]>
Commit | Line | Data |
---|---|---|
da2b3a17 | 1 | |
30a4f2a8 | 2 | /* |
9bc73deb | 3 | * $Id: http.cc,v 1.354 1999/10/04 05:05:15 wessels Exp $ |
30a4f2a8 | 4 | * |
5 | * DEBUG: section 11 Hypertext Transfer Protocol (HTTP) | |
6 | * AUTHOR: Harvest Derived | |
7 | * | |
42c04c16 | 8 | * SQUID Internet Object Cache http://squid.nlanr.net/Squid/ |
e25c139f | 9 | * ---------------------------------------------------------- |
30a4f2a8 | 10 | * |
11 | * Squid is the result of efforts by numerous individuals from the | |
12 | * Internet community. Development is led by Duane Wessels of the | |
e25c139f | 13 | * National Laboratory for Applied Network Research and funded by the |
14 | * National Science Foundation. Squid is Copyrighted (C) 1998 by | |
15 | * Duane Wessels and the University of California San Diego. Please | |
16 | * see the COPYRIGHT file for full details. Squid incorporates | |
17 | * software developed and/or copyrighted by other sources. Please see | |
18 | * the CREDITS file for full details. | |
30a4f2a8 | 19 | * |
20 | * This program is free software; you can redistribute it and/or modify | |
21 | * it under the terms of the GNU General Public License as published by | |
22 | * the Free Software Foundation; either version 2 of the License, or | |
23 | * (at your option) any later version. | |
24 | * | |
25 | * This program is distributed in the hope that it will be useful, | |
26 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
27 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
28 | * GNU General Public License for more details. | |
29 | * | |
30 | * You should have received a copy of the GNU General Public License | |
31 | * along with this program; if not, write to the Free Software | |
cbdec147 | 32 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. |
e25c139f | 33 | * |
30a4f2a8 | 34 | */ |
019dd986 | 35 | |
4a83b852 | 36 | /* |
37 | * Anonymizing patch by lutz@as-node.jena.thur.de | |
de3bdb4c | 38 | * have a look into http-anon.c to get more informations. |
4a83b852 | 39 | */ |
40 | ||
44a47c6e | 41 | #include "squid.h" |
090089c4 | 42 | |
6bf8443a | 43 | static const char *const crlf = "\r\n"; |
4db43fab | 44 | |
9e4ad609 | 45 | static CWCB httpSendComplete; |
54220df8 | 46 | static CWCB httpSendRequestEntry; |
376bb137 | 47 | static CWCB httpSendRequestEntryDone; |
54220df8 | 48 | |
9e4ad609 | 49 | static PF httpReadReply; |
b6a2f15e | 50 | static void httpSendRequest(HttpStateData *); |
9e4ad609 | 51 | static PF httpStateFree; |
52 | static PF httpTimeout; | |
f5b8bbc4 | 53 | static void httpCacheNegatively(StoreEntry *); |
54 | static void httpMakePrivate(StoreEntry *); | |
55 | static void httpMakePublic(StoreEntry *); | |
f8309b15 | 56 | static int httpCachableReply(HttpStateData *); |
f9cece6e | 57 | static void httpMaybeRemovePublic(StoreEntry *, http_status); |
b8d8561b | 58 | |
b177367b | 59 | static void |
59715b38 | 60 | httpStateFree(int fd, void *data) |
f5558c95 | 61 | { |
b177367b | 62 | HttpStateData *httpState = data; |
59715b38 | 63 | #if DELAY_POOLS |
64 | delayClearNoDelay(fd); | |
65 | #endif | |
0d4d4170 | 66 | if (httpState == NULL) |
b177367b | 67 | return; |
f88211e8 | 68 | storeUnlockObject(httpState->entry); |
0d4d4170 | 69 | if (httpState->reply_hdr) { |
db1cd23c | 70 | memFree(httpState->reply_hdr, MEM_8K_BUF); |
0d4d4170 | 71 | httpState->reply_hdr = NULL; |
72 | } | |
30a4f2a8 | 73 | requestUnlink(httpState->request); |
20cc1450 | 74 | requestUnlink(httpState->orig_request); |
7dd44885 | 75 | httpState->request = NULL; |
76 | httpState->orig_request = NULL; | |
77 | cbdataFree(httpState); | |
f5558c95 | 78 | } |
79 | ||
b8d8561b | 80 | int |
75e88d56 | 81 | httpCachable(method_t method) |
090089c4 | 82 | { |
090089c4 | 83 | /* GET and HEAD are cachable. Others are not. */ |
6eb42cae | 84 | if (method != METHOD_GET && method != METHOD_HEAD) |
090089c4 | 85 | return 0; |
090089c4 | 86 | /* else cachable */ |
87 | return 1; | |
88 | } | |
89 | ||
b8d8561b | 90 | static void |
5c5783a2 | 91 | httpTimeout(int fd, void *data) |
090089c4 | 92 | { |
b177367b | 93 | HttpStateData *httpState = data; |
593c9a75 | 94 | StoreEntry *entry = httpState->entry; |
9fb13bb6 | 95 | debug(11, 4) ("httpTimeout: FD %d: '%s'\n", fd, storeUrl(entry)); |
12158bdc | 96 | if (entry->store_status == STORE_PENDING) { |
97 | if (entry->mem_obj->inmem_hi == 0) { | |
98 | fwdFail(httpState->fwd, | |
99 | errorCon(ERR_READ_TIMEOUT, HTTP_GATEWAY_TIMEOUT)); | |
100 | } | |
9b312a19 | 101 | } |
0d4d4170 | 102 | comm_close(fd); |
090089c4 | 103 | } |
104 | ||
30a4f2a8 | 105 | /* This object can be cached for a long time */ |
b8d8561b | 106 | static void |
107 | httpMakePublic(StoreEntry * entry) | |
30a4f2a8 | 108 | { |
d46a87a8 | 109 | if (EBIT_TEST(entry->flags, ENTRY_CACHABLE)) |
30a4f2a8 | 110 | storeSetPublicKey(entry); |
111 | } | |
112 | ||
113 | /* This object should never be cached at all */ | |
b8d8561b | 114 | static void |
115 | httpMakePrivate(StoreEntry * entry) | |
30a4f2a8 | 116 | { |
30a4f2a8 | 117 | storeExpireNow(entry); |
30a4f2a8 | 118 | storeReleaseRequest(entry); /* delete object when not used */ |
f3e570e9 | 119 | /* storeReleaseRequest clears ENTRY_CACHABLE flag */ |
30a4f2a8 | 120 | } |
121 | ||
122 | /* This object may be negatively cached */ | |
b8d8561b | 123 | static void |
124 | httpCacheNegatively(StoreEntry * entry) | |
30a4f2a8 | 125 | { |
79b5cc5f | 126 | storeNegativeCache(entry); |
d46a87a8 | 127 | if (EBIT_TEST(entry->flags, ENTRY_CACHABLE)) |
30a4f2a8 | 128 | storeSetPublicKey(entry); |
30a4f2a8 | 129 | } |
130 | ||
f9cece6e | 131 | static void |
132 | httpMaybeRemovePublic(StoreEntry * e, http_status status) | |
133 | { | |
134 | int remove = 0; | |
f9cece6e | 135 | StoreEntry *pe; |
d46a87a8 | 136 | if (!EBIT_TEST(e->flags, KEY_PRIVATE)) |
9dc1202d | 137 | return; |
f9cece6e | 138 | switch (status) { |
139 | case HTTP_OK: | |
140 | case HTTP_NON_AUTHORITATIVE_INFORMATION: | |
141 | case HTTP_MULTIPLE_CHOICES: | |
142 | case HTTP_MOVED_PERMANENTLY: | |
143 | case HTTP_MOVED_TEMPORARILY: | |
144 | case HTTP_FORBIDDEN: | |
145 | case HTTP_NOT_FOUND: | |
146 | case HTTP_METHOD_NOT_ALLOWED: | |
147 | case HTTP_GONE: | |
148 | remove = 1; | |
149 | break; | |
150 | #if WORK_IN_PROGRESS | |
c8fd0193 | 151 | case HTTP_UNAUTHORIZED: |
152 | remove = 1; | |
f9cece6e | 153 | break; |
154 | #endif | |
155 | default: | |
156 | remove = 0; | |
157 | break; | |
158 | } | |
159 | if (!remove) | |
160 | return; | |
161 | assert(e->mem_obj); | |
08e5d64f | 162 | if ((pe = storeGetPublic(e->mem_obj->url, e->mem_obj->method)) != NULL) { |
0856d155 | 163 | assert(e != pe); |
164 | storeRelease(pe); | |
165 | } | |
166 | if (e->mem_obj->method == METHOD_GET) { | |
167 | /* A fresh GET should eject old HEAD objects */ | |
08e5d64f | 168 | if ((pe = storeGetPublic(e->mem_obj->url, METHOD_HEAD)) != NULL) { |
0856d155 | 169 | assert(e != pe); |
170 | storeRelease(pe); | |
171 | } | |
172 | } | |
f9cece6e | 173 | } |
174 | ||
f8309b15 | 175 | static int |
176 | httpCachableReply(HttpStateData * httpState) | |
c54e9052 | 177 | { |
d8b249ef | 178 | HttpReply *rep = httpState->entry->mem_obj->reply; |
179 | HttpHeader *hdr = &rep->header; | |
180 | const int cc_mask = (rep->cache_control) ? rep->cache_control->mask : 0; | |
c68e9c6b | 181 | const char *v; |
7faf2bdb | 182 | if (EBIT_TEST(cc_mask, CC_PRIVATE)) |
f8309b15 | 183 | return 0; |
7faf2bdb | 184 | if (EBIT_TEST(cc_mask, CC_NO_CACHE)) |
f8309b15 | 185 | return 0; |
ed2f05a1 | 186 | if (EBIT_TEST(cc_mask, CC_NO_STORE)) |
187 | return 0; | |
92695e5e | 188 | if (httpState->request->flags.auth) { |
a6dfe2d9 | 189 | /* |
190 | * Responses to requests with authorization may be cached | |
68aefb7d | 191 | * only if a Cache-Control: public reply header is present. |
a6dfe2d9 | 192 | * RFC 2068, sec 14.9.4 |
193 | */ | |
194 | if (!EBIT_TEST(cc_mask, CC_PUBLIC)) | |
fee0cebb | 195 | return 0; |
a6dfe2d9 | 196 | } |
f8309b15 | 197 | /* |
02fe0fbc | 198 | * We don't properly deal with Vary features yet, so we can't |
199 | * cache these | |
f8309b15 | 200 | */ |
783e4699 | 201 | if (httpHeaderHas(hdr, HDR_VARY)) |
202 | return 0; | |
c68e9c6b | 203 | /* Pragma: no-cache in _replies_ is not documented in HTTP, |
204 | * but servers like "Active Imaging Webcast/2.0" sure do use it */ | |
205 | if (httpHeaderHas(hdr, HDR_PRAGMA)) { | |
206 | String s = httpHeaderGetList(hdr, HDR_PRAGMA); | |
207 | const int no_cache = strListIsMember(&s, "no-cache", ','); | |
208 | stringClean(&s); | |
209 | if (no_cache) | |
210 | return 0; | |
211 | } | |
212 | /* | |
213 | * The "multipart/x-mixed-replace" content type is used for | |
214 | * continuous push replies. These are generally dynamic and | |
215 | * probably should not be cachable | |
216 | */ | |
217 | if ((v = httpHeaderGetStr(hdr, HDR_CONTENT_TYPE))) | |
218 | if (!strncasecmp(v, "multipart/x-mixed-replace", 25)) | |
219 | return 0; | |
cb69b4c7 | 220 | switch (httpState->entry->mem_obj->reply->sline.status) { |
c54e9052 | 221 | /* Responses that are cacheable */ |
19a04dac | 222 | case HTTP_OK: |
223 | case HTTP_NON_AUTHORITATIVE_INFORMATION: | |
224 | case HTTP_MULTIPLE_CHOICES: | |
225 | case HTTP_MOVED_PERMANENTLY: | |
226 | case HTTP_GONE: | |
cfa9f1cb | 227 | /* |
228 | * Don't cache objects that need to be refreshed on next request, | |
229 | * unless we know how to refresh it. | |
230 | */ | |
231 | if (!refreshIsCachable(httpState->entry)) | |
232 | return 0; | |
1294c0fc | 233 | /* don't cache objects from peers w/o LMT, Date, or Expires */ |
cb69b4c7 | 234 | /* check that is it enough to check headers @?@ */ |
d8b249ef | 235 | if (rep->date > -1) |
c54e9052 | 236 | return 1; |
d8b249ef | 237 | else if (rep->last_modified > -1) |
c54e9052 | 238 | return 1; |
1294c0fc | 239 | else if (!httpState->peer) |
c54e9052 | 240 | return 1; |
d8b249ef | 241 | /* @?@ (here and 302): invalid expires header compiles to squid_curtime */ |
242 | else if (rep->expires > -1) | |
c54e9052 | 243 | return 1; |
c54e9052 | 244 | else |
245 | return 0; | |
79d39a72 | 246 | /* NOTREACHED */ |
c54e9052 | 247 | break; |
248 | /* Responses that only are cacheable if the server says so */ | |
19a04dac | 249 | case HTTP_MOVED_TEMPORARILY: |
d8b249ef | 250 | if (rep->expires > -1) |
c54e9052 | 251 | return 1; |
252 | else | |
253 | return 0; | |
79d39a72 | 254 | /* NOTREACHED */ |
c54e9052 | 255 | break; |
256 | /* Errors can be negatively cached */ | |
19a04dac | 257 | case HTTP_NO_CONTENT: |
258 | case HTTP_USE_PROXY: | |
259 | case HTTP_BAD_REQUEST: | |
260 | case HTTP_FORBIDDEN: | |
261 | case HTTP_NOT_FOUND: | |
262 | case HTTP_METHOD_NOT_ALLOWED: | |
263 | case HTTP_REQUEST_URI_TOO_LARGE: | |
264 | case HTTP_INTERNAL_SERVER_ERROR: | |
265 | case HTTP_NOT_IMPLEMENTED: | |
266 | case HTTP_BAD_GATEWAY: | |
267 | case HTTP_SERVICE_UNAVAILABLE: | |
268 | case HTTP_GATEWAY_TIMEOUT: | |
c54e9052 | 269 | return -1; |
79d39a72 | 270 | /* NOTREACHED */ |
c54e9052 | 271 | break; |
272 | /* Some responses can never be cached */ | |
0cdcddb9 | 273 | case HTTP_PARTIAL_CONTENT: /* Not yet supported */ |
19a04dac | 274 | case HTTP_SEE_OTHER: |
275 | case HTTP_NOT_MODIFIED: | |
276 | case HTTP_UNAUTHORIZED: | |
277 | case HTTP_PROXY_AUTHENTICATION_REQUIRED: | |
0cdcddb9 | 278 | case HTTP_INVALID_HEADER: /* Squid header parsing error */ |
c54e9052 | 279 | default: /* Unknown status code */ |
280 | return 0; | |
79d39a72 | 281 | /* NOTREACHED */ |
c54e9052 | 282 | break; |
283 | } | |
79d39a72 | 284 | /* NOTREACHED */ |
c54e9052 | 285 | } |
090089c4 | 286 | |
cb69b4c7 | 287 | /* rewrite this later using new interfaces @?@ */ |
b8d8561b | 288 | void |
0ee4272b | 289 | httpProcessReplyHeader(HttpStateData * httpState, const char *buf, int size) |
f5558c95 | 290 | { |
291 | char *t = NULL; | |
30a4f2a8 | 292 | StoreEntry *entry = httpState->entry; |
d3fb4dea | 293 | int room; |
9bc73deb | 294 | size_t hdr_len; |
cb69b4c7 | 295 | HttpReply *reply = entry->mem_obj->reply; |
9bc73deb | 296 | Ctx ctx; |
b6cfb65c | 297 | debug(11, 3) ("httpProcessReplyHeader: key '%s'\n", |
298 | storeKeyText(entry->key)); | |
e924600d | 299 | if (httpState->reply_hdr == NULL) |
7021844c | 300 | httpState->reply_hdr = memAllocate(MEM_8K_BUF); |
9bc73deb | 301 | assert(httpState->reply_hdr_state == 0); |
302 | hdr_len = strlen(httpState->reply_hdr); | |
303 | room = 8191 - hdr_len; | |
304 | strncat(httpState->reply_hdr, buf, room < size ? room : size); | |
305 | hdr_len += room < size ? room : size; | |
306 | if (hdr_len > 4 && strncmp(httpState->reply_hdr, "HTTP/", 5)) { | |
307 | debug(11, 3) ("httpProcessReplyHeader: Non-HTTP-compliant header: '%s'\n", httpState->reply_hdr); | |
308 | httpState->reply_hdr_state += 2; | |
309 | reply->sline.status = HTTP_INVALID_HEADER; | |
310 | return; | |
f5558c95 | 311 | } |
9bc73deb | 312 | t = httpState->reply_hdr + hdr_len; |
313 | /* headers can be incomplete only if object still arriving */ | |
314 | if (!httpState->eof) { | |
315 | size_t k = headersEnd(httpState->reply_hdr, 8192); | |
316 | if (0 == k) | |
317 | return; /* headers not complete */ | |
318 | t = httpState->reply_hdr + k; | |
319 | } | |
320 | *t = '\0'; | |
321 | httpState->reply_hdr_state++; | |
322 | assert(httpState->reply_hdr_state == 1); | |
323 | ctx = ctx_enter(entry->mem_obj->url); | |
324 | httpState->reply_hdr_state++; | |
325 | debug(11, 9) ("GOT HTTP REPLY HDR:\n---------\n%s\n----------\n", | |
326 | httpState->reply_hdr); | |
327 | /* Parse headers into reply structure */ | |
328 | /* what happens if we fail to parse here? */ | |
329 | httpReplyParse(reply, httpState->reply_hdr, hdr_len); | |
330 | storeTimestampsSet(entry); | |
331 | /* Check if object is cacheable or not based on reply code */ | |
332 | debug(11, 3) ("httpProcessReplyHeader: HTTP CODE: %d\n", reply->sline.status); | |
333 | if (neighbors_do_private_keys) | |
334 | httpMaybeRemovePublic(entry, reply->sline.status); | |
335 | switch (httpCachableReply(httpState)) { | |
336 | case 1: | |
337 | httpMakePublic(entry); | |
338 | break; | |
339 | case 0: | |
340 | httpMakePrivate(entry); | |
341 | break; | |
342 | case -1: | |
343 | httpCacheNegatively(entry); | |
344 | break; | |
345 | default: | |
346 | assert(0); | |
347 | break; | |
348 | } | |
349 | if (reply->cache_control) { | |
350 | if (EBIT_TEST(reply->cache_control->mask, CC_PROXY_REVALIDATE)) | |
351 | EBIT_SET(entry->flags, ENTRY_REVALIDATE); | |
352 | else if (EBIT_TEST(reply->cache_control->mask, CC_MUST_REVALIDATE)) | |
353 | EBIT_SET(entry->flags, ENTRY_REVALIDATE); | |
354 | } | |
355 | if (httpState->flags.keepalive) | |
356 | if (httpState->peer) | |
357 | httpState->peer->stats.n_keepalives_sent++; | |
358 | if (reply->keep_alive) | |
359 | if (httpState->peer) | |
360 | httpState->peer->stats.n_keepalives_recv++; | |
361 | if (reply->date > -1 && !httpState->peer) { | |
362 | int skew = abs(reply->date - squid_curtime); | |
363 | if (skew > 86400) | |
364 | debug(11, 3) ("%s's clock is skewed by %d seconds!\n", | |
365 | httpState->request->host, skew); | |
f5558c95 | 366 | } |
9bc73deb | 367 | ctx_exit(ctx); |
f5558c95 | 368 | } |
369 | ||
603a02fd | 370 | static int |
371 | httpPconnTransferDone(HttpStateData * httpState) | |
372 | { | |
373 | /* return 1 if we got the last of the data on a persistent connection */ | |
374 | MemObject *mem = httpState->entry->mem_obj; | |
cb69b4c7 | 375 | HttpReply *reply = mem->reply; |
35282fbf | 376 | int clen; |
51fdcbd5 | 377 | debug(11, 3) ("httpPconnTransferDone: FD %d\n", httpState->fd); |
978e455f | 378 | /* |
99edd1c3 | 379 | * If we didn't send a keep-alive request header, then this |
978e455f | 380 | * can not be a persistent connection. |
381 | */ | |
b515fc11 | 382 | if (!httpState->flags.keepalive) |
603a02fd | 383 | return 0; |
9f5a2895 | 384 | /* |
385 | * What does the reply have to say about keep-alive? | |
386 | */ | |
b6a2f15e | 387 | /* |
388 | * XXX BUG? | |
389 | * If the origin server (HTTP/1.0) does not send a keep-alive | |
390 | * header, but keeps the connection open anyway, what happens? | |
391 | * We'll return here and http.c waits for an EOF before changing | |
392 | * store_status to STORE_OK. Combine this with ENTRY_FWD_HDR_WAIT | |
393 | * and an error status code, and we might have to wait until | |
394 | * the server times out the socket. | |
395 | */ | |
9f5a2895 | 396 | if (!reply->keep_alive) |
397 | return 0; | |
51fdcbd5 | 398 | debug(11, 5) ("httpPconnTransferDone: content_length=%d\n", |
d8b249ef | 399 | reply->content_length); |
35282fbf | 400 | /* If we haven't seen the end of reply headers, we are not done */ |
978e455f | 401 | if (httpState->reply_hdr_state < 2) |
402 | return 0; | |
35282fbf | 403 | clen = httpReplyBodySize(httpState->request->method, reply); |
404 | /* If there is no message body, we can be persistent */ | |
405 | if (0 == clen) | |
a3c60429 | 406 | return 1; |
35282fbf | 407 | /* If the body size is unknown we must wait for EOF */ |
408 | if (clen < 0) | |
603a02fd | 409 | return 0; |
35282fbf | 410 | /* If the body size is known, we must wait until we've gotten all of it. */ |
411 | if (mem->inmem_hi < reply->content_length + reply->hdr_sz) | |
603a02fd | 412 | return 0; |
35282fbf | 413 | /* We got it all */ |
414 | return 1; | |
603a02fd | 415 | } |
090089c4 | 416 | |
417 | /* This will be called when data is ready to be read from fd. Read until | |
418 | * error or connection closed. */ | |
f5558c95 | 419 | /* XXX this function is too long! */ |
b8d8561b | 420 | static void |
b177367b | 421 | httpReadReply(int fd, void *data) |
090089c4 | 422 | { |
b177367b | 423 | HttpStateData *httpState = data; |
95d659f0 | 424 | LOCAL_ARRAY(char, buf, SQUID_TCP_SO_RCVBUF); |
bfcaf585 | 425 | StoreEntry *entry = httpState->entry; |
603a02fd | 426 | const request_t *request = httpState->request; |
090089c4 | 427 | int len; |
30a4f2a8 | 428 | int bin; |
090089c4 | 429 | int clen; |
447e176b | 430 | size_t read_sz; |
431 | #if DELAY_POOLS | |
59715b38 | 432 | delay_id delay_id; |
433 | ||
434 | /* special "if" only for http (for nodelay proxy conns) */ | |
435 | if (delayIsNoDelay(fd)) | |
436 | delay_id = 0; | |
437 | else | |
438 | delay_id = delayMostBytesAllowed(entry->mem_obj); | |
447e176b | 439 | #endif |
e92e4e44 | 440 | if (EBIT_TEST(entry->flags, ENTRY_ABORTED)) { |
441 | comm_close(fd); | |
442 | return; | |
443 | } | |
234967c9 | 444 | /* check if we want to defer reading */ |
1513873c | 445 | errno = 0; |
447e176b | 446 | read_sz = SQUID_TCP_SO_RCVBUF; |
447 | #if DELAY_POOLS | |
56e64999 | 448 | read_sz = delayBytesWanted(delay_id, 1, read_sz); |
447e176b | 449 | #endif |
886f2785 | 450 | Counter.syscalls.sock.reads++; |
447e176b | 451 | len = read(fd, buf, read_sz); |
a3d5953d | 452 | debug(11, 5) ("httpReadReply: FD %d: len %d.\n", fd, len); |
30a4f2a8 | 453 | if (len > 0) { |
ee1679df | 454 | fd_bytes(fd, len, FD_READ); |
447e176b | 455 | #if DELAY_POOLS |
456 | delayBytesIn(delay_id, len); | |
457 | #endif | |
a0f32775 | 458 | kb_incr(&Counter.server.all.kbytes_in, len); |
459 | kb_incr(&Counter.server.http.kbytes_in, len); | |
4f92c80c | 460 | commSetTimeout(fd, Config.Timeout.read, NULL, NULL); |
4a63c85f | 461 | IOStats.Http.reads++; |
30a4f2a8 | 462 | for (clen = len - 1, bin = 0; clen; bin++) |
463 | clen >>= 1; | |
464 | IOStats.Http.read_hist[bin]++; | |
465 | } | |
5ede6c8f | 466 | if (!httpState->reply_hdr && len > 0) { |
467 | /* Skip whitespace */ | |
b6a2f15e | 468 | while (len > 0 && xisspace(*buf)) |
5ede6c8f | 469 | xmemmove(buf, buf + 1, len--); |
470 | if (len == 0) { | |
471 | /* Continue to read... */ | |
472 | commSetSelect(fd, COMM_SELECT_READ, httpReadReply, httpState, 0); | |
473 | return; | |
474 | } | |
475 | } | |
ba718c8f | 476 | if (len < 0) { |
55cb44f1 | 477 | debug(50, 2) ("httpReadReply: FD %d: read failure: %s.\n", |
478 | fd, xstrerror()); | |
b224ea98 | 479 | if (ignoreErrno(errno)) { |
9b312a19 | 480 | commSetSelect(fd, COMM_SELECT_READ, httpReadReply, httpState, 0); |
910169e5 | 481 | } else if (entry->mem_obj->inmem_hi == 0) { |
ec250dfd | 482 | ErrorState *err; |
483 | err = errorCon(ERR_READ_ERROR, HTTP_INTERNAL_SERVER_ERROR); | |
484 | err->xerrno = errno; | |
485 | fwdFail(httpState->fwd, err); | |
1afe05c5 | 486 | comm_close(fd); |
090089c4 | 487 | } else { |
0d4d4170 | 488 | comm_close(fd); |
090089c4 | 489 | } |
8350fe9b | 490 | } else if (len == 0 && entry->mem_obj->inmem_hi == 0) { |
ec250dfd | 491 | ErrorState *err; |
492 | err = errorCon(ERR_ZERO_SIZE_OBJECT, HTTP_SERVICE_UNAVAILABLE); | |
493 | err->xerrno = errno; | |
494 | fwdFail(httpState->fwd, err); | |
910169e5 | 495 | httpState->eof = 1; |
496 | comm_close(fd); | |
090089c4 | 497 | } else if (len == 0) { |
498 | /* Connection closed; retrieval done. */ | |
f86a6a46 | 499 | httpState->eof = 1; |
d1a43e28 | 500 | if (httpState->reply_hdr_state < 2) |
b34ed725 | 501 | /* |
502 | * Yes Henrik, there is a point to doing this. When we | |
503 | * called httpProcessReplyHeader() before, we didn't find | |
504 | * the end of headers, but now we are definately at EOF, so | |
505 | * we want to process the reply headers. | |
506 | */ | |
d1a43e28 | 507 | httpProcessReplyHeader(httpState, buf, len); |
db1cd23c | 508 | fwdComplete(httpState->fwd); |
0d4d4170 | 509 | comm_close(fd); |
090089c4 | 510 | } else { |
7e3e1d01 | 511 | if (httpState->reply_hdr_state < 2) { |
30a4f2a8 | 512 | httpProcessReplyHeader(httpState, buf, len); |
db1cd23c | 513 | if (httpState->reply_hdr_state == 2) { |
514 | http_status s = entry->mem_obj->reply->sline.status; | |
b6a2f15e | 515 | /* |
516 | * If its not a reply that we will re-forward, then | |
517 | * allow the client to get it. | |
db1cd23c | 518 | */ |
b6a2f15e | 519 | if (!fwdReforwardableStatus(s)) |
db1cd23c | 520 | EBIT_CLR(entry->flags, ENTRY_FWD_HDR_WAIT); |
521 | } | |
7e3e1d01 | 522 | } |
620da955 | 523 | storeAppend(entry, buf, len); |
b7fe0ab0 | 524 | if (EBIT_TEST(entry->flags, ENTRY_ABORTED)) { |
9d66d521 | 525 | /* |
526 | * the above storeAppend() call could ABORT this entry, | |
527 | * in that case, the server FD should already be closed. | |
528 | * there's nothing for us to do. | |
529 | */ | |
530 | (void) 0; | |
d9627979 | 531 | } else if (httpPconnTransferDone(httpState)) { |
5b29969a | 532 | /* yes we have to clear all these! */ |
8796b9e9 | 533 | commSetDefer(fd, NULL, NULL); |
5b29969a | 534 | commSetTimeout(fd, -1, NULL, NULL); |
535 | commSetSelect(fd, COMM_SELECT_READ, NULL, NULL, 0); | |
ec603b25 | 536 | #if DELAY_POOLS |
537 | delayClearNoDelay(fd); | |
538 | #endif | |
603a02fd | 539 | comm_remove_close_handler(fd, httpStateFree, httpState); |
db1cd23c | 540 | fwdUnregister(fd, httpState->fwd); |
8796b9e9 | 541 | pconnPush(fd, request->host, request->port); |
8a28f65f | 542 | fwdComplete(httpState->fwd); |
603a02fd | 543 | httpState->fd = -1; |
59715b38 | 544 | httpStateFree(fd, httpState); |
603a02fd | 545 | } else { |
9f5a2895 | 546 | /* Wait for EOF condition */ |
603a02fd | 547 | commSetSelect(fd, COMM_SELECT_READ, httpReadReply, httpState, 0); |
548 | } | |
090089c4 | 549 | } |
550 | } | |
551 | ||
552 | /* This will be called when request write is complete. Schedule read of | |
553 | * reply. */ | |
b8d8561b | 554 | static void |
79a15e0a | 555 | httpSendComplete(int fd, char *bufnotused, size_t size, int errflag, void *data) |
090089c4 | 556 | { |
30a4f2a8 | 557 | HttpStateData *httpState = data; |
9b312a19 | 558 | StoreEntry *entry = httpState->entry; |
559 | ErrorState *err; | |
a3d5953d | 560 | debug(11, 5) ("httpSendComplete: FD %d: size %d: errflag %d.\n", |
090089c4 | 561 | fd, size, errflag); |
bc87dc25 | 562 | #if URL_CHECKSUM_DEBUG |
563 | assert(entry->mem_obj->chksum == url_checksum(entry->mem_obj->url)); | |
564 | #endif | |
ee1679df | 565 | if (size > 0) { |
566 | fd_bytes(fd, size, FD_WRITE); | |
a0f32775 | 567 | kb_incr(&Counter.server.all.kbytes_out, size); |
399e85ea | 568 | kb_incr(&Counter.server.http.kbytes_out, size); |
ee1679df | 569 | } |
ea3a2a69 | 570 | if (errflag == COMM_ERR_CLOSING) |
571 | return; | |
090089c4 | 572 | if (errflag) { |
fe40a877 | 573 | err = errorCon(ERR_WRITE_ERROR, HTTP_INTERNAL_SERVER_ERROR); |
c45ed9ad | 574 | err->xerrno = errno; |
79a15e0a | 575 | err->request = requestLink(httpState->orig_request); |
9b312a19 | 576 | errorAppendEntry(entry, err); |
0d4d4170 | 577 | comm_close(fd); |
090089c4 | 578 | return; |
579 | } else { | |
580 | /* Schedule read reply. */ | |
b6a2f15e | 581 | commSetSelect(fd, COMM_SELECT_READ, httpReadReply, httpState, 0); |
582 | /* | |
583 | * Set the read timeout here because it hasn't been set yet. | |
584 | * We only set the read timeout after the request has been | |
585 | * fully written to the server-side. If we start the timeout | |
586 | * after connection establishment, then we are likely to hit | |
587 | * the timeout for POST/PUT requests that have very large | |
588 | * request bodies. | |
589 | */ | |
590 | commSetTimeout(fd, Config.Timeout.read, httpTimeout, httpState); | |
41462d93 | 591 | commSetDefer(fd, fwdCheckDeferRead, entry); |
090089c4 | 592 | } |
593 | } | |
594 | ||
99edd1c3 | 595 | /* |
596 | * build request headers and append them to a given MemBuf | |
597 | * used by httpBuildRequestPrefix() | |
598 | * note: calls httpHeaderInit(), the caller is responsible for Clean()-ing | |
599 | */ | |
e1e72f06 | 600 | void |
6bf8443a | 601 | httpBuildRequestHeader(request_t * request, |
602 | request_t * orig_request, | |
603 | StoreEntry * entry, | |
5999b776 | 604 | HttpHeader * hdr_out, |
603a02fd | 605 | int cfd, |
b515fc11 | 606 | http_state_flags flags) |
6bf8443a | 607 | { |
99edd1c3 | 608 | /* building buffer for complex strings */ |
5999b776 | 609 | #define BBUF_SZ (MAX_URL+32) |
99edd1c3 | 610 | LOCAL_ARRAY(char, bbuf, BBUF_SZ); |
611 | String strConnection = StringNull; | |
612 | const HttpHeader *hdr_in = &orig_request->header; | |
5d679edb | 613 | int we_do_ranges; |
99edd1c3 | 614 | const HttpHeaderEntry *e; |
615 | HttpHeaderPos pos = HttpHeaderInitPos; | |
2246b732 | 616 | httpHeaderInit(hdr_out, hoRequest); |
99edd1c3 | 617 | /* append our IMS header */ |
9bc73deb | 618 | if (request->lastmod > -1 && request->method == METHOD_GET) |
619 | httpHeaderPutTime(hdr_out, HDR_IF_MODIFIED_SINCE, request->lastmod); | |
99edd1c3 | 620 | |
5d679edb | 621 | /* decide if we want to do Ranges ourselves |
622 | * (and fetch the whole object now) | |
623 | * We want to handle Ranges ourselves iff | |
624 | * - we can actually parse client Range specs | |
625 | * - the specs are expected to be simple enough (e.g. no out-of-order ranges) | |
626 | * - reply will be cachable | |
db1cd23c | 627 | * (If the reply will be uncachable we have to throw it away after |
5d679edb | 628 | * serving this request, so it is better to forward ranges to |
629 | * the server and fetch only the requested content) | |
630 | */ | |
631 | we_do_ranges = | |
c68e9c6b | 632 | orig_request->range && orig_request->flags.cachable && !httpHdrRangeWillBeComplex(orig_request->range) && (Config.rangeOffsetLimit == -1 || httpHdrRangeFirstOffset(orig_request->range) <= Config.rangeOffsetLimit); |
5d679edb | 633 | debug(11, 8) ("httpBuildRequestHeader: range specs: %p, cachable: %d; we_do_ranges: %d\n", |
634 | orig_request->range, orig_request->flags.cachable, we_do_ranges); | |
137ee196 | 635 | |
99edd1c3 | 636 | strConnection = httpHeaderGetList(hdr_in, HDR_CONNECTION); |
637 | while ((e = httpHeaderGetEntry(hdr_in, &pos))) { | |
638 | debug(11, 5) ("httpBuildRequestHeader: %s: %s\n", | |
639 | strBuf(e->name), strBuf(e->value)); | |
640 | if (!httpRequestHdrAllowed(e, &strConnection)) | |
6bf8443a | 641 | continue; |
99edd1c3 | 642 | switch (e->id) { |
643 | case HDR_PROXY_AUTHORIZATION: | |
c68e9c6b | 644 | /* If we're not doing proxy auth, then it must be passed on */ |
92695e5e | 645 | if (!request->flags.used_proxy_auth) |
99edd1c3 | 646 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); |
647 | break; | |
c68e9c6b | 648 | case HDR_AUTHORIZATION: |
649 | /* If we're not doing www auth, then it must be passed on */ | |
650 | if (!request->flags.accelerated || !request->flags.used_proxy_auth) | |
651 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); | |
652 | else | |
653 | request->flags.auth = 0; /* We have used the authentication */ | |
654 | break; | |
99edd1c3 | 655 | case HDR_HOST: |
77ed547a | 656 | /* Don't use client's Host: header for redirected requests */ |
c68e9c6b | 657 | if (!request->flags.redirected || !Config.onoff.redir_rewrites_host) |
99edd1c3 | 658 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); |
659 | break; | |
660 | case HDR_IF_MODIFIED_SINCE: | |
661 | /* append unless we added our own; | |
662 | * note: at most one client's ims header can pass through */ | |
663 | if (!httpHeaderHas(hdr_out, HDR_IF_MODIFIED_SINCE)) | |
664 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); | |
665 | break; | |
666 | case HDR_MAX_FORWARDS: | |
b3b64e58 | 667 | if (orig_request->method == METHOD_TRACE) { |
99edd1c3 | 668 | /* sacrificing efficiency over clarity, etc. */ |
669 | const int hops = httpHeaderGetInt(hdr_in, HDR_MAX_FORWARDS); | |
670 | if (hops > 0) | |
5999b776 | 671 | httpHeaderPutInt(hdr_out, HDR_MAX_FORWARDS, hops - 1); |
b3b64e58 | 672 | } |
99edd1c3 | 673 | break; |
137ee196 | 674 | case HDR_RANGE: |
a9771e51 | 675 | case HDR_IF_RANGE: |
5d679edb | 676 | case HDR_REQUEST_RANGE: |
677 | if (!we_do_ranges) | |
137ee196 | 678 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); |
679 | break; | |
99edd1c3 | 680 | case HDR_PROXY_CONNECTION: |
681 | case HDR_CONNECTION: | |
682 | case HDR_VIA: | |
683 | case HDR_X_FORWARDED_FOR: | |
684 | case HDR_CACHE_CONTROL: | |
685 | /* append these after the loop if needed */ | |
686 | break; | |
687 | default: | |
688 | /* pass on all other header fields */ | |
689 | httpHeaderAddEntry(hdr_out, httpHeaderEntryClone(e)); | |
66f7337b | 690 | } |
88738790 | 691 | } |
99edd1c3 | 692 | |
693 | /* append fake user agent if configured and | |
694 | * the real one is not supplied by the client */ | |
695 | if (Config.fake_ua && !httpHeaderHas(hdr_out, HDR_USER_AGENT)) | |
696 | httpHeaderPutStr(hdr_out, HDR_USER_AGENT, Config.fake_ua); | |
697 | ||
698 | /* append Via */ | |
699 | { | |
700 | String strVia = httpHeaderGetList(hdr_in, HDR_VIA); | |
701 | snprintf(bbuf, BBUF_SZ, "%3.1f %s", orig_request->http_ver, ThisCache); | |
702 | strListAdd(&strVia, bbuf, ','); | |
703 | httpHeaderPutStr(hdr_out, HDR_VIA, strBuf(strVia)); | |
704 | stringClean(&strVia); | |
6bf8443a | 705 | } |
99edd1c3 | 706 | /* append X-Forwarded-For */ |
707 | { | |
708 | String strFwd = httpHeaderGetList(hdr_in, HDR_X_FORWARDED_FOR); | |
709 | strListAdd(&strFwd, (cfd < 0 ? "unknown" : fd_table[cfd].ipaddr), ','); | |
710 | httpHeaderPutStr(hdr_out, HDR_X_FORWARDED_FOR, strBuf(strFwd)); | |
711 | stringClean(&strFwd); | |
712 | } | |
713 | /* append Host if not there already */ | |
714 | if (!httpHeaderHas(hdr_out, HDR_HOST)) { | |
715 | /* use port# only if not default */ | |
716 | if (orig_request->port == urlDefaultPort(orig_request->protocol)) { | |
717 | httpHeaderPutStr(hdr_out, HDR_HOST, orig_request->host); | |
718 | } else { | |
2246b732 | 719 | httpHeaderPutStrf(hdr_out, HDR_HOST, "%s:%d", |
99edd1c3 | 720 | orig_request->host, (int) orig_request->port); |
99edd1c3 | 721 | } |
6bf8443a | 722 | } |
c68e9c6b | 723 | /* append Authorization if known in URL, not in header and going direct */ |
724 | if (!httpHeaderHas(hdr_out, HDR_AUTHORIZATION)) { | |
725 | if (!request->flags.proxying && *request->login) { | |
726 | httpHeaderPutStrf(hdr_out, HDR_AUTHORIZATION, "Basic %s", | |
727 | base64_encode(request->login)); | |
728 | } | |
729 | } | |
730 | /* append Proxy-Authorization if configured for peer, and proxying */ | |
731 | if (!httpHeaderHas(hdr_out, HDR_PROXY_AUTHORIZATION)) { | |
1f38f50a | 732 | if (request->flags.proxying && orig_request->peer_login) { |
c68e9c6b | 733 | httpHeaderPutStrf(hdr_out, HDR_PROXY_AUTHORIZATION, "Basic %s", |
1f38f50a | 734 | base64_encode(orig_request->peer_login)); |
c68e9c6b | 735 | } |
736 | } | |
99edd1c3 | 737 | /* append Cache-Control, add max-age if not there already */ |
738 | { | |
739 | HttpHdrCc *cc = httpHeaderGetCc(hdr_in); | |
740 | if (!cc) | |
741 | cc = httpHdrCcCreate(); | |
742 | if (!EBIT_TEST(cc->mask, CC_MAX_AGE)) { | |
9b5d1d21 | 743 | const char *url = entry ? storeUrl(entry) : urlCanonical(orig_request); |
99edd1c3 | 744 | httpHdrCcSetMaxAge(cc, getMaxAge(url)); |
745 | if (strLen(request->urlpath)) | |
746 | assert(strstr(url, strBuf(request->urlpath))); | |
747 | } | |
db1cd23c | 748 | if (flags.only_if_cached) |
749 | EBIT_SET(cc->mask, CC_ONLY_IF_CACHED); | |
99edd1c3 | 750 | httpHeaderPutCc(hdr_out, cc); |
751 | httpHdrCcDestroy(cc); | |
6bf8443a | 752 | } |
99edd1c3 | 753 | /* maybe append Connection: keep-alive */ |
b515fc11 | 754 | if (flags.keepalive) { |
755 | if (flags.proxying) { | |
99edd1c3 | 756 | httpHeaderPutStr(hdr_out, HDR_PROXY_CONNECTION, "keep-alive"); |
603a02fd | 757 | } else { |
99edd1c3 | 758 | httpHeaderPutStr(hdr_out, HDR_CONNECTION, "keep-alive"); |
603a02fd | 759 | } |
603a02fd | 760 | } |
99edd1c3 | 761 | stringClean(&strConnection); |
762 | } | |
763 | ||
764 | /* build request prefix and append it to a given MemBuf; | |
765 | * return the length of the prefix */ | |
9bc73deb | 766 | mb_size_t |
99edd1c3 | 767 | httpBuildRequestPrefix(request_t * request, |
768 | request_t * orig_request, | |
769 | StoreEntry * entry, | |
5999b776 | 770 | MemBuf * mb, |
99edd1c3 | 771 | int cfd, |
b515fc11 | 772 | http_state_flags flags) |
99edd1c3 | 773 | { |
774 | const int offset = mb->size; | |
775 | memBufPrintf(mb, "%s %s HTTP/1.0\r\n", | |
776 | RequestMethodStr[request->method], | |
777 | strLen(request->urlpath) ? strBuf(request->urlpath) : "/"); | |
778 | /* build and pack headers */ | |
779 | { | |
780 | HttpHeader hdr; | |
781 | Packer p; | |
782 | httpBuildRequestHeader(request, orig_request, entry, &hdr, cfd, flags); | |
783 | packerToMemInit(&p, mb); | |
784 | httpHeaderPackInto(&hdr, &p); | |
785 | httpHeaderClean(&hdr); | |
786 | packerClean(&p); | |
9d9d144b | 787 | } |
99edd1c3 | 788 | /* append header terminator */ |
b8890359 | 789 | memBufAppend(mb, crlf, 2); |
99edd1c3 | 790 | return mb->size - offset; |
6bf8443a | 791 | } |
090089c4 | 792 | /* This will be called when connect completes. Write request. */ |
b8d8561b | 793 | static void |
b6a2f15e | 794 | httpSendRequest(HttpStateData * httpState) |
090089c4 | 795 | { |
99edd1c3 | 796 | MemBuf mb; |
30a4f2a8 | 797 | request_t *req = httpState->request; |
620da955 | 798 | StoreEntry *entry = httpState->entry; |
2a26c096 | 799 | int cfd; |
1294c0fc | 800 | peer *p = httpState->peer; |
901e234d | 801 | CWCB *sendHeaderDone; |
090089c4 | 802 | |
b6a2f15e | 803 | debug(11, 5) ("httpSendRequest: FD %d: httpState %p.\n", httpState->fd, httpState); |
090089c4 | 804 | |
1f38f50a | 805 | if (httpState->orig_request->content_length > 0) |
7db8b16d | 806 | sendHeaderDone = httpSendRequestEntry; |
807 | else | |
808 | sendHeaderDone = httpSendComplete; | |
54220df8 | 809 | |
2a26c096 | 810 | if (!opt_forwarded_for) |
6bf8443a | 811 | cfd = -1; |
2a26c096 | 812 | else if (entry->mem_obj == NULL) |
6bf8443a | 813 | cfd = -1; |
2a26c096 | 814 | else |
382d851a | 815 | cfd = entry->mem_obj->fd; |
b0a1e5bf | 816 | assert(-1 == cfd || FD_SOCKET == fd_table[cfd].type); |
1294c0fc | 817 | if (p != NULL) |
b515fc11 | 818 | httpState->flags.proxying = 1; |
efb9218c | 819 | /* |
99edd1c3 | 820 | * Is keep-alive okay for all request methods? |
efb9218c | 821 | */ |
822 | if (p == NULL) | |
b515fc11 | 823 | httpState->flags.keepalive = 1; |
efb9218c | 824 | else if (p->stats.n_keepalives_sent < 10) |
b515fc11 | 825 | httpState->flags.keepalive = 1; |
efb9218c | 826 | else if ((double) p->stats.n_keepalives_recv / (double) p->stats.n_keepalives_sent > 0.50) |
b515fc11 | 827 | httpState->flags.keepalive = 1; |
db1cd23c | 828 | if (httpState->peer) |
829 | if (neighborType(httpState->peer, httpState->request) == PEER_SIBLING) | |
830 | httpState->flags.only_if_cached = 1; | |
99edd1c3 | 831 | memBufDefInit(&mb); |
832 | httpBuildRequestPrefix(req, | |
79a15e0a | 833 | httpState->orig_request, |
6bf8443a | 834 | entry, |
99edd1c3 | 835 | &mb, |
603a02fd | 836 | cfd, |
837 | httpState->flags); | |
b6a2f15e | 838 | debug(11, 6) ("httpSendRequest: FD %d:\n%s\n", httpState->fd, mb.buf); |
839 | comm_write_mbuf(httpState->fd, mb, sendHeaderDone, httpState); | |
090089c4 | 840 | } |
b6a2f15e | 841 | |
910169e5 | 842 | void |
db1cd23c | 843 | httpStart(FwdState * fwd) |
603a02fd | 844 | { |
db1cd23c | 845 | int fd = fwd->server_fd; |
cb87dab6 | 846 | HttpStateData *httpState = memAllocate(MEM_HTTP_STATE_DATA); |
910169e5 | 847 | request_t *proxy_req; |
db1cd23c | 848 | request_t *orig_req = fwd->request; |
910169e5 | 849 | debug(11, 3) ("httpStart: \"%s %s\"\n", |
850 | RequestMethodStr[orig_req->method], | |
db1cd23c | 851 | storeUrl(fwd->entry)); |
852 | cbdataAdd(httpState, memFree, MEM_HTTP_STATE_DATA); | |
853 | storeLockObject(fwd->entry); | |
854 | httpState->fwd = fwd; | |
855 | httpState->entry = fwd->entry; | |
9e4ad609 | 856 | httpState->fd = fd; |
db1cd23c | 857 | if (fwd->servers) |
858 | httpState->peer = fwd->servers->peer; /* might be NULL */ | |
910169e5 | 859 | if (httpState->peer) { |
860 | proxy_req = requestCreate(orig_req->method, | |
861 | PROTO_NONE, storeUrl(httpState->entry)); | |
862 | xstrncpy(proxy_req->host, httpState->peer->host, SQUIDHOSTNAMELEN); | |
863 | proxy_req->port = httpState->peer->http_port; | |
23e8446b | 864 | proxy_req->flags = orig_req->flags; |
9bc73deb | 865 | proxy_req->lastmod = orig_req->lastmod; |
910169e5 | 866 | httpState->request = requestLink(proxy_req); |
910169e5 | 867 | httpState->orig_request = requestLink(orig_req); |
92695e5e | 868 | proxy_req->flags.proxying = 1; |
910169e5 | 869 | /* |
870 | * This NEIGHBOR_PROXY_ONLY check probably shouldn't be here. | |
871 | * We might end up getting the object from somewhere else if, | |
872 | * for example, the request to this neighbor fails. | |
873 | */ | |
cd196bc8 | 874 | if (httpState->peer->options.proxy_only) |
910169e5 | 875 | storeReleaseRequest(httpState->entry); |
95e36d02 | 876 | #if DELAY_POOLS |
59715b38 | 877 | assert(delayIsNoDelay(fd) == 0); |
878 | if (httpState->peer->options.no_delay) | |
879 | delaySetNoDelay(fd); | |
95e36d02 | 880 | #endif |
603a02fd | 881 | } else { |
910169e5 | 882 | httpState->request = requestLink(orig_req); |
883 | httpState->orig_request = requestLink(orig_req); | |
603a02fd | 884 | } |
910169e5 | 885 | /* |
886 | * register the handler to free HTTP state data when the FD closes | |
887 | */ | |
888 | comm_add_close_handler(fd, httpStateFree, httpState); | |
a0f32775 | 889 | Counter.server.all.requests++; |
890 | Counter.server.http.requests++; | |
b6a2f15e | 891 | httpSendRequest(httpState); |
892 | /* | |
893 | * We used to set the read timeout here, but not any more. | |
894 | * Now its set in httpSendComplete() after the full request, | |
895 | * including request body, has been written to the server. | |
896 | */ | |
090089c4 | 897 | } |
898 | ||
54220df8 | 899 | static void |
7db8b16d | 900 | httpSendRequestEntry(int fd, char *bufnotused, size_t size, int errflag, void *data) |
54220df8 | 901 | { |
902 | HttpStateData *httpState = data; | |
903 | StoreEntry *entry = httpState->entry; | |
904 | ErrorState *err; | |
905 | debug(11, 5) ("httpSendRequestEntry: FD %d: size %d: errflag %d.\n", | |
7db8b16d | 906 | fd, size, errflag); |
54220df8 | 907 | if (size > 0) { |
7db8b16d | 908 | fd_bytes(fd, size, FD_WRITE); |
54220df8 | 909 | kb_incr(&Counter.server.all.kbytes_out, size); |
910 | kb_incr(&Counter.server.http.kbytes_out, size); | |
911 | } | |
912 | if (errflag == COMM_ERR_CLOSING) | |
7db8b16d | 913 | return; |
54220df8 | 914 | if (errflag) { |
7db8b16d | 915 | err = errorCon(ERR_WRITE_ERROR, HTTP_INTERNAL_SERVER_ERROR); |
916 | err->xerrno = errno; | |
917 | err->request = requestLink(httpState->orig_request); | |
918 | errorAppendEntry(entry, err); | |
919 | comm_close(fd); | |
920 | return; | |
54220df8 | 921 | } |
b6a2f15e | 922 | if (EBIT_TEST(entry->flags, ENTRY_ABORTED)) { |
923 | comm_close(fd); | |
924 | return; | |
925 | } | |
376bb137 | 926 | pumpStart(fd, httpState->fwd, httpSendRequestEntryDone, httpState); |
927 | } | |
928 | ||
929 | static void | |
930 | httpSendRequestEntryDone(int fd, char *bufnotused, size_t size, int errflag, void *data) | |
931 | { | |
932 | HttpStateData *httpState = data; | |
933 | StoreEntry *entry = httpState->entry; | |
934 | ErrorState *err; | |
935 | aclCheck_t ch; | |
936 | debug(11, 5) ("httpSendRequestEntryDone: FD %d: size %d: errflag %d.\n", | |
937 | fd, size, errflag); | |
938 | if (size > 0) { | |
939 | fd_bytes(fd, size, FD_WRITE); | |
940 | kb_incr(&Counter.server.all.kbytes_out, size); | |
941 | kb_incr(&Counter.server.http.kbytes_out, size); | |
942 | } | |
943 | if (errflag == COMM_ERR_CLOSING) | |
944 | return; | |
945 | if (errflag) { | |
946 | err = errorCon(ERR_WRITE_ERROR, HTTP_INTERNAL_SERVER_ERROR); | |
947 | err->xerrno = errno; | |
948 | err->request = requestLink(httpState->orig_request); | |
949 | errorAppendEntry(entry, err); | |
950 | comm_close(fd); | |
951 | return; | |
952 | } | |
953 | memset(&ch, '\0', sizeof(ch)); | |
954 | ch.request = httpState->request; | |
955 | if (!Config.accessList.brokenPosts) { | |
956 | debug(11, 5) ("httpSendRequestEntryDone: No brokenPosts list\n"); | |
957 | httpSendComplete(fd, NULL, 0, 0, data); | |
958 | } else if (!aclCheckFast(Config.accessList.brokenPosts, &ch)) { | |
959 | debug(11, 5) ("httpSendRequestEntryDone: didn't match brokenPosts\n"); | |
960 | httpSendComplete(fd, NULL, 0, 0, data); | |
961 | } else { | |
962 | debug(11, 2) ("httpSendRequestEntryDone: matched brokenPosts\n"); | |
963 | comm_write(fd, "\r\n", 2, httpSendComplete, data, NULL); | |
964 | } | |
54220df8 | 965 | } |