                       clptr->Lookup.HostName);

   if (WATCHING (rqptr, WATCH_MAPPING))
      WatchThis (WATCHITM(rqptr), WATCH_MAPPING, "CLIENT !AZ !AZ", hptr, cptr);

   if (Watch.Category && Watch.Category != WATCH_ONE_SHOT_CAT)
      WatchFilterClientService (rqptr);

   return (NULL);
}

/*****************************************************************************/
/*
Undo the client address mapping performed by MapUrl_SetClientAddress() above by
simply pointing back using the saved original.
*/ 
 
void MapUrl_ResetClientAddress (REQUEST_STRUCT *rqptr)

{
   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_ResetClientAddress()");

   rqptr->ClientPtr = rqptr->ClientResetPtr;
}

/*****************************************************************************/
/*
Guarantee access to certain paths under certain conditions.
*/ 

char* MapUrl_GuaranteeAccess 
(
REQUEST_STRUCT *rqptr,
char *PathBeingMapped
)
{
   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_GuaranteeAccess() !&Z", PathBeingMapped);

   if (AuthPromiscuous ||
       HttpdGblSecPtr->AuthSkelKeyHttpdTickSecond)
   {
      /* guarantee access to the administration menu */
      if (!strsame (PathBeingMapped, HTTPD_ADMIN,
                    sizeof(HTTPD_ADMIN)-1) &&
          !strsame (PathBeingMapped, WASD_ROOT_LOCAL,
                    sizeof(WASD_ROOT_LOCAL)-1) &&
          !strsame (PathBeingMapped, HT_ROOT_LOCAL,
                    sizeof(HT_ROOT_LOCAL)-1))
         return (NULL);

      if (WATCHING (rqptr, WATCH_MAPPING))
          WatchThis (WATCHITM(rqptr), WATCH_MAPPING,
                     "!AZ guarantees access to !AZ",
                     AuthPromiscuous ? "PROMISCUOUS" : "SKELKEY",
                     PathBeingMapped);

      return (PathBeingMapped);
   }

   return (NULL);
}

/*****************************************************************************/
/*
A server administration report on the server's mapping rules. This function
just wraps the reporting function, loading a temporary database if necessary
for reporting from the rule file.
*/

MapUrl_Report
(
REQUEST_STRUCT *rqptr,
BOOL UseServerDatabase,
char *VirtualService
)
{
   int  status;
   META_CONFIG  *mcptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_Report() !UL !&Z",
                 UseServerDatabase, VirtualService);

   if (UseServerDatabase)
   {
      /* use mapping rules already loaded into the server */
      MapUrl_ReportNow (rqptr, true, MetaGlobalMappingPtr, VirtualService);
   }
   else
   {
      /* load temporary set of rules from mapping file */
      status = MapUrl_ConfigLoad (&mcptr);
      if (VMSnok (status))
      {
         /* severe error reported */
         rqptr->rqResponse.HttpStatus = 403;
         ErrorGeneral (rqptr, mcptr->LoadReport.TextPtr, FI_LI);
      }
      else
         MapUrl_ReportNow (rqptr, false, mcptr, VirtualService);
      MetaConUnload (&mcptr, &MapUrl_ConfigUnloadLineData);
   }

   AdminEnd (rqptr);
}

/*****************************************************************************/
/*
Return a report on the HTTPd server's mapping rules ... now!
*/

MapUrl_ReportNow
(
REQUEST_STRUCT *rqptr,
BOOL UseServerDatabase,
META_CONFIG *mcptr,
char *VirtualService
)
{
   static char  BeginRules [] =
"<p><h3><u>Mapping Rules</u></h3>\n";

   static char  BeginTable [] =
"<p><table class=\"lftlft\">\n\
<tr><td><pre>";

   static char  CommentFao [] = "<b>!4ZL</b>  !#* !AZ\n";

   static char  RuleFao [] =
"<b>!4ZL</b>  !#* !&?<strike>\r\r<b>!AZ</b>  !&;AZ!&@!&@!&@!&?</strike>\r\r\n";

   static char  NonRuleFao [] =
"<b>!4ZL</b>  !#* !&?<strike>\r\r<b>!#AZ</b>  !&;AZ!&?</strike>\r\r\n";

   static char  ProblemFao [] = "<b>!4ZL</b>  !#* <strike>!&;AZ</strike>\n";

   static char  RuleVirtualFao [] =
"<b>!4ZL</b>  !#* !&?<strike>\r\r<b>[[!&;AZ]]</b>!&?</strike>\r\r\n";

   static char  RuleImplicitVirtualFao [] =
"<b>0000</b>  <b>[[*:*]]</b>\n";

   static char  VersionFao [] = "<b>!4ZL  [[!AZ]]</b>\n";

   static char  UserMappingFao [] =
"!AZ\
<b>----</b>\
</pre>\n\
</td></tr>\n\
</table>\n\
<p><h3><u>User Mapping Cache</u></h3>\n\
<p><table class=\"lftlft\">\n\
<tr>\
<th></th>\
<th class=\"sbttl\">Name</th>\
<th class=\"sbttl\">Path</th>\
<th class=\"sbttl\">ODS</th>\
<th class=\"sbttl\">Hits</th>\
<th class=\"sbttl\">Last</th>\
<th class=\"sbttl\">Reuse</th>\
</tr>\n\
<tr HEIGHT=5></tr>\n";

   static char  EntryFao [] =
"<tr!AZ>\
<th class=\"targht\">!4ZL</th>\
<td>!AZ&nbsp;&nbsp;</td>\
<td>!AZ&nbsp;&nbsp;</td>\
<td>!AZ&nbsp;&nbsp;</td>\
<td>!UL&nbsp;&nbsp;</td>\
<td><nobr>!20%D&nbsp;&nbsp;</nobr></td>\
<td>!UL</td>\
</tr>\n";

   static char EmptyUserMappingFao [] =
"<tr class=\"hlght\"><th>0000</th><td colspan=\"6\"><i>empty</i></td><tr>\n";

   static char  EndPageFao [] =
"</table>\n\
</div>\n\
</body>\n\
</html>\n";

   BOOL  FinalRule,
         ThisVirtualService;
   int  status,
        EntryCount;
   unsigned long  FaoVector [32];
   unsigned long  *vecptr;
   unsigned short  Length;
   char  *cptr;
   char  Buffer [MAP_BUFFER_SIZE],
         RmsSubChar [2],
         TimeString [32];
   LIST_ENTRY  *leptr;
   MAP_RULE_META  *mrptr;
   MAP_URL_USER_ENTRY  *ucptr;
   METACON_LINE  *mclptr;

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL, "MapUrl_ReportNow() !&B !&Z",
                 UseServerDatabase, VirtualService);

   AdminPageTitle (rqptr, "Path Mapping");
   AdminMetaConReport (rqptr, mcptr, MetaGlobalMappingPtr);
   AdminMetaConSource (rqptr, mcptr, MetaGlobalMappingPtr);

   /*****************/
   /* mapping rules */
   /*****************/

   status = FaolToNet (rqptr, BeginRules, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   AdminVirtualServiceForm (rqptr, ADMIN_REPORT_MAPPING,
                            VirtualService, UseServerDatabase);

   status = FaolToNet (rqptr, BeginTable, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   status = SS$_NORMAL;
   EntryCount = 0;
   FinalRule = false;
   ThisVirtualService = true;

   MetaConParseReset (mcptr, true);
   while (mclptr = MetaConParseRaw (mcptr))
   {
      if (mclptr->WatchInactive)
      {
         if (mclptr->Token == METACON_TOKEN_COMMENT)
            if (SAME4(mclptr->TextPtr, '!#--'))
            {
               vecptr = FaoVector;
               *vecptr++ = mclptr->Number;
               *vecptr++ = (mclptr->MetaFileLevel+
                            mclptr->FlowControlLevel+1) * 3;
               *vecptr++ = mclptr->TextPtr;
               status = FaolToNet (rqptr, CommentFao, &FaoVector);
               if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
            }
         continue;
      }

      if (mclptr->Token == METACON_TOKEN_SERVICE)
      {
         /* if filtering on a virtual service */
         if (VirtualService[0] &&
             !StringMatch (rqptr, VirtualService, mclptr->TextPtr))
         {
            ThisVirtualService = false;
            continue;
         }
         ThisVirtualService = true;
         vecptr = FaoVector;
         *vecptr++ = mclptr->Number;
         *vecptr++ = (mclptr->MetaFileLevel+mclptr->FlowControlLevel) * 3;
         *vecptr++ = mclptr->ConfigProblem || FinalRule;
         *vecptr++ = mclptr->TextPtr;
         *vecptr++ = mclptr->ConfigProblem || FinalRule;
         status = FaolToNet (rqptr, RuleVirtualFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
         continue;
      }
      else
      if (mclptr->Number == 1)
      {
         status = FaolToNet (rqptr, RuleImplicitVirtualFao, NULL);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
      }

      if (!ThisVirtualService) continue;
      EntryCount++;

      if (mclptr->Token != METACON_TOKEN_TEXT)
      {
         for (cptr = mclptr->TextPtr; *cptr && !ISLWS(*cptr); cptr++);
         vecptr = FaoVector;
         *vecptr++ = mclptr->Number;

         if (mclptr->Token == METACON_TOKEN_COMMENT)
         {
            *vecptr++ = (mclptr->MetaFileLevel+
                         mclptr->FlowControlLevel+1) * 3;
            *vecptr++ = mclptr->TextPtr;
            status = FaolToNet (rqptr, CommentFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
            continue;
         }

         if (mclptr->Token == METACON_TOKEN_VERSION)
         {
            *vecptr++ = mclptr->TextPtr;
            status = FaolToNet (rqptr, VersionFao, &FaoVector);
            if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
            continue;
         }

         switch (mclptr->Token)
         {
            case METACON_TOKEN_ELIF :
            case METACON_TOKEN_ELSE :
            case METACON_TOKEN_UNIF :
            case METACON_TOKEN_IFIF :
               if (mclptr->FlowControlLevel)
                  *vecptr++ = (mclptr->MetaFileLevel+
                               mclptr->FlowControlLevel) * 3;
               else
                  *vecptr++ = (mclptr->MetaFileLevel+
                               mclptr->FlowControlLevel+1) * 3;
               break;
            default:
               *vecptr++ = (mclptr->MetaFileLevel+
                            mclptr->FlowControlLevel+1) * 3;
         }
         *vecptr++ = mclptr->ConfigProblem || FinalRule ||
                     (mclptr->InlineTextPtr && !mclptr->LineDataPtr);
         *vecptr++ = cptr - mclptr->TextPtr;
         *vecptr++ = mclptr->TextPtr;
         while (*cptr && ISLWS(*cptr)) cptr++;
         *vecptr++ = cptr;
         *vecptr++ = mclptr->ConfigProblem || FinalRule ||
                     (mclptr->InlineTextPtr && !mclptr->LineDataPtr);
         status = FaolToNet (rqptr, NonRuleFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
         continue;
      }

      vecptr = FaoVector;
      *vecptr++ = mclptr->Number;
      *vecptr++ = (mclptr->MetaFileLevel+
                   mclptr->FlowControlLevel) * 3 + 3;

      if (!(mrptr = mclptr->LineDataPtr))
      {
         *vecptr++ = mclptr->TextPtr;
         status = FaolToNet (rqptr, ProblemFao, &FaoVector);
         if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
         continue;
      }

      if (WATCHMOD (rqptr, WATCH_MODULE_DETAIL))
         WatchDataFormatted ("!&X !UL !&Z !&Z !&Z\n",
            mrptr, mrptr->RuleType, mrptr->TemplatePtr,
            mrptr->ResultPtr, mrptr->ConditionalPtr);

      *vecptr++ = mclptr->ConfigProblem || FinalRule;

      if (mrptr->RuleType == MAPURL_RULE_EXEC)
      {
         if (mrptr->IsCgiPlusScript)
            *vecptr++ = "exec+";
         else
            *vecptr++ = "exec";
      }
      else
      if (mrptr->RuleType == MAPURL_RULE_FAIL)
         *vecptr++ = "fail";
      else
      if (mrptr->RuleType == MAPURL_RULE_MAP)
         *vecptr++ = "map";
      else
      if (mrptr->RuleType == MAPURL_RULE_PASS)
         *vecptr++ = "pass";
      else
      if (mrptr->RuleType == MAPURL_RULE_PROTECT)
         *vecptr++ = "protect";
      else
      if (mrptr->RuleType == MAPURL_RULE_REDIRECT)
         *vecptr++ = "redirect";
      else
      if (mrptr->RuleType == MAPURL_RULE_SCRIPT)
      {
         if (mrptr->IsCgiPlusScript)
            *vecptr++ = "script+";
         else
            *vecptr++ = "script";
      }
      else
      if (mrptr->RuleType == MAPURL_RULE_SET)
         *vecptr++ = "set";
      else
      if (mrptr->RuleType == MAPURL_RULE_UXEC)
         *vecptr++ = "uxec";
      else
      if (mrptr->RuleType == MAPURL_RULE_USER)
         *vecptr++ = "user";
      else
         *vecptr++ = "*ERROR*";

      *vecptr++ = mrptr->TemplatePtr;
      if (isdigit(*mrptr->ResultPtr))
      {
         *vecptr++ = "  &quot;!&;AZ&quot;";
         *vecptr++ = mrptr->ResultPtr;
      }
      else
      if (mrptr->ResultPtr[0])
      {
         *vecptr++ = "  !&;AZ";
         *vecptr++ = mrptr->ResultPtr;
      }
      else
         *vecptr++ = "";

      if (mrptr->PathSet)
      {
         /* just one space, ExplainPathSet() adds it's own leading space */
         *vecptr++ = " !&;AZ";
         *vecptr++ = MapSetExplain (rqptr, mrptr);
      }
      else
         *vecptr++ = "";

      if (mrptr->ConditionalPtr[0])
      {
         *vecptr++ = "  !&;AZ";
         *vecptr++ = mrptr->ConditionalPtr;
      }
      else
         *vecptr++ = "";

      *vecptr++ = mclptr->ConfigProblem || FinalRule;

      status = FaolToNet (rqptr, RuleFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

      /* stop reporting a specific virtual service if terminating rule */
      if (!VirtualService[0]) continue;
      if ((mrptr->RuleType == MAPURL_RULE_FAIL ||
           mrptr->RuleType == MAPURL_RULE_PASS) &&
           SAME2(mrptr->TemplatePtr,'*\0'))
         FinalRule = true;
   }

   vecptr = FaoVector;
   if (EntryCount)
      *vecptr++ = "";
   else
      *vecptr++ = "<i>(none)</i>\n";
   *vecptr++ = MapUrlUserNameCacheEntries;

   status = FaolToNet (rqptr, UserMappingFao, &FaoVector);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   /*****************/
   /* user mappings */
   /*****************/

   EntryCount = 0;

   /* process the cache entry list from most to least recent */
   for (leptr = MapUrlUserNameCacheList.HeadPtr;
        leptr;
        leptr = leptr->NextPtr)
   {
      ucptr = (MAP_URL_USER_ENTRY*)leptr;

      /* if empty name, must have been reset, no point in going any further */
      if (!ucptr->UserName[0]) break;

      vecptr = FaoVector;

      EntryCount++;
      if (EntryCount % 2)
         *vecptr++ = " class=\"hlght\"";
      else
         *vecptr++ = " class=\"hlght\"";
      *vecptr++ = EntryCount;
      *vecptr++ = ucptr->UserName;
      *vecptr++ = ucptr->UserPath;

      if (ucptr->PathOds == MAPURL_PATH_ODS_2)
         *vecptr++ = "ODS-2";
      else
      if (ucptr->PathOds == MAPURL_PATH_ODS_5)
         *vecptr++ = "ODS-5";
      else
         *vecptr++ = "ods-2";

      *vecptr++ = ucptr->HitCount;
      *vecptr++ = &ucptr->LastTime64;
      *vecptr++ = ucptr->ReuseCount;

      status = FaolToNet (rqptr, EntryFao, &FaoVector);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }
   if (!MapUrlUserNameCacheList.HeadPtr)
   {
      status = FaolToNet (rqptr, EmptyUserMappingFao, NULL);
      if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);
   }

   status = FaolToNet (rqptr, EndPageFao, NULL);
   if (VMSnok (status)) ErrorNoticed (rqptr, status, NULL, FI_LI);

   rqptr->rqResponse.PreExpired = PRE_EXPIRE_MAPPING_RULES;
   ResponseHeader200 (rqptr, "text/html", &rqptr->NetWriteBufferDsc);
}

/*****************************************************************************/
/*
Report an individual rule during processing of a mapping rule check.
*/

MapUrl_WatchRule
(
REQUEST_STRUCT *rqptr,
MAP_RULE_META *mrptr,
METACON_LINE *mclptr,
char *PathPtr,
int PathOds,
int Match,
BOOL SetPathIgnore
)
{
   static char  RuleFao [] = "!4ZL !AZ!AZ  !AZ  !8AZ  !AZ  !&@!&@!&@\n";

   BOOL WatchMatch = false;
   int  status;
   unsigned short  Length;
   unsigned long  FaoVector [32];
   unsigned long  *vecptr;
   char  Buffer [8192],
         RmsSubChar [2];

   /*********/
   /* begin */
   /*********/

   if (WATCHMOD (rqptr, WATCH_MOD_MAPURL))
      WatchThis (WATCHITM(rqptr), WATCH_MOD_MAPURL,
                 "MapUrl_WatchRule() !&Z !UL !UL", PathPtr, PathOds, Match);

   vecptr = FaoVector;
   *vecptr++ = mrptr->MetaConNumber;
   *vecptr++ = PathPtr;

   if (PathOds == MAPURL_PATH_ODS_0)
      *vecptr++ = "  NOODS";
   else
   if (PathOds == MAPURL_PATH_ODS_2)
      *vecptr++ = "  ODS=2";
   else
   if (PathOds == MAPURL_PATH_ODS_5)
      *vecptr++ = "  ODS=5";
   else
   if (PathOds == MAPURL_PATH_ODS_ADS)
      *vecptr++ = "  ODS=ADS";
   else
   if (PathOds == MAPURL_PATH_ODS_PWK)
      *vecptr++ = "  ODS=PWK";
   else
   if (PathOds == MAPURL_PATH_ODS_SMB)
      *vecptr++ = "  ODS=SMB";
   else
   if (PathOds == MAPURL_PATH_ODS_SRI)
      *vecptr++ = "  ODS=SRI";
   else
      *vecptr++ = "";
 
   if (Match == MAPURL_REPORT_MATCH_NOT)
      *vecptr++ = "..";
   else
   if (Match == MAPURL_REPORT_MATCH_RULE)
   {
      *vecptr++ = "YN";
      WatchMatch = true;
   }
   else
   if (Match == MAPURL_REPORT_MATCH_RULECOND)
   {
      *vecptr++ = "YY";
      WatchMatch = true;
   }
   else
   if (Match ==  MAPURL_REPORT_MATCH_RULENOCOND)
   {
      *vecptr++ = "Y-";
      WatchMatch = true;
   }
   else
      *vecptr++ = "??";

   if (!WatchMatch && mclptr->WatchInactive) return;

   switch (mrptr->RuleType)
   {
      case MAPURL_RULE_EXEC :
         if (mrptr->IsCgiPlusScript)
            *vecptr++ = "EXEC+";
         else
            *vecptr++ = "EXEC";
         break;
      case MAPURL_RULE_FAIL :
         *vecptr++ = "FAIL";
         break;
      case MAPURL_RULE_MAP :
         *vecptr++ = "MAP";
         break;
      case MAPURL_RULE_PASS :     
         *vecptr++ = "PASS";
         break;
      case MAPURL_RULE_PROTECT :
         *vecptr++ = "PROTECT";
         break;
      case MAPURL_RULE_REDIRECT :
         *vecptr++ = "REDIRECT";
         break;
      case MAPURL_RULE_SCRIPT :
         if (mrptr->IsCgiPlusScript)
            *vecptr++ = "SCRIPT+";
         else
            *vecptr++ = "SCRIPT";
         break;
      case MAPURL_RULE_SET :
         if (SetPathIgnore)
            *vecptr++ = "(SET)";
         else
            *vecptr++ = "SET";
         break;
      case MAPURL_RULE_USER :
         *vecptr++ = "USER";
         break;
      case MAPURL_RULE_UXEC :
         if (mrptr->IsCgiPlusScript)
            *vecptr++ = "UXEC+";
         else
            *vecptr++ = "UXEC";
         break;
      default :
         *vecptr++ = "*ERROR*";
   }

   *vecptr++ = mrptr->TemplatePtr;

   if (isdigit(*mrptr->ResultPtr))
   {
      *vecptr++ = "\"!AZ\"";
      *vecptr++ = mrptr->ResultPtr;
   }
   else
   {
      *vecptr++ = "!AZ";
      *vecptr++ = mrptr->ResultPtr;
   }

   if (mrptr->PathSet)
   {
      *vecptr++ = " !AZ";
      *vecptr++ = MapSetExplain (rqptr, mrptr);
   }
   else
      *vecptr++ = "";

   if (mrptr->ConditionalPtr[0])
   {
      *vecptr++ = " !AZ";
      *vecptr++ = mrptr->ConditionalPtr;
   }
   else
      *vecptr++ = "";

   status = FaolToBuffer (Buffer, sizeof(Buffer), &Length, RuleFao, &FaoVector);
   if (VMSnok (status) || status == SS$_BUFFEROVF)
      ErrorNoticed (rqptr, status, NULL, FI_LI);

   if (WATCHING (rqptr, WATCH_MAPPING))
      WatchData (Buffer, Length); 
}

/*****************************************************************************/
/*
Supplied with an integer in 'ThrottleIndex' representing the element number of
the 'ThrottleArray' path, scan through all the paths in the rule list
noting all SET THROTTLE= paths until the count equals that of the integer
supplied.  This is the rule representing that index.  Return a pointer to the
rule, or NULL.
*/ 
 
MAP_RULE_META* MapUrl_ThrottleRule (int ThrottleIndex)

{
   int  RuleCount;
   MAP_RULE_META  *mrptr;
   MAP_SET_META  *mrpsptr;
   METACON_LINE  *mclptr;

   /*********/
   /* begin */
   /*********/

   if (WATCH_MODULE(WATCH_MOD_MAPURL))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL,
                 "MapUrl_ThrottleRule() !UL", ThrottleIndex);

   RuleCount = 0;
   MetaConParseReset (MetaGlobalMappingPtr, true);
   while (mclptr = MetaConParseRaw (MetaGlobalMappingPtr))
   {
      if (!(mrptr = mclptr->LineDataPtr)) continue;
      mrpsptr = &mrptr->mpPathSet;
      if (!mrpsptr->ThrottleSet) continue;
      if (ThrottleIndex != RuleCount++) continue;
      return (mrptr);
   }
   return (NULL);
}

/*****************************************************************************/
/*
Reload the mapping rules.
*/

MapUrl_ControlReload ()

{
   /*********/
   /* begin */
   /*********/

   if ((WATCH_MODULE(WATCH_MOD_MAPURL)))
      WatchThis (WATCHALL, WATCH_MOD_MAPURL, "MapUrl_ControlReload()");

   MetaConUnload (&MetaGlobalMappingPtr, &MapUrl_ConfigUnloadLineData);

   MapUrl_ConfigLoad (&MetaGlobalMappingPtr);

   /* purge DCL module script task list and script name cache */
   DclLoadedMappingRules();
}

/*****************************************************************************/