]> git.ipfire.org Git - thirdparty/squid.git/blame - src/adaptation/icap/ModXact.cc
Bug 4928: Cannot convert non-IPv4 to IPv4 (#379)
[thirdparty/squid.git] / src / adaptation / icap / ModXact.cc
CommitLineData
774c051c 1/*
f6e9a3ee 2 * Copyright (C) 1996-2019 The Squid Software Foundation and contributors
bbc27441
AJ
3 *
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
774c051c 7 */
8
bbc27441
AJ
9/* DEBUG: section 93 ICAP (RFC 3507) Client */
10
582c2af2 11#include "squid.h"
3d93a84d 12#include "AccessLogEntry.h"
1adcebc3 13#include "adaptation/Answer.h"
3d93a84d
AJ
14#include "adaptation/History.h"
15#include "adaptation/icap/Client.h"
16#include "adaptation/icap/Config.h"
17#include "adaptation/icap/History.h"
18#include "adaptation/icap/Launcher.h"
19#include "adaptation/icap/ModXact.h"
20#include "adaptation/icap/ServiceRep.h"
21#include "adaptation/Initiator.h"
22#include "auth/UserRequest.h"
23#include "base/TextException.h"
25f98340 24#include "base64.h"
774c051c 25#include "comm.h"
d6327017 26#include "comm/Connection.h"
582c2af2 27#include "err_detail_type.h"
4f1c93a7 28#include "http/ContentLengthInterpreter.h"
db1720f8 29#include "http/one/TeChunkedParser.h"
a5bac1d2 30#include "HttpHeaderTools.h"
774c051c 31#include "HttpReply.h"
5ceaee75 32#include "MasterXaction.h"
985c86bc 33#include "SquidTime.h"
774c051c 34
35// flow and terminology:
36// HTTP| --> receive --> encode --> write --> |network
37// end | <-- send <-- parse <-- read <-- |end
38
774c051c 39// TODO: replace gotEncapsulated() with something faster; we call it often
40
26cc52cb
AR
41CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXact);
42CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXactLauncher);
774c051c 43
5f8252d2 44static const size_t TheBackupLimit = BodyPipe::MaxCapacity;
774c051c 45
26cc52cb 46Adaptation::Icap::ModXact::State::State()
774c051c 47{
09bfe95f 48 memset(this, 0, sizeof(*this));
774c051c 49}
50
63df1d28 51Adaptation::Icap::ModXact::ModXact(Http::Message *virginHeader,
af0ded40 52 HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::Icap::ServiceRep::Pointer &aService):
f53969cc
SM
53 AsyncJob("Adaptation::Icap::ModXact"),
54 Adaptation::Icap::Xaction("Adaptation::Icap::ModXact", aService),
55 virginConsumed(0),
56 bodyParser(NULL),
57 canStartBypass(false), // too early
58 protectGroupBypass(true),
59 replyHttpHeaderSize(-1),
60 replyHttpBodySize(-1),
61 adaptHistoryId(-1),
69c698a3 62 trailerParser(nullptr),
f53969cc 63 alMaster(alp)
774c051c 64{
5f8252d2 65 assert(virginHeader);
774c051c 66
5f8252d2 67 virgin.setHeader(virginHeader); // sets virgin.body_pipe if needed
68 virgin.setCause(virginCause); // may be NULL
774c051c 69
5f8252d2 70 // adapted header and body are initialized when we parse them
774c051c 71
26cc52cb 72 // writing and reading ends are handled by Adaptation::Icap::Xaction
774c051c 73
74 // encoding
75 // nothing to do because we are using temporary buffers
76
3ff65596 77 // parsing; TODO: do not set until we parse, see ICAPOptXact
c7d51c86 78 icapReply = new HttpReply;
774c051c 79 icapReply->protoPrefix = "ICAP/"; // TODO: make an IcapReply class?
80
192378eb 81 debugs(93,7, HERE << "initialized." << status());
774c051c 82}
83
5f8252d2 84// initiator wants us to start
26cc52cb 85void Adaptation::Icap::ModXact::start()
774c051c 86{
26cc52cb 87 Adaptation::Icap::Xaction::start();
774c051c 88
3ff65596 89 // reserve an adaptation history slot (attempts are known at this time)
a22e6cd3 90 Adaptation::History::Pointer ah = virginRequest().adaptLogHistory();
3ff65596
AR
91 if (ah != NULL)
92 adaptHistoryId = ah->recordXactStart(service().cfg().key, icap_tr_start, attempts > 1);
93
774c051c 94 estimateVirginBody(); // before virgin disappears!
95
0bef8dd7 96 canStartBypass = service().cfg().bypass;
478cfe99 97
774c051c 98 // it is an ICAP violation to send request to a service w/o known OPTIONS
2dba5b8e
CT
99 // and the service may is too busy for us: honor Max-Connections and such
100 if (service().up() && service().availableForNew())
774c051c 101 startWriting();
102 else
103 waitForService();
774c051c 104}
105
26cc52cb 106void Adaptation::Icap::ModXact::waitForService()
774c051c 107{
2dba5b8e 108 const char *comment;
774c051c 109 Must(!state.serviceWaiting);
2dba5b8e
CT
110
111 if (!service().up()) {
112 AsyncCall::Pointer call = JobCallback(93,5,
113 ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceReady);
114
115 service().callWhenReady(call);
116 comment = "to be up";
117 } else {
118 //The service is unavailable because of max-connection or other reason
119
120 if (service().cfg().onOverload != srvWait) {
121 // The service is overloaded, but waiting to be available prohibited by
122 // user configuration (onOverload is set to "block" or "bypass")
123 if (service().cfg().onOverload == srvBlock)
124 disableBypass("not available", true);
125 else //if (service().cfg().onOverload == srvBypass)
126 canStartBypass = true;
127
128 disableRetries();
129 disableRepeats("ICAP service is not available");
130
131 debugs(93, 7, HERE << "will not wait for the service to be available" <<
132 status());
133
134 throw TexcHere("ICAP service is not available");
135 }
136
137 AsyncCall::Pointer call = JobCallback(93,5,
138 ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceAvailable);
139 service().callWhenAvailable(call, state.waitedForService);
140 comment = "to be available";
141 }
142
143 debugs(93, 7, HERE << "will wait for the service " << comment << status());
c7d51c86 144 state.serviceWaiting = true; // after callWhenReady() which may throw
2dba5b8e 145 state.waitedForService = true;
774c051c 146}
147
26cc52cb 148void Adaptation::Icap::ModXact::noteServiceReady()
774c051c 149{
774c051c 150 Must(state.serviceWaiting);
151 state.serviceWaiting = false;
c99de607 152
2dba5b8e 153 if (!service().up()) {
c824c43b 154 disableRetries();
3ff65596 155 disableRepeats("ICAP service is unusable");
478cfe99 156 throw TexcHere("ICAP service is unusable");
c824c43b 157 }
2dba5b8e
CT
158
159 if (service().availableForOld())
160 startWriting();
161 else
162 waitForService();
163}
164
165void Adaptation::Icap::ModXact::noteServiceAvailable()
166{
167 Must(state.serviceWaiting);
168 state.serviceWaiting = false;
169
170 if (service().up() && service().availableForOld())
171 startWriting();
172 else
173 waitForService();
774c051c 174}
175
26cc52cb 176void Adaptation::Icap::ModXact::startWriting()
774c051c 177{
774c051c 178 state.writing = State::writingConnect;
c824c43b 179
180 decideOnPreview(); // must be decided before we decideOnRetries
181 decideOnRetries();
182
774c051c 183 openConnection();
774c051c 184}
185
186// connection with the ICAP service established
26cc52cb 187void Adaptation::Icap::ModXact::handleCommConnected()
774c051c 188{
189 Must(state.writing == State::writingConnect);
190
191 startReading(); // wait for early errors from the ICAP server
192
193 MemBuf requestBuf;
194 requestBuf.init();
195
196 makeRequestHeaders(requestBuf);
192378eb 197 debugs(93, 9, HERE << "will write" << status() << ":\n" <<
774c051c 198 (requestBuf.terminate(), requestBuf.content()));
199
200 // write headers
201 state.writing = State::writingHeaders;
3ff65596 202 icap_tio_start = current_time;
774c051c 203 scheduleWrite(requestBuf);
204}
205
26cc52cb 206void Adaptation::Icap::ModXact::handleCommWrote(size_t sz)
774c051c 207{
b107a5a5 208 debugs(93, 5, HERE << "Wrote " << sz << " bytes");
209
774c051c 210 if (state.writing == State::writingHeaders)
211 handleCommWroteHeaders();
212 else
213 handleCommWroteBody();
214}
215
26cc52cb 216void Adaptation::Icap::ModXact::handleCommWroteHeaders()
774c051c 217{
218 Must(state.writing == State::writingHeaders);
219
5f8252d2 220 // determine next step
23e05fb1
AR
221 if (preview.enabled()) {
222 if (preview.done())
223 decideWritingAfterPreview("zero-size");
224 else
225 state.writing = State::writingPreview;
226 } else if (virginBody.expected()) {
e1381638 227 state.writing = State::writingPrime;
23e05fb1 228 } else {
e1381638
AJ
229 stopWriting(true);
230 return;
231 }
5f8252d2 232
233 writeMore();
774c051c 234}
235
26cc52cb 236void Adaptation::Icap::ModXact::writeMore()
774c051c 237{
5f8252d2 238 debugs(93, 5, HERE << "checking whether to write more" << status());
239
bd7f2ede 240 if (writer != NULL) // already writing something
774c051c 241 return;
242
243 switch (state.writing) {
244
245 case State::writingInit: // waiting for service OPTIONS
246 Must(state.serviceWaiting);
247
248 case State::writingConnect: // waiting for the connection to establish
249
250 case State::writingHeaders: // waiting for the headers to be written
251
252 case State::writingPaused: // waiting for the ICAP server response
253
c99de607 254 case State::writingReallyDone: // nothing more to write
255 return;
256
257 case State::writingAlmostDone: // was waiting for the last write
258 stopWriting(false);
774c051c 259 return;
260
261 case State::writingPreview:
5f8252d2 262 writePreviewBody();
774c051c 263 return;
264
265 case State::writingPrime:
266 writePrimeBody();
267 return;
268
269 default:
26cc52cb 270 throw TexcHere("Adaptation::Icap::ModXact in bad writing state");
774c051c 271 }
272}
273
26cc52cb 274void Adaptation::Icap::ModXact::writePreviewBody()
774c051c 275{
5f8252d2 276 debugs(93, 8, HERE << "will write Preview body from " <<
9e008dda 277 virgin.body_pipe << status());
774c051c 278 Must(state.writing == State::writingPreview);
5f8252d2 279 Must(virgin.body_pipe != NULL);
774c051c 280
5f8252d2 281 const size_t sizeMax = (size_t)virgin.body_pipe->buf().contentSize();
d85c3078 282 const size_t size = min(preview.debt(), sizeMax);
774c051c 283 writeSomeBody("preview body", size);
284
285 // change state once preview is written
286
23e05fb1
AR
287 if (preview.done())
288 decideWritingAfterPreview("body");
289}
774c051c 290
23e05fb1
AR
291/// determine state.writing after we wrote the entire preview
292void Adaptation::Icap::ModXact::decideWritingAfterPreview(const char *kind)
293{
294 if (preview.ieof()) // nothing more to write
295 stopWriting(true);
e81d21e0 296 else if (state.parsing == State::psIcapHeader) // did not get a reply yet
23e05fb1
AR
297 state.writing = State::writingPaused; // wait for the ICAP server reply
298 else
299 stopWriting(true); // ICAP server reply implies no post-preview writing
300
301 debugs(93, 6, HERE << "decided on writing after " << kind << " preview" <<
e81d21e0 302 status());
774c051c 303}
304
26cc52cb 305void Adaptation::Icap::ModXact::writePrimeBody()
774c051c 306{
307 Must(state.writing == State::writingPrime);
5f8252d2 308 Must(virginBodyWriting.active());
774c051c 309
5f8252d2 310 const size_t size = (size_t)virgin.body_pipe->buf().contentSize();
774c051c 311 writeSomeBody("prime virgin body", size);
312
5f8252d2 313 if (virginBodyEndReached(virginBodyWriting)) {
314 debugs(93, 5, HERE << "wrote entire body");
c99de607 315 stopWriting(true);
b107a5a5 316 }
774c051c 317}
318
26cc52cb 319void Adaptation::Icap::ModXact::writeSomeBody(const char *label, size_t size)
774c051c 320{
c99de607 321 Must(!writer && state.writing < state.writingAlmostDone);
5f8252d2 322 Must(virgin.body_pipe != NULL);
12f4b710 323 debugs(93, 8, HERE << "will write up to " << size << " bytes of " <<
774c051c 324 label);
325
326 MemBuf writeBuf; // TODO: suggest a min size based on size and lastChunk
327
328 writeBuf.init(); // note: we assume that last-chunk will fit
329
5f8252d2 330 const size_t writableSize = virginContentSize(virginBodyWriting);
d85c3078 331 const size_t chunkSize = min(writableSize, size);
774c051c 332
333 if (chunkSize) {
12f4b710 334 debugs(93, 7, HERE << "will write " << chunkSize <<
774c051c 335 "-byte chunk of " << label);
5f8252d2 336
337 openChunk(writeBuf, chunkSize, false);
338 writeBuf.append(virginContentData(virginBodyWriting), chunkSize);
339 closeChunk(writeBuf);
340
341 virginBodyWriting.progress(chunkSize);
342 virginConsume();
774c051c 343 } else {
192378eb 344 debugs(93, 7, HERE << "has no writable " << label << " content");
774c051c 345 }
346
5f8252d2 347 const bool wroteEof = virginBodyEndReached(virginBodyWriting);
348 bool lastChunk = wroteEof;
349 if (state.writing == State::writingPreview) {
350 preview.wrote(chunkSize, wroteEof); // even if wrote nothing
351 lastChunk = lastChunk || preview.done();
352 }
774c051c 353
5f8252d2 354 if (lastChunk) {
12f4b710 355 debugs(93, 8, HERE << "will write last-chunk of " << label);
774c051c 356 addLastRequestChunk(writeBuf);
357 }
358
12f4b710 359 debugs(93, 7, HERE << "will write " << writeBuf.contentSize()
774c051c 360 << " raw bytes of " << label);
361
362 if (writeBuf.hasContent()) {
363 scheduleWrite(writeBuf); // comm will free the chunk
364 } else {
365 writeBuf.clean();
366 }
367}
368
26cc52cb 369void Adaptation::Icap::ModXact::addLastRequestChunk(MemBuf &buf)
774c051c 370{
c99de607 371 const bool ieof = state.writing == State::writingPreview && preview.ieof();
372 openChunk(buf, 0, ieof);
373 closeChunk(buf);
774c051c 374}
375
26cc52cb 376void Adaptation::Icap::ModXact::openChunk(MemBuf &buf, size_t chunkSize, bool ieof)
774c051c 377{
4391cd15 378 buf.appendf((ieof ? "%x; ieof\r\n" : "%x\r\n"), (int) chunkSize);
774c051c 379}
380
26cc52cb 381void Adaptation::Icap::ModXact::closeChunk(MemBuf &buf)
774c051c 382{
774c051c 383 buf.append(ICAP::crlf, 2); // chunk-terminating CRLF
384}
385
3ff65596
AR
386const HttpRequest &Adaptation::Icap::ModXact::virginRequest() const
387{
388 const HttpRequest *request = virgin.cause ?
e1381638 389 virgin.cause : dynamic_cast<const HttpRequest*>(virgin.header);
3ff65596
AR
390 Must(request);
391 return *request;
392}
393
5f8252d2 394// did the activity reached the end of the virgin body?
26cc52cb 395bool Adaptation::Icap::ModXact::virginBodyEndReached(const Adaptation::Icap::VirginBodyAct &act) const
5f8252d2 396{
9e008dda 397 return
5f8252d2 398 !act.active() || // did all (assuming it was originally planned)
61beade2 399 !virgin.body_pipe->expectMoreAfter(act.offset()); // will not have more
5f8252d2 400}
401
402// the size of buffered virgin body data available for the specified activity
403// if this size is zero, we may be done or may be waiting for more data
26cc52cb 404size_t Adaptation::Icap::ModXact::virginContentSize(const Adaptation::Icap::VirginBodyAct &act) const
774c051c 405{
5f8252d2 406 Must(act.active());
407 // asbolute start of unprocessed data
b0365bd9 408 const uint64_t dataStart = act.offset();
5f8252d2 409 // absolute end of buffered data
b0365bd9
FC
410 const uint64_t dataEnd = virginConsumed + virgin.body_pipe->buf().contentSize();
411 Must(virginConsumed <= dataStart && dataStart <= dataEnd);
412 return static_cast<size_t>(dataEnd - dataStart);
774c051c 413}
414
5f8252d2 415// pointer to buffered virgin body data available for the specified activity
26cc52cb 416const char *Adaptation::Icap::ModXact::virginContentData(const Adaptation::Icap::VirginBodyAct &act) const
774c051c 417{
5f8252d2 418 Must(act.active());
b0365bd9
FC
419 const uint64_t dataStart = act.offset();
420 Must(virginConsumed <= dataStart);
421 return virgin.body_pipe->buf().content() + static_cast<size_t>(dataStart-virginConsumed);
774c051c 422}
423
26cc52cb 424void Adaptation::Icap::ModXact::virginConsume()
774c051c 425{
3ff65596 426 debugs(93, 9, HERE << "consumption guards: " << !virgin.body_pipe << isRetriable <<
a22e6cd3 427 isRepeatable << canStartBypass << protectGroupBypass);
478cfe99 428
5f8252d2 429 if (!virgin.body_pipe)
c824c43b 430 return; // nothing to consume
431
432 if (isRetriable)
433 return; // do not consume if we may have to retry later
5f8252d2 434
435 BodyPipe &bp = *virgin.body_pipe;
a22e6cd3 436 const bool wantToPostpone = isRepeatable || canStartBypass || protectGroupBypass;
478cfe99 437
438 // Why > 2? HttpState does not use the last bytes in the buffer
9e008dda 439 // because delayAwareRead() is arguably broken. See
478cfe99 440 // HttpStateData::maybeReadVirginBody for more details.
3ff65596 441 if (wantToPostpone && bp.buf().spaceSize() > 2) {
478cfe99 442 // Postponing may increase memory footprint and slow the HTTP side
9e008dda 443 // down. Not postponing may increase the number of ICAP errors
478cfe99 444 // if the ICAP service fails. We may also use "potential" space to
445 // postpone more aggressively. Should the trade-off be configurable?
446 debugs(93, 8, HERE << "postponing consumption from " << bp.status());
447 return;
448 }
449
5f8252d2 450 const size_t have = static_cast<size_t>(bp.buf().contentSize());
47f6e231 451 const uint64_t end = virginConsumed + have;
452 uint64_t offset = end;
774c051c 453
478cfe99 454 debugs(93, 9, HERE << "max virgin consumption offset=" << offset <<
9e008dda
AJ
455 " acts " << virginBodyWriting.active() << virginBodySending.active() <<
456 " consumed=" << virginConsumed <<
457 " from " << virgin.body_pipe->status());
478cfe99 458
5f8252d2 459 if (virginBodyWriting.active())
d85c3078 460 offset = min(virginBodyWriting.offset(), offset);
774c051c 461
5f8252d2 462 if (virginBodySending.active())
d85c3078 463 offset = min(virginBodySending.offset(), offset);
774c051c 464
465 Must(virginConsumed <= offset && offset <= end);
466
47f6e231 467 if (const size_t size = static_cast<size_t>(offset - virginConsumed)) {
b107a5a5 468 debugs(93, 8, HERE << "consuming " << size << " out of " << have <<
774c051c 469 " virgin body bytes");
5f8252d2 470 bp.consume(size);
774c051c 471 virginConsumed += size;
c824c43b 472 Must(!isRetriable); // or we should not be consuming
3ff65596 473 disableRepeats("consumed content");
a22e6cd3 474 disableBypass("consumed content", true);
774c051c 475 }
476}
477
26cc52cb 478void Adaptation::Icap::ModXact::handleCommWroteBody()
774c051c 479{
480 writeMore();
481}
482
c99de607 483// Called when we do not expect to call comm_write anymore.
484// We may have a pending write though.
485// If stopping nicely, we will just wait for that pending write, if any.
26cc52cb 486void Adaptation::Icap::ModXact::stopWriting(bool nicely)
774c051c 487{
c99de607 488 if (state.writing == State::writingReallyDone)
774c051c 489 return;
490
bd7f2ede 491 if (writer != NULL) {
c99de607 492 if (nicely) {
5f8252d2 493 debugs(93, 7, HERE << "will wait for the last write" << status());
c99de607 494 state.writing = State::writingAlmostDone; // may already be set
5f8252d2 495 checkConsuming();
c99de607 496 return;
497 }
4932ad93 498 debugs(93, 3, HERE << "will NOT wait for the last write" << status());
774c051c 499
c99de607 500 // Comm does not have an interface to clear the writer callback nicely,
501 // but without clearing the writer we cannot recycle the connection.
502 // We prevent connection reuse and hope that we can handle a callback
5f8252d2 503 // call at any time, usually in the middle of the destruction sequence!
504 // Somebody should add comm_remove_write_handler() to comm API.
c99de607 505 reuseConnection = false;
478cfe99 506 ignoreLastWrite = true;
c99de607 507 }
508
5f8252d2 509 debugs(93, 7, HERE << "will no longer write" << status());
5f8252d2 510 if (virginBodyWriting.active()) {
511 virginBodyWriting.disable();
512 virginConsume();
513 }
478cfe99 514 state.writing = State::writingReallyDone;
515 checkConsuming();
774c051c 516}
517
26cc52cb 518void Adaptation::Icap::ModXact::stopBackup()
774c051c 519{
5f8252d2 520 if (!virginBodySending.active())
774c051c 521 return;
522
192378eb 523 debugs(93, 7, HERE << "will no longer backup" << status());
5f8252d2 524 virginBodySending.disable();
774c051c 525 virginConsume();
526}
527
26cc52cb 528bool Adaptation::Icap::ModXact::doneAll() const
774c051c 529{
26cc52cb 530 return Adaptation::Icap::Xaction::doneAll() && !state.serviceWaiting &&
5f8252d2 531 doneSending() &&
774c051c 532 doneReading() && state.doneWriting();
533}
534
26cc52cb 535void Adaptation::Icap::ModXact::startReading()
774c051c 536{
aed188fd 537 Must(haveConnection());
774c051c 538 Must(!reader);
5f8252d2 539 Must(!adapted.header);
540 Must(!adapted.body_pipe);
774c051c 541
542 // we use the same buffer for headers and body and then consume headers
543 readMore();
544}
545
26cc52cb 546void Adaptation::Icap::ModXact::readMore()
774c051c 547{
bd7f2ede 548 if (reader != NULL || doneReading()) {
c99de607 549 debugs(93,3,HERE << "returning from readMore because reader or doneReading()");
774c051c 550 return;
3b299123 551 }
774c051c 552
553 // do not fill readBuf if we have no space to store the result
5f8252d2 554 if (adapted.body_pipe != NULL &&
9e008dda 555 !adapted.body_pipe->buf().hasPotentialSpace()) {
5f8252d2 556 debugs(93,3,HERE << "not reading because ICAP reply pipe is full");
774c051c 557 return;
3b299123 558 }
774c051c 559
2b42f3fd 560 if (readBuf.length() < SQUID_TCP_SO_RCVBUF)
774c051c 561 scheduleRead();
3b299123 562 else
2b42f3fd 563 debugs(93,3,HERE << "cannot read with a full buffer");
774c051c 564}
565
566// comm module read a portion of the ICAP response for us
26cc52cb 567void Adaptation::Icap::ModXact::handleCommRead(size_t)
774c051c 568{
569 Must(!state.doneParsing());
3ff65596 570 icap_tio_finish = current_time;
774c051c 571 parseMore();
572 readMore();
573}
574
26cc52cb 575void Adaptation::Icap::ModXact::echoMore()
774c051c 576{
577 Must(state.sending == State::sendingVirgin);
5f8252d2 578 Must(adapted.body_pipe != NULL);
579 Must(virginBodySending.active());
580
581 const size_t sizeMax = virginContentSize(virginBodySending);
582 debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes from " <<
9e008dda 583 virgin.body_pipe->status());
5f8252d2 584 debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes to " <<
9e008dda 585 adapted.body_pipe->status());
5f8252d2 586
587 if (sizeMax > 0) {
588 const size_t size = adapted.body_pipe->putMoreData(virginContentData(virginBodySending), sizeMax);
589 debugs(93,5, HERE << "echoed " << size << " out of " << sizeMax <<
9e008dda 590 " bytes");
5f8252d2 591 virginBodySending.progress(size);
3ff65596 592 disableRepeats("echoed content");
a22e6cd3
AR
593 disableBypass("echoed content", true);
594 virginConsume();
774c051c 595 }
596
5f8252d2 597 if (virginBodyEndReached(virginBodySending)) {
192378eb 598 debugs(93, 5, HERE << "echoed all" << status());
774c051c 599 stopSending(true);
600 } else {
192378eb 601 debugs(93, 5, HERE << "has " <<
9e008dda
AJ
602 virgin.body_pipe->buf().contentSize() << " bytes " <<
603 "and expects more to echo" << status());
5f8252d2 604 // TODO: timeout if virgin or adapted pipes are broken
774c051c 605 }
606}
607
26cc52cb 608bool Adaptation::Icap::ModXact::doneSending() const
774c051c 609{
774c051c 610 return state.sending == State::sendingDone;
611}
612
478cfe99 613// stop (or do not start) sending adapted message body
26cc52cb 614void Adaptation::Icap::ModXact::stopSending(bool nicely)
774c051c 615{
3ff65596 616 debugs(93, 7, HERE << "Enter stop sending ");
774c051c 617 if (doneSending())
618 return;
3ff65596 619 debugs(93, 7, HERE << "Proceed with stop sending ");
774c051c 620
621 if (state.sending != State::sendingUndecided) {
192378eb 622 debugs(93, 7, HERE << "will no longer send" << status());
5f8252d2 623 if (adapted.body_pipe != NULL) {
624 virginBodySending.disable();
625 // we may leave debts if we were echoing and the virgin
626 // body_pipe got exhausted before we echoed all planned bytes
627 const bool leftDebts = adapted.body_pipe->needsMoreData();
628 stopProducingFor(adapted.body_pipe, nicely && !leftDebts);
629 }
774c051c 630 } else {
192378eb 631 debugs(93, 7, HERE << "will not start sending" << status());
5f8252d2 632 Must(!adapted.body_pipe);
774c051c 633 }
634
635 state.sending = State::sendingDone;
5f8252d2 636 checkConsuming();
774c051c 637}
638
5f8252d2 639// should be called after certain state.writing or state.sending changes
26cc52cb 640void Adaptation::Icap::ModXact::checkConsuming()
774c051c 641{
5f8252d2 642 // quit if we already stopped or are still using the pipe
643 if (!virgin.body_pipe || !state.doneConsumingVirgin())
774c051c 644 return;
645
5f8252d2 646 debugs(93, 7, HERE << "will stop consuming" << status());
647 stopConsumingFrom(virgin.body_pipe);
774c051c 648}
649
26cc52cb 650void Adaptation::Icap::ModXact::parseMore()
774c051c 651{
84ae6223
AJ
652 debugs(93, 5, "have " << readBuf.length() << " bytes to parse" << status());
653 debugs(93, 5, "\n" << readBuf);
774c051c 654
655 if (state.parsingHeaders())
656 parseHeaders();
657
658 if (state.parsing == State::psBody)
659 parseBody();
69c698a3
EB
660
661 if (state.parsing == State::psIcapTrailer)
662 parseIcapTrailer();
774c051c 663}
664
26cc52cb 665void Adaptation::Icap::ModXact::callException(const std::exception &e)
478cfe99 666{
667 if (!canStartBypass || isRetriable) {
64b66b76
CT
668 if (!isRetriable) {
669 if (const TextException *te = dynamic_cast<const TextException *>(&e))
670 detailError(ERR_DETAIL_EXCEPTION_START + te->id());
671 else
672 detailError(ERR_DETAIL_EXCEPTION_OTHER);
673 }
26cc52cb 674 Adaptation::Icap::Xaction::callException(e);
478cfe99 675 return;
676 }
677
678 try {
192378eb 679 debugs(93, 3, HERE << "bypassing " << inCall << " exception: " <<
af6a12ee 680 e.what() << ' ' << status());
478cfe99 681 bypassFailure();
64b66b76
CT
682 } catch (const TextException &bypassTe) {
683 detailError(ERR_DETAIL_EXCEPTION_START + bypassTe.id());
684 Adaptation::Icap::Xaction::callException(bypassTe);
9e008dda 685 } catch (const std::exception &bypassE) {
64b66b76 686 detailError(ERR_DETAIL_EXCEPTION_OTHER);
26cc52cb 687 Adaptation::Icap::Xaction::callException(bypassE);
478cfe99 688 }
689}
690
26cc52cb 691void Adaptation::Icap::ModXact::bypassFailure()
478cfe99 692{
a22e6cd3 693 disableBypass("already started to bypass", false);
478cfe99 694
695 Must(!isRetriable); // or we should not be bypassing
3ff65596 696 // TODO: should the same be enforced for isRepeatable? Check icap_repeat??
478cfe99 697
698 prepEchoing();
699
700 startSending();
701
702 // end all activities associated with the ICAP server
703
69c698a3 704 stopParsing(false);
478cfe99 705
706 stopWriting(true); // or should we force it?
aed188fd 707 if (haveConnection()) {
478cfe99 708 reuseConnection = false; // be conservative
709 cancelRead(); // may not work; and we cannot stop connecting either
710 if (!doneWithIo())
192378eb 711 debugs(93, 7, HERE << "Warning: bypass failed to stop I/O" << status());
478cfe99 712 }
61cb3565
AR
713
714 service().noteFailure(); // we are bypassing, but this is still a failure
478cfe99 715}
716
a22e6cd3 717void Adaptation::Icap::ModXact::disableBypass(const char *reason, bool includingGroupBypass)
478cfe99 718{
719 if (canStartBypass) {
720 debugs(93,7, HERE << "will never start bypass because " << reason);
721 canStartBypass = false;
722 }
a22e6cd3
AR
723 if (protectGroupBypass && includingGroupBypass) {
724 debugs(93,7, HERE << "not protecting group bypass because " << reason);
725 protectGroupBypass = false;
726 }
478cfe99 727}
728
774c051c 729// note that allocation for echoing is done in handle204NoContent()
26cc52cb 730void Adaptation::Icap::ModXact::maybeAllocateHttpMsg()
774c051c 731{
5f8252d2 732 if (adapted.header) // already allocated
774c051c 733 return;
734
735 if (gotEncapsulated("res-hdr")) {
5f8252d2 736 adapted.setHeader(new HttpReply);
3ff65596 737 setOutcome(service().cfg().method == ICAP::methodReqmod ?
e1381638 738 xoSatisfied : xoModified);
774c051c 739 } else if (gotEncapsulated("req-hdr")) {
5ceaee75 740 adapted.setHeader(new HttpRequest(virginRequest().masterXaction));
3ff65596 741 setOutcome(xoModified);
774c051c 742 } else
743 throw TexcHere("Neither res-hdr nor req-hdr in maybeAllocateHttpMsg()");
744}
745
26cc52cb 746void Adaptation::Icap::ModXact::parseHeaders()
774c051c 747{
748 Must(state.parsingHeaders());
749
b107a5a5 750 if (state.parsing == State::psIcapHeader) {
751 debugs(93, 5, HERE << "parse ICAP headers");
774c051c 752 parseIcapHead();
b107a5a5 753 }
774c051c 754
b107a5a5 755 if (state.parsing == State::psHttpHeader) {
756 debugs(93, 5, HERE << "parse HTTP headers");
774c051c 757 parseHttpHead();
b107a5a5 758 }
774c051c 759
760 if (state.parsingHeaders()) { // need more data
761 Must(mayReadMore());
762 return;
763 }
764
478cfe99 765 startSending();
766}
767
768// called after parsing all headers or when bypassing an exception
26cc52cb 769void Adaptation::Icap::ModXact::startSending()
478cfe99 770{
3ff65596 771 disableRepeats("sent headers");
a22e6cd3 772 disableBypass("sent headers", true);
3af10ac0 773 sendAnswer(Answer::Forward(adapted.header));
774c051c 774
775 if (state.sending == State::sendingVirgin)
776 echoMore();
88df846b 777 else {
ff89bfa0 778 // If we are not using the virgin HTTP object update the
63df1d28 779 // Http::Message::sources flag.
88df846b 780 // The state.sending may set to State::sendingVirgin in the case
63df1d28 781 // of 206 responses too, where we do not want to update Http::Message::sources
ff89bfa0
SM
782 // flag. However even for 206 responses the state.sending is
783 // not set yet to sendingVirgin. This is done in later step
88df846b
CT
784 // after the parseBody method called.
785 updateSources();
786 }
774c051c 787}
788
26cc52cb 789void Adaptation::Icap::ModXact::parseIcapHead()
774c051c 790{
791 Must(state.sending == State::sendingUndecided);
792
b248c2a3 793 if (!parseHead(icapReply.getRaw()))
774c051c 794 return;
795
69c698a3
EB
796 if (expectIcapTrailers()) {
797 Must(!trailerParser);
798 trailerParser = new TrailerParser;
799 }
800
d5f18517
AJ
801 static SBuf close("close", 5);
802 if (httpHeaderHasConnDir(&icapReply->header, close)) {
fc764d26 803 debugs(93, 5, HERE << "found connection close");
804 reuseConnection = false;
805 }
806
9b769c67 807 switch (icapReply->sline.status()) {
774c051c 808
9b769c67 809 case Http::scContinue:
774c051c 810 handle100Continue();
811 break;
812
9b769c67
AJ
813 case Http::scOkay:
814 case Http::scCreated: // Symantec Scan Engine 5.0 and later when modifying HTTP msg
b559db5d 815
816 if (!validate200Ok()) {
817 throw TexcHere("Invalid ICAP Response");
818 } else {
819 handle200Ok();
820 }
821
774c051c 822 break;
823
9b769c67 824 case Http::scNoContent:
774c051c 825 handle204NoContent();
826 break;
827
9b769c67 828 case Http::scPartialContent:
83c51da9
CT
829 handle206PartialContent();
830 break;
831
774c051c 832 default:
9b769c67 833 debugs(93, 5, "ICAP status " << icapReply->sline.status());
774c051c 834 handleUnknownScode();
835 break;
836 }
837
3ff65596
AR
838 const HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header);
839 if (!request)
840 request = &virginRequest();
841
842 // update the cross-transactional database if needed (all status codes!)
843 if (const char *xxName = Adaptation::Config::masterx_shared_name) {
a22e6cd3 844 Adaptation::History::Pointer ah = request->adaptHistory(true);
5038f9d8 845 if (ah != NULL) { // TODO: reorder checks to avoid creating history
3ff65596
AR
846 const String val = icapReply->header.getByName(xxName);
847 if (val.size() > 0) // XXX: HttpHeader lacks empty value detection
848 ah->updateXxRecord(xxName, val);
849 }
850 }
851
a22e6cd3
AR
852 // update the adaptation plan if needed (all status codes!)
853 if (service().cfg().routing) {
854 String services;
789217a2 855 if (icapReply->header.getList(Http::HdrType::X_NEXT_SERVICES, &services)) {
a22e6cd3
AR
856 Adaptation::History::Pointer ah = request->adaptHistory(true);
857 if (ah != NULL)
858 ah->updateNextServices(services);
859 }
789217a2 860 } // TODO: else warn (occasionally!) if we got Http::HdrType::X_NEXT_SERVICES
a22e6cd3 861
3ff65596
AR
862 // We need to store received ICAP headers for <icapLastHeader logformat option.
863 // If we already have stored headers from previous ICAP transaction related to this
864 // request, old headers will be replaced with the new one.
e1381638 865
5038f9d8
AR
866 Adaptation::History::Pointer ah = request->adaptLogHistory();
867 if (ah != NULL)
868 ah->recordMeta(&icapReply->header);
3ff65596 869
774c051c 870 // handle100Continue() manages state.writing on its own.
871 // Non-100 status means the server needs no postPreview data from us.
872 if (state.writing == State::writingPaused)
c99de607 873 stopWriting(true);
774c051c 874}
875
69c698a3
EB
876/// Parses ICAP trailers and stops parsing, if all trailer data
877/// have been received.
878void Adaptation::Icap::ModXact::parseIcapTrailer() {
b559db5d 879
69c698a3
EB
880 if (parsePart(trailerParser, "trailer")) {
881 for (const auto &e: trailerParser->trailer.entries)
882 debugs(93, 5, "ICAP trailer: " << e->name << ": " << e->value);
883 stopParsing();
b559db5d 884 }
69c698a3 885}
b559db5d 886
69c698a3
EB
887bool Adaptation::Icap::ModXact::validate200Ok()
888{
889 if (service().cfg().method == ICAP::methodRespmod)
890 return gotEncapsulated("res-hdr");
b559db5d 891
69c698a3
EB
892 return service().cfg().method == ICAP::methodReqmod &&
893 expectHttpHeader();
b559db5d 894}
895
26cc52cb 896void Adaptation::Icap::ModXact::handle100Continue()
774c051c 897{
898 Must(state.writing == State::writingPaused);
5f8252d2 899 // server must not respond before the end of preview: we may send ieof
774c051c 900 Must(preview.enabled() && preview.done() && !preview.ieof());
774c051c 901
83c51da9
CT
902 // 100 "Continue" cancels our Preview commitment,
903 // but not commitment to handle 204 or 206 outside Preview
904 if (!state.allowedPostview204 && !state.allowedPostview206)
774c051c 905 stopBackup();
906
c99de607 907 state.parsing = State::psIcapHeader; // eventually
908 icapReply->reset();
774c051c 909
910 state.writing = State::writingPrime;
911
912 writeMore();
913}
914
26cc52cb 915void Adaptation::Icap::ModXact::handle200Ok()
774c051c 916{
917 state.parsing = State::psHttpHeader;
918 state.sending = State::sendingAdapted;
919 stopBackup();
5f8252d2 920 checkConsuming();
774c051c 921}
922
26cc52cb 923void Adaptation::Icap::ModXact::handle204NoContent()
774c051c 924{
925 stopParsing();
478cfe99 926 prepEchoing();
927}
928
83c51da9
CT
929void Adaptation::Icap::ModXact::handle206PartialContent()
930{
931 if (state.writing == State::writingPaused) {
932 Must(preview.enabled());
933 Must(state.allowedPreview206);
934 debugs(93, 7, HERE << "206 inside preview");
935 } else {
936 Must(state.writing > State::writingPaused);
937 Must(state.allowedPostview206);
938 debugs(93, 7, HERE << "206 outside preview");
939 }
940 state.parsing = State::psHttpHeader;
941 state.sending = State::sendingAdapted;
942 state.readyForUob = true;
943 checkConsuming();
944}
945
478cfe99 946// Called when we receive a 204 No Content response and
947// when we are trying to bypass a service failure.
948// We actually start sending (echoig or not) in startSending.
26cc52cb 949void Adaptation::Icap::ModXact::prepEchoing()
478cfe99 950{
3ff65596 951 disableRepeats("preparing to echo content");
a22e6cd3 952 disableBypass("preparing to echo content", true);
3ff65596 953 setOutcome(xoEcho);
774c051c 954
955 // We want to clone the HTTP message, but we do not want
63df1d28 956 // to copy some non-HTTP state parts that Http::Message kids carry in them.
774c051c 957 // Thus, we cannot use a smart pointer, copy constructor, or equivalent.
958 // Instead, we simply write the HTTP message and "clone" it by parsing.
63df1d28 959 // TODO: use Http::Message::clone()!
774c051c 960
63df1d28 961 Http::Message *oldHead = virgin.header;
192378eb 962 debugs(93, 7, HERE << "cloning virgin message " << oldHead);
774c051c 963
964 MemBuf httpBuf;
965
966 // write the virgin message into a memory buffer
967 httpBuf.init();
968 packHead(httpBuf, oldHead);
969
c99de607 970 // allocate the adapted message and copy metainfo
5f8252d2 971 Must(!adapted.header);
c7d51c86 972 {
63df1d28 973 Http::MessagePointer newHead;
5ceaee75
CT
974 if (const HttpRequest *r = dynamic_cast<const HttpRequest*>(oldHead)) {
975 newHead = new HttpRequest(r->masterXaction);
e6f9e263
A
976 } else if (dynamic_cast<const HttpReply*>(oldHead)) {
977 newHead = new HttpReply;
978 }
d39901ed 979 Must(newHead);
774c051c 980
e6f9e263 981 newHead->inheritProperties(oldHead);
774c051c 982
b248c2a3 983 adapted.setHeader(newHead.getRaw());
c7d51c86 984 }
7514268e 985
774c051c 986 // parse the buffer back
955394ce 987 Http::StatusCode error = Http::scNone;
774c051c 988
63df1d28 989 httpBuf.terminate(); // Http::Message::parse requires nil-terminated buffer
84ae6223 990 Must(adapted.header->parse(httpBuf.content(), httpBuf.contentSize(), true, &error));
c7d51c86 991 Must(adapted.header->hdr_sz == httpBuf.contentSize()); // no leftovers
774c051c 992
993 httpBuf.clean();
994
192378eb 995 debugs(93, 7, HERE << "cloned virgin message " << oldHead << " to " <<
c7d51c86 996 adapted.header);
5f8252d2 997
998 // setup adapted body pipe if needed
999 if (oldHead->body_pipe != NULL) {
1000 debugs(93, 7, HERE << "will echo virgin body from " <<
9e008dda 1001 oldHead->body_pipe);
478cfe99 1002 if (!virginBodySending.active())
1003 virginBodySending.plan(); // will throw if not possible
5f8252d2 1004 state.sending = State::sendingVirgin;
1005 checkConsuming();
478cfe99 1006
5f8252d2 1007 // TODO: optimize: is it possible to just use the oldHead pipe and
1008 // remove ICAP from the loop? This echoing is probably a common case!
1009 makeAdaptedBodyPipe("echoed virgin response");
1010 if (oldHead->body_pipe->bodySizeKnown())
1011 adapted.body_pipe->setBodySize(oldHead->body_pipe->bodySize());
1012 debugs(93, 7, HERE << "will echo virgin body to " <<
9e008dda 1013 adapted.body_pipe);
5f8252d2 1014 } else {
1015 debugs(93, 7, HERE << "no virgin body to echo");
1016 stopSending(true);
1017 }
774c051c 1018}
1019
83c51da9
CT
1020/// Called when we received use-original-body chunk extension in 206 response.
1021/// We actually start sending (echoing or not) in startSending().
1022void Adaptation::Icap::ModXact::prepPartialBodyEchoing(uint64_t pos)
1023{
1024 Must(virginBodySending.active());
1025 Must(virgin.header->body_pipe != NULL);
1026
1027 setOutcome(xoPartEcho);
1028
1029 debugs(93, 7, HERE << "will echo virgin body suffix from " <<
1030 virgin.header->body_pipe << " offset " << pos );
1031
1032 // check that use-original-body=N does not point beyond buffered data
1033 const uint64_t virginDataEnd = virginConsumed +
7ddcfbab 1034 virgin.body_pipe->buf().contentSize();
83c51da9
CT
1035 Must(pos <= virginDataEnd);
1036 virginBodySending.progress(static_cast<size_t>(pos));
1037
1038 state.sending = State::sendingVirgin;
1039 checkConsuming();
1040
1041 if (virgin.header->body_pipe->bodySizeKnown())
1042 adapted.body_pipe->expectProductionEndAfter(virgin.header->body_pipe->bodySize() - pos);
1043
1044 debugs(93, 7, HERE << "will echo virgin body suffix to " <<
1045 adapted.body_pipe);
1046
1047 // Start echoing data
1048 echoMore();
1049}
1050
26cc52cb 1051void Adaptation::Icap::ModXact::handleUnknownScode()
774c051c 1052{
69c698a3 1053 stopParsing(false);
774c051c 1054 stopBackup();
1055 // TODO: mark connection as "bad"
1056
1057 // Terminate the transaction; we do not know how to handle this response.
1058 throw TexcHere("Unsupported ICAP status code");
1059}
1060
26cc52cb 1061void Adaptation::Icap::ModXact::parseHttpHead()
774c051c 1062{
69c698a3 1063 if (expectHttpHeader()) {
bae917ac 1064 replyHttpHeaderSize = 0;
774c051c 1065 maybeAllocateHttpMsg();
1066
5f8252d2 1067 if (!parseHead(adapted.header))
c99de607 1068 return; // need more header data
5f8252d2 1069
bae917ac
CT
1070 if (adapted.header)
1071 replyHttpHeaderSize = adapted.header->hdr_sz;
1072
d67acb4e 1073 if (dynamic_cast<HttpRequest*>(adapted.header)) {
5f8252d2 1074 const HttpRequest *oldR = dynamic_cast<const HttpRequest*>(virgin.header);
1075 Must(oldR);
9e008dda
AJ
1076 // TODO: the adapted request did not really originate from the
1077 // client; give proxy admin an option to prevent copying of
5f8252d2 1078 // sensitive client information here. See the following thread:
1079 // http://www.squid-cache.org/mail-archive/squid-dev/200703/0040.html
5f8252d2 1080 }
d67acb4e 1081
9e008dda
AJ
1082 // Maybe adapted.header==NULL if HttpReply and have Http 0.9 ....
1083 if (adapted.header)
1084 adapted.header->inheritProperties(virgin.header);
774c051c 1085 }
1086
5f8252d2 1087 decideOnParsingBody();
774c051c 1088}
1089
69c698a3
EB
1090template<class Part>
1091bool Adaptation::Icap::ModXact::parsePart(Part *part, const char *description)
774c051c 1092{
69c698a3
EB
1093 Must(part);
1094 debugs(93, 5, "have " << readBuf.length() << ' ' << description << " bytes to parse; state: " << state.parsing);
955394ce 1095 Http::StatusCode error = Http::scNone;
84ae6223 1096 // XXX: performance regression. c_str() data copies
63df1d28 1097 // XXX: Http::Message::parse requires a terminated string buffer
84ae6223 1098 const char *tmpBuf = readBuf.c_str();
69c698a3
EB
1099 const bool parsed = part->parse(tmpBuf, readBuf.length(), commEof, &error);
1100 debugs(93, (!parsed && error) ? 2 : 5, description << " parsing result: " << parsed << " detail: " << error);
1101 Must(parsed || !error);
1102 if (parsed)
1103 readBuf.consume(part->hdr_sz);
1104 return parsed;
1105}
774c051c 1106
69c698a3 1107// parses both HTTP and ICAP headers
63df1d28
AJ
1108bool
1109Adaptation::Icap::ModXact::parseHead(Http::Message *head)
69c698a3
EB
1110{
1111 if (!parsePart(head, "head")) {
774c051c 1112 head->reset();
1113 return false;
1114 }
774c051c 1115 return true;
1116}
1117
69c698a3
EB
1118bool Adaptation::Icap::ModXact::expectHttpHeader() const
1119{
1120 return gotEncapsulated("res-hdr") || gotEncapsulated("req-hdr");
1121}
1122
1123bool Adaptation::Icap::ModXact::expectHttpBody() const
1124{
1125 return gotEncapsulated("res-body") || gotEncapsulated("req-body");
1126}
1127
1128bool Adaptation::Icap::ModXact::expectIcapTrailers() const
1129{
1130 String trailers;
f29d429e 1131 const bool promisesToSendTrailer = icapReply->header.getByIdIfPresent(Http::HdrType::TRAILER, &trailers);
69c698a3
EB
1132 const bool supportsTrailers = icapReply->header.hasListMember(Http::HdrType::ALLOW, "trailers", ',');
1133 // ICAP Trailer specs require us to reject transactions having either Trailer
1134 // header or Allow:trailers
1135 Must((promisesToSendTrailer == supportsTrailers) || (!promisesToSendTrailer && supportsTrailers));
1136 if (promisesToSendTrailer && !trailers.size())
1137 debugs(93, DBG_IMPORTANT, "ERROR: ICAP Trailer response header field must not be empty (salvaged)");
1138 return promisesToSendTrailer;
1139}
1140
26cc52cb 1141void Adaptation::Icap::ModXact::decideOnParsingBody()
9e008dda 1142{
69c698a3 1143 if (expectHttpBody()) {
5f8252d2 1144 debugs(93, 5, HERE << "expecting a body");
1145 state.parsing = State::psBody;
bae917ac 1146 replyHttpBodySize = 0;
db1720f8 1147 bodyParser = new Http1::TeChunkedParser;
5f8252d2 1148 makeAdaptedBodyPipe("adapted response from the ICAP server");
1149 Must(state.sending == State::sendingAdapted);
774c051c 1150 } else {
b559db5d 1151 debugs(93, 5, HERE << "not expecting a body");
69c698a3
EB
1152 if (trailerParser)
1153 state.parsing = State::psIcapTrailer;
1154 else
1155 stopParsing();
5f8252d2 1156 stopSending(true);
774c051c 1157 }
774c051c 1158}
1159
26cc52cb 1160void Adaptation::Icap::ModXact::parseBody()
774c051c 1161{
5f8252d2 1162 Must(state.parsing == State::psBody);
1163 Must(bodyParser);
774c051c 1164
84ae6223 1165 debugs(93, 5, "have " << readBuf.length() << " body bytes to parse");
774c051c 1166
5f8252d2 1167 // the parser will throw on errors
1168 BodyPipeCheckout bpc(*adapted.body_pipe);
be29ee33
AJ
1169 bodyParser->setPayloadBuffer(&bpc.buf);
1170 const bool parsed = bodyParser->parse(readBuf);
1171 readBuf = bodyParser->remaining(); // sync buffers after parse
5f8252d2 1172 bpc.checkIn();
774c051c 1173
84ae6223 1174 debugs(93, 5, "have " << readBuf.length() << " body bytes after parsed all: " << parsed);
bae917ac 1175 replyHttpBodySize += adapted.body_pipe->buf().contentSize();
774c051c 1176
478cfe99 1177 // TODO: expose BodyPipe::putSize() to make this check simpler and clearer
3ff65596
AR
1178 // TODO: do we really need this if we disable when sending headers?
1179 if (adapted.body_pipe->buf().contentSize() > 0) { // parsed something sometime
1180 disableRepeats("sent adapted content");
a22e6cd3 1181 disableBypass("sent adapted content", true);
3ff65596 1182 }
478cfe99 1183
5f8252d2 1184 if (parsed) {
69c698a3
EB
1185 if (state.readyForUob && bodyParser->useOriginBody >= 0)
1186 prepPartialBodyEchoing(static_cast<uint64_t>(bodyParser->useOriginBody));
1187 else
1188 stopSending(true); // the parser succeeds only if all parsed data fits
1189 if (trailerParser)
1190 state.parsing = State::psIcapTrailer;
1191 else
83c51da9 1192 stopParsing();
5f8252d2 1193 return;
1194 }
774c051c 1195
c99de607 1196 debugs(93,3,HERE << this << " needsMoreData = " << bodyParser->needsMoreData());
3b299123 1197
1198 if (bodyParser->needsMoreData()) {
c99de607 1199 debugs(93,3,HERE << this);
774c051c 1200 Must(mayReadMore());
3b299123 1201 readMore();
1202 }
774c051c 1203
1204 if (bodyParser->needsMoreSpace()) {
1205 Must(!doneSending()); // can hope for more space
5f8252d2 1206 Must(adapted.body_pipe->buf().contentSize() > 0); // paranoid
1207 // TODO: there should be a timeout in case the sink is broken
1208 // or cannot consume partial content (while we need more space)
774c051c 1209 }
774c051c 1210}
1211
69c698a3 1212void Adaptation::Icap::ModXact::stopParsing(const bool checkUnparsedData)
774c051c 1213{
1214 if (state.parsing == State::psDone)
1215 return;
1216
69c698a3
EB
1217 if (checkUnparsedData)
1218 Must(readBuf.isEmpty());
1219
1220 debugs(93, 7, "will no longer parse" << status());
774c051c 1221
1222 delete bodyParser;
69c698a3 1223 bodyParser = nullptr;
774c051c 1224
69c698a3
EB
1225 delete trailerParser;
1226 trailerParser = nullptr;
774c051c 1227
1228 state.parsing = State::psDone;
1229}
1230
1231// HTTP side added virgin body data
26cc52cb 1232void Adaptation::Icap::ModXact::noteMoreBodyDataAvailable(BodyPipe::Pointer)
774c051c 1233{
774c051c 1234 writeMore();
1235
1236 if (state.sending == State::sendingVirgin)
1237 echoMore();
774c051c 1238}
1239
1240// HTTP side sent us all virgin info
26cc52cb 1241void Adaptation::Icap::ModXact::noteBodyProductionEnded(BodyPipe::Pointer)
774c051c 1242{
5f8252d2 1243 Must(virgin.body_pipe->productionEnded());
774c051c 1244
1245 // push writer and sender in case we were waiting for the last-chunk
1246 writeMore();
1247
1248 if (state.sending == State::sendingVirgin)
1249 echoMore();
774c051c 1250}
1251
9e008dda 1252// body producer aborted, but the initiator may still want to know
585ab260 1253// the answer, even though the HTTP message has been truncated
26cc52cb 1254void Adaptation::Icap::ModXact::noteBodyProducerAborted(BodyPipe::Pointer)
774c051c 1255{
585ab260 1256 Must(virgin.body_pipe->productionEnded());
1257
1258 // push writer and sender in case we were waiting for the last-chunk
1259 writeMore();
1260
1261 if (state.sending == State::sendingVirgin)
1262 echoMore();
5f8252d2 1263}
1264
9e008dda 1265// adapted body consumer wants more adapted data and
5f8252d2 1266// possibly freed some buffer space
26cc52cb 1267void Adaptation::Icap::ModXact::noteMoreBodySpaceAvailable(BodyPipe::Pointer)
774c051c 1268{
774c051c 1269 if (state.sending == State::sendingVirgin)
1270 echoMore();
3b299123 1271 else if (state.sending == State::sendingAdapted)
1272 parseMore();
774c051c 1273 else
3b299123 1274 Must(state.sending == State::sendingUndecided);
774c051c 1275}
1276
5f8252d2 1277// adapted body consumer aborted
26cc52cb 1278void Adaptation::Icap::ModXact::noteBodyConsumerAborted(BodyPipe::Pointer)
774c051c 1279{
64b66b76 1280 detailError(ERR_DETAIL_ICAP_XACT_BODY_CONSUMER_ABORT);
5f8252d2 1281 mustStop("adapted body consumer aborted");
774c051c 1282}
1283
c7d51c86
AR
1284Adaptation::Icap::ModXact::~ModXact()
1285{
1286 delete bodyParser;
69c698a3 1287 delete trailerParser;
c7d51c86
AR
1288}
1289
774c051c 1290// internal cleanup
26cc52cb 1291void Adaptation::Icap::ModXact::swanSong()
774c051c 1292{
5f8252d2 1293 debugs(93, 5, HERE << "swan sings" << status());
1294
c99de607 1295 stopWriting(false);
c824c43b 1296 stopSending(false);
774c051c 1297
64b66b76
CT
1298 if (theInitiator.set()) // we have not sent the answer to the initiator
1299 detailError(ERR_DETAIL_ICAP_XACT_OTHER);
1300
3ff65596 1301 // update adaptation history if start was called and we reserved a slot
a22e6cd3 1302 Adaptation::History::Pointer ah = virginRequest().adaptLogHistory();
3ff65596
AR
1303 if (ah != NULL && adaptHistoryId >= 0)
1304 ah->recordXactFinish(adaptHistoryId);
774c051c 1305
26cc52cb 1306 Adaptation::Icap::Xaction::swanSong();
774c051c 1307}
1308
41ebd397 1309void prepareLogWithRequestDetails(HttpRequest *, AccessLogEntry::Pointer &);
3ff65596
AR
1310
1311void Adaptation::Icap::ModXact::finalizeLogInfo()
1312{
bd59d61c
EB
1313 HttpRequest *adapted_request_ = nullptr;
1314 HttpReply *adapted_reply_ = nullptr;
a2958f2f 1315 HttpRequest *virgin_request_ = const_cast<HttpRequest*>(&virginRequest());
3ecb654f 1316 if (!(adapted_request_ = dynamic_cast<HttpRequest*>(adapted.header))) {
bd59d61c
EB
1317 // if the request was not adapted, use virgin request to simplify
1318 // the code further below
1319 adapted_request_ = virgin_request_;
1320 adapted_reply_ = dynamic_cast<HttpReply*>(adapted.header);
3ff65596
AR
1321 }
1322
a2958f2f 1323 Adaptation::Icap::History::Pointer h = virgin_request_->icapHistory();
e1381638
AJ
1324 Must(h != NULL); // ICAPXaction::maybeLog calls only if there is a log
1325 al.icp.opcode = ICP_INVALID;
1326 al.url = h->log_uri.termedBuf();
1327 const Adaptation::Icap::ServiceRep &s = service();
1328 al.icap.reqMethod = s.cfg().method;
3ff65596 1329
bd59d61c 1330 al.cache.caddr = virgin_request_->client_addr;
3ff65596 1331
bd59d61c 1332 al.request = virgin_request_;
b248c2a3 1333 HTTPMSGLOCK(al.request);
3ecb654f
CT
1334 al.adapted_request = adapted_request_;
1335 HTTPMSGLOCK(al.adapted_request);
1336
bd59d61c
EB
1337 if (adapted_reply_) {
1338 al.reply = adapted_reply_;
b248c2a3
AJ
1339 HTTPMSGLOCK(al.reply);
1340 } else
e1381638 1341 al.reply = NULL;
3ff65596 1342
e1381638
AJ
1343 if (h->rfc931.size())
1344 al.cache.rfc931 = h->rfc931.termedBuf();
3ff65596 1345
cb4f4424 1346#if USE_OPENSSL
e1381638
AJ
1347 if (h->ssluser.size())
1348 al.cache.ssluser = h->ssluser.termedBuf();
3ff65596 1349#endif
e1381638 1350 al.cache.code = h->logType;
bd59d61c 1351
63df1d28 1352 const Http::Message *virgin_msg = dynamic_cast<HttpReply*>(virgin.header);
bd59d61c
EB
1353 if (!virgin_msg)
1354 virgin_msg = virgin_request_;
1355 assert(virgin_msg != virgin.cause);
1356 al.http.clientRequestSz.header = virgin_msg->hdr_sz;
7171d5fb
CT
1357 if (virgin_msg->body_pipe != NULL)
1358 al.http.clientRequestSz.payloadData = virgin_msg->body_pipe->producedSize();
bae917ac
CT
1359
1360 // leave al.icap.bodyBytesRead negative if no body
1361 if (replyHttpHeaderSize >= 0 || replyHttpBodySize >= 0) {
1362 const int64_t zero = 0; // to make max() argument types the same
bd59d61c
EB
1363 const uint64_t headerSize = max(zero, replyHttpHeaderSize);
1364 const uint64_t bodySize = max(zero, replyHttpBodySize);
1365 al.icap.bodyBytesRead = headerSize + bodySize;
1366 al.http.clientReplySz.header = headerSize;
1367 al.http.clientReplySz.payloadData = bodySize;
bae917ac
CT
1368 }
1369
bd59d61c
EB
1370 if (adapted_reply_) {
1371 al.http.code = adapted_reply_->sline.status();
1372 al.http.content_type = adapted_reply_->content_type.termedBuf();
1373 if (replyHttpBodySize >= 0)
bae917ac 1374 al.cache.highOffset = replyHttpBodySize;
e1381638
AJ
1375 //don't set al.cache.objectSize because it hasn't exist yet
1376
e1381638 1377 MemBuf mb;
e1381638 1378 mb.init();
bd59d61c 1379 adapted_reply_->header.packInto(&mb);
e1381638 1380 al.headers.reply = xstrdup(mb.buf);
e1381638
AJ
1381 mb.clean();
1382 }
3ecb654f 1383 prepareLogWithRequestDetails(adapted_request_, alep);
e1381638 1384 Xaction::finalizeLogInfo();
3ff65596
AR
1385}
1386
26cc52cb 1387void Adaptation::Icap::ModXact::makeRequestHeaders(MemBuf &buf)
774c051c 1388{
cc192b50 1389 char ntoabuf[MAX_IPSTRLEN];
12b91c99 1390 /*
1391 * XXX These should use HttpHdr interfaces instead of Printfs
1392 */
0bef8dd7 1393 const Adaptation::ServiceConfig &s = service().cfg();
4391cd15
AJ
1394 buf.appendf("%s " SQUIDSTRINGPH " ICAP/1.0\r\n", s.methodStr(), SQUIDSTRINGPRINT(s.uri));
1395 buf.appendf("Host: " SQUIDSTRINGPH ":%d\r\n", SQUIDSTRINGPRINT(s.host), s.port);
1396 buf.appendf("Date: %s\r\n", mkrfc1123(squid_curtime));
12b91c99 1397
26cc52cb 1398 if (!TheConfig.reuse_connections)
4391cd15 1399 buf.appendf("Connection: close\r\n");
12b91c99 1400
cb72cd25
CT
1401 const HttpRequest *request = &virginRequest();
1402
2cdeea82 1403 // we must forward "Proxy-Authenticate" and "Proxy-Authorization"
1404 // as ICAP headers.
789217a2 1405 if (virgin.header->header.has(Http::HdrType::PROXY_AUTHENTICATE)) {
81ab22b6 1406 String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHENTICATE);
4391cd15 1407 buf.appendf("Proxy-Authenticate: " SQUIDSTRINGPH "\r\n",SQUIDSTRINGPRINT(vh));
4232c626 1408 }
9e008dda 1409
789217a2 1410 if (virgin.header->header.has(Http::HdrType::PROXY_AUTHORIZATION)) {
81ab22b6 1411 String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHORIZATION);
4391cd15 1412 buf.appendf("Proxy-Authorization: " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(vh));
b38b26cb 1413 } else if (request->extacl_user.size() > 0 && request->extacl_passwd.size() > 0) {
aadbbd7d
AJ
1414 struct base64_encode_ctx ctx;
1415 base64_encode_init(&ctx);
1d11e9b3 1416 char base64buf[base64_encode_len(MAX_LOGIN_SZ)];
aadbbd7d
AJ
1417 size_t resultLen = base64_encode_update(&ctx, base64buf, request->extacl_user.size(), reinterpret_cast<const uint8_t*>(request->extacl_user.rawBuf()));
1418 resultLen += base64_encode_update(&ctx, base64buf+resultLen, 1, reinterpret_cast<const uint8_t*>(":"));
1419 resultLen += base64_encode_update(&ctx, base64buf+resultLen, request->extacl_passwd.size(), reinterpret_cast<const uint8_t*>(request->extacl_passwd.rawBuf()));
1420 resultLen += base64_encode_final(&ctx, base64buf+resultLen);
4391cd15 1421 buf.appendf("Proxy-Authorization: Basic %.*s\r\n", (int)resultLen, base64buf);
4232c626 1422 }
2cdeea82 1423
3ff65596
AR
1424 // share the cross-transactional database records if needed
1425 if (Adaptation::Config::masterx_shared_name) {
ba8a478d 1426 Adaptation::History::Pointer ah = request->adaptHistory(false);
3ff65596
AR
1427 if (ah != NULL) {
1428 String name, value;
1429 if (ah->getXxRecord(name, value)) {
4391cd15 1430 buf.appendf(SQUIDSTRINGPH ": " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(name), SQUIDSTRINGPRINT(value));
3ff65596
AR
1431 }
1432 }
1433 }
e1381638 1434
4391cd15 1435 buf.append("Encapsulated: ", 14);
774c051c 1436
1437 MemBuf httpBuf;
12b91c99 1438
774c051c 1439 httpBuf.init();
1440
1441 // build HTTP request header, if any
1442 ICAP::Method m = s.method;
1443
5f8252d2 1444 // to simplify, we could assume that request is always available
c99de607 1445
c99de607 1446 if (request) {
c99de607 1447 if (ICAP::methodRespmod == m)
1448 encapsulateHead(buf, "req-hdr", httpBuf, request);
e1381638
AJ
1449 else if (ICAP::methodReqmod == m)
1450 encapsulateHead(buf, "req-hdr", httpBuf, virgin.header);
c99de607 1451 }
774c051c 1452
1453 if (ICAP::methodRespmod == m)
63df1d28 1454 if (const Http::Message *prime = virgin.header)
774c051c 1455 encapsulateHead(buf, "res-hdr", httpBuf, prime);
1456
1457 if (!virginBody.expected())
4391cd15 1458 buf.appendf("null-body=%d", (int) httpBuf.contentSize());
774c051c 1459 else if (ICAP::methodReqmod == m)
4391cd15 1460 buf.appendf("req-body=%d", (int) httpBuf.contentSize());
774c051c 1461 else
4391cd15 1462 buf.appendf("res-body=%d", (int) httpBuf.contentSize());
774c051c 1463
1464 buf.append(ICAP::crlf, 2); // terminate Encapsulated line
1465
c824c43b 1466 if (preview.enabled()) {
4391cd15 1467 buf.appendf("Preview: %d\r\n", (int)preview.ad());
83c51da9 1468 if (!virginBody.expected()) // there is no body to preview
5f8252d2 1469 finishNullOrEmptyBodyPreview(httpBuf);
774c051c 1470 }
1471
83c51da9 1472 makeAllowHeader(buf);
774c051c 1473
a9044668 1474 if (TheConfig.send_client_ip && request) {
b7ac5457 1475 Ip::Address client_addr;
57d76dd4 1476#if FOLLOW_X_FORWARDED_FOR
22fff3bf 1477 if (TheConfig.use_indirect_client) {
a9044668
A
1478 client_addr = request->indirect_client_addr;
1479 } else
57d76dd4 1480#endif
a9044668 1481 client_addr = request->client_addr;
4dd643d5 1482 if (!client_addr.isAnyAddr() && !client_addr.isNoAddr())
4391cd15 1483 buf.appendf("X-Client-IP: %s\r\n", client_addr.toStr(ntoabuf,MAX_IPSTRLEN));
57d76dd4 1484 }
a97e82a8 1485
22fff3bf 1486 if (TheConfig.send_username && request)
5f8252d2 1487 makeUsernameHeader(request, buf);
a97e82a8 1488
71be37e0 1489 // Adaptation::Config::metaHeaders
75d47340 1490 for (auto h: Adaptation::Config::metaHeaders) {
71be37e0 1491 HttpRequest *r = virgin.cause ?
71ee0835 1492 virgin.cause : dynamic_cast<HttpRequest*>(virgin.header);
71be37e0
CT
1493 Must(r);
1494
1495 HttpReply *reply = dynamic_cast<HttpReply*>(virgin.header);
1496
75d47340
CT
1497 SBuf matched;
1498 if (h->match(r, reply, alMaster, matched)) {
1499 buf.append(h->key().rawContent(), h->key().length());
1500 buf.append(": ", 2);
1501 buf.append(matched.rawContent(), matched.length());
1502 buf.append("\r\n", 2);
d7f4a0b7 1503 Adaptation::History::Pointer ah = request->adaptHistory(false);
cf9f0261
CT
1504 if (ah != NULL) {
1505 if (ah->metaHeaders == NULL)
1506 ah->metaHeaders = new NotePairs;
75d47340
CT
1507 if (!ah->metaHeaders->hasPair(h->key(), matched))
1508 ah->metaHeaders->add(h->key(), matched);
cf9f0261 1509 }
d7f4a0b7 1510 }
71be37e0
CT
1511 }
1512
bb790702 1513 // fprintf(stderr, "%s\n", buf.content());
a97e82a8 1514
774c051c 1515 buf.append(ICAP::crlf, 2); // terminate ICAP header
1516
a22e6cd3
AR
1517 // fill icapRequest for logging
1518 Must(icapRequest->parseCharBuf(buf.content(), buf.contentSize()));
1519
774c051c 1520 // start ICAP request body with encapsulated HTTP headers
1521 buf.append(httpBuf.content(), httpBuf.contentSize());
1522
1523 httpBuf.clean();
1524}
1525
83c51da9
CT
1526// decides which Allow values to write and updates the request buffer
1527void Adaptation::Icap::ModXact::makeAllowHeader(MemBuf &buf)
1528{
1529 const bool allow204in = preview.enabled(); // TODO: add shouldAllow204in()
1530 const bool allow204out = state.allowedPostview204 = shouldAllow204();
1531 const bool allow206in = state.allowedPreview206 = shouldAllow206in();
1532 const bool allow206out = state.allowedPostview206 = shouldAllow206out();
69c698a3 1533 const bool allowTrailers = true; // TODO: make configurable
83c51da9 1534
6fbd6ef2 1535 debugs(93, 9, "Allows: " << allow204in << allow204out <<
69c698a3 1536 allow206in << allow206out << allowTrailers);
83c51da9
CT
1537
1538 const bool allow204 = allow204in || allow204out;
1539 const bool allow206 = allow206in || allow206out;
1540
6fbd6ef2 1541 if (!allow204 && !allow206 && !allowTrailers)
83c51da9
CT
1542 return; // nothing to do
1543
1544 if (virginBody.expected()) // if there is a virgin body, plan to send it
1545 virginBodySending.plan();
1546
1547 // writing Preview:... means we will honor 204 inside preview
1548 // writing Allow/204 means we will honor 204 outside preview
1549 // writing Allow:206 means we will honor 206 inside preview
1550 // writing Allow:204,206 means we will honor 206 outside preview
69c698a3
EB
1551 if (allow204 || allow206 || allowTrailers) {
1552 buf.appendf("Allow: ");
1553 if (allow204out)
1554 buf.appendf("204, ");
1555 if (allow206)
1556 buf.appendf("206, ");
1557 if (allowTrailers)
1558 buf.appendf("trailers");
1559 buf.appendf("\r\n");
83c51da9
CT
1560 }
1561}
1562
26cc52cb 1563void Adaptation::Icap::ModXact::makeUsernameHeader(const HttpRequest *request, MemBuf &buf)
9e008dda 1564{
74f6c040 1565#if USE_AUTH
aadbbd7d
AJ
1566 struct base64_encode_ctx ctx;
1567 base64_encode_init(&ctx);
1568
1569 const char *value = NULL;
a33a428a 1570 if (request->auth_user_request != NULL) {
aadbbd7d 1571 value = request->auth_user_request->username();
b38b26cb 1572 } else if (request->extacl_user.size() > 0) {
aadbbd7d
AJ
1573 value = request->extacl_user.termedBuf();
1574 }
1575
1576 if (value) {
1577 if (TheConfig.client_username_encode) {
1d11e9b3 1578 char base64buf[base64_encode_len(MAX_LOGIN_SZ)];
aadbbd7d
AJ
1579 size_t resultLen = base64_encode_update(&ctx, base64buf, strlen(value), reinterpret_cast<const uint8_t*>(value));
1580 resultLen += base64_encode_final(&ctx, base64buf+resultLen);
4391cd15 1581 buf.appendf("%s: %.*s\r\n", TheConfig.client_username_header, (int)resultLen, base64buf);
aadbbd7d 1582 } else
4391cd15 1583 buf.appendf("%s: %s\r\n", TheConfig.client_username_header, value);
5f8252d2 1584 }
74f6c040 1585#endif
5f8252d2 1586}
1587
63df1d28
AJ
1588void
1589Adaptation::Icap::ModXact::encapsulateHead(MemBuf &icapBuf, const char *section, MemBuf &httpBuf, const Http::Message *head)
774c051c 1590{
1591 // update ICAP header
4391cd15 1592 icapBuf.appendf("%s=%d, ", section, (int) httpBuf.contentSize());
774c051c 1593
2cdeea82 1594 // begin cloning
63df1d28 1595 Http::MessagePointer headClone;
9e008dda 1596
2cdeea82 1597 if (const HttpRequest* old_request = dynamic_cast<const HttpRequest*>(head)) {
5ceaee75 1598 HttpRequest::Pointer new_request(new HttpRequest(old_request->masterXaction));
63df1d28 1599 // copy the request-line details
851feda6
AJ
1600 new_request->method = old_request->method;
1601 new_request->url = old_request->url;
2cdeea82 1602 new_request->http_ver = old_request->http_ver;
b248c2a3 1603 headClone = new_request.getRaw();
9e008dda 1604 } else if (const HttpReply *old_reply = dynamic_cast<const HttpReply*>(head)) {
c7d51c86 1605 HttpReply::Pointer new_reply(new HttpReply);
2cdeea82 1606 new_reply->sline = old_reply->sline;
b248c2a3 1607 headClone = new_reply.getRaw();
2cdeea82 1608 }
02dd0839 1609 Must(headClone);
d67acb4e 1610 headClone->inheritProperties(head);
9e008dda 1611
2cdeea82 1612 HttpHeaderPos pos = HttpHeaderInitPos;
02dd0839 1613 while (HttpHeaderEntry* p_head_entry = head->header.getEntry(&pos))
2cdeea82 1614 headClone->header.addEntry(p_head_entry->clone());
1615
1616 // end cloning
9e008dda 1617
2cdeea82 1618 // remove all hop-by-hop headers from the clone
789217a2 1619 headClone->header.delById(Http::HdrType::PROXY_AUTHENTICATE);
2cdeea82 1620 headClone->header.removeHopByHopEntries();
1621
1622 // pack polished HTTP header
b248c2a3 1623 packHead(httpBuf, headClone.getRaw());
2cdeea82 1624
c7d51c86 1625 // headClone unlocks and, hence, deletes the message we packed
774c051c 1626}
1627
63df1d28
AJ
1628void
1629Adaptation::Icap::ModXact::packHead(MemBuf &httpBuf, const Http::Message *head)
774c051c 1630{
10201568 1631 head->packInto(&httpBuf, true);
774c051c 1632}
1633
1634// decides whether to offer a preview and calculates its size
26cc52cb 1635void Adaptation::Icap::ModXact::decideOnPreview()
774c051c 1636{
26cc52cb 1637 if (!TheConfig.preview_enable) {
7cdbbd47 1638 debugs(93, 5, HERE << "preview disabled by squid.conf");
c824c43b 1639 return;
7cdbbd47 1640 }
1641
51b5dcf5 1642 const SBuf urlPath(virginRequest().url.path());
5f8252d2 1643 size_t wantedSize;
c99de607 1644 if (!service().wantsPreview(urlPath, wantedSize)) {
51b5dcf5 1645 debugs(93, 5, "should not offer preview for " << urlPath);
c824c43b 1646 return;
774c051c 1647 }
1648
c824c43b 1649 // we decided to do preview, now compute its size
1650
774c051c 1651 // cannot preview more than we can backup
d85c3078 1652 size_t ad = min(wantedSize, TheBackupLimit);
774c051c 1653
5f8252d2 1654 if (!virginBody.expected())
1655 ad = 0;
e1381638
AJ
1656 else if (virginBody.knownSize())
1657 ad = min(static_cast<uint64_t>(ad), virginBody.size()); // not more than we have
774c051c 1658
192378eb 1659 debugs(93, 5, HERE << "should offer " << ad << "-byte preview " <<
774c051c 1660 "(service wanted " << wantedSize << ")");
1661
1662 preview.enable(ad);
5f8252d2 1663 Must(preview.enabled());
774c051c 1664}
1665
1666// decides whether to allow 204 responses
26cc52cb 1667bool Adaptation::Icap::ModXact::shouldAllow204()
774c051c 1668{
1669 if (!service().allows204())
1670 return false;
1671
c824c43b 1672 return canBackupEverything();
1673}
1674
83c51da9
CT
1675// decides whether to allow 206 responses in some mode
1676bool Adaptation::Icap::ModXact::shouldAllow206any()
1677{
1678 return TheConfig.allow206_enable && service().allows206() &&
7ddcfbab 1679 virginBody.expected(); // no need for 206 without a body
83c51da9
CT
1680}
1681
1682// decides whether to allow 206 responses in preview mode
1683bool Adaptation::Icap::ModXact::shouldAllow206in()
1684{
1685 return shouldAllow206any() && preview.enabled();
1686}
1687
1688// decides whether to allow 206 responses outside of preview
1689bool Adaptation::Icap::ModXact::shouldAllow206out()
1690{
1691 return shouldAllow206any() && canBackupEverything();
1692}
1693
c824c43b 1694// used by shouldAllow204 and decideOnRetries
26cc52cb 1695bool Adaptation::Icap::ModXact::canBackupEverything() const
c824c43b 1696{
774c051c 1697 if (!virginBody.expected())
c824c43b 1698 return true; // no body means no problems with backup
774c051c 1699
c824c43b 1700 // if there is a body, check whether we can backup it all
774c051c 1701
1702 if (!virginBody.knownSize())
1703 return false;
1704
1705 // or should we have a different backup limit?
1706 // note that '<' allows for 0-termination of the "full" backup buffer
1707 return virginBody.size() < TheBackupLimit;
1708}
1709
c824c43b 1710// Decide whether this transaction can be retried if pconn fails
1711// Must be called after decideOnPreview and before openConnection()
26cc52cb 1712void Adaptation::Icap::ModXact::decideOnRetries()
c824c43b 1713{
1714 if (!isRetriable)
1715 return; // no, already decided
1716
1717 if (preview.enabled())
1718 return; // yes, because preview provides enough guarantees
1719
1720 if (canBackupEverything())
1721 return; // yes, because we can back everything up
1722
1723 disableRetries(); // no, because we cannot back everything up
1724}
1725
5f8252d2 1726// Normally, the body-writing code handles preview body. It can deal with
1727// bodies of unexpected size, including those that turn out to be empty.
1728// However, that code assumes that the body was expected and body control
1729// structures were initialized. This is not the case when there is no body
1730// or the body is known to be empty, because the virgin message will lack a
1731// body_pipe. So we handle preview of null-body and zero-size bodies here.
ced8def3 1732void Adaptation::Icap::ModXact::finishNullOrEmptyBodyPreview(MemBuf &)
5f8252d2 1733{
1734 Must(!virginBodyWriting.active()); // one reason we handle it here
1735 Must(!virgin.body_pipe); // another reason we handle it here
1736 Must(!preview.ad());
1737
1738 // do not add last-chunk because our Encapsulated header says null-body
bb790702 1739 // addLastRequestChunk(buf);
5f8252d2 1740 preview.wrote(0, true);
1741
1742 Must(preview.done());
1743 Must(preview.ieof());
1744}
1745
26cc52cb 1746void Adaptation::Icap::ModXact::fillPendingStatus(MemBuf &buf) const
774c051c 1747{
26cc52cb 1748 Adaptation::Icap::Xaction::fillPendingStatus(buf);
c99de607 1749
774c051c 1750 if (state.serviceWaiting)
1751 buf.append("U", 1);
1752
5f8252d2 1753 if (virgin.body_pipe != NULL)
c99de607 1754 buf.append("R", 1);
1755
aed188fd 1756 if (haveConnection() && !doneReading())
c99de607 1757 buf.append("r", 1);
1758
774c051c 1759 if (!state.doneWriting() && state.writing != State::writingInit)
4391cd15 1760 buf.appendf("w(%d)", state.writing);
774c051c 1761
1762 if (preview.enabled()) {
1763 if (!preview.done())
4391cd15 1764 buf.appendf("P(%d)", (int) preview.debt());
774c051c 1765 }
1766
5f8252d2 1767 if (virginBodySending.active())
774c051c 1768 buf.append("B", 1);
1769
1770 if (!state.doneParsing() && state.parsing != State::psIcapHeader)
4391cd15 1771 buf.appendf("p(%d)", state.parsing);
774c051c 1772
1773 if (!doneSending() && state.sending != State::sendingUndecided)
4391cd15 1774 buf.appendf("S(%d)", state.sending);
478cfe99 1775
83c51da9
CT
1776 if (state.readyForUob)
1777 buf.append("6", 1);
1778
478cfe99 1779 if (canStartBypass)
9e008dda 1780 buf.append("Y", 1);
a22e6cd3
AR
1781
1782 if (protectGroupBypass)
1783 buf.append("G", 1);
774c051c 1784}
1785
26cc52cb 1786void Adaptation::Icap::ModXact::fillDoneStatus(MemBuf &buf) const
774c051c 1787{
26cc52cb 1788 Adaptation::Icap::Xaction::fillDoneStatus(buf);
c99de607 1789
5f8252d2 1790 if (!virgin.body_pipe)
774c051c 1791 buf.append("R", 1);
1792
1793 if (state.doneWriting())
1794 buf.append("w", 1);
1795
1796 if (preview.enabled()) {
1797 if (preview.done())
4391cd15 1798 buf.appendf("P%s", preview.ieof() ? "(ieof)" : "");
774c051c 1799 }
1800
1801 if (doneReading())
1802 buf.append("r", 1);
1803
1804 if (state.doneParsing())
1805 buf.append("p", 1);
1806
1807 if (doneSending())
1808 buf.append("S", 1);
1809}
1810
26cc52cb 1811bool Adaptation::Icap::ModXact::gotEncapsulated(const char *section) const
774c051c 1812{
36c774f7
EB
1813 return !icapReply->header.getByNameListMember("Encapsulated",
1814 section, ',').isEmpty();
774c051c 1815}
1816
1817// calculate whether there is a virgin HTTP body and
1818// whether its expected size is known
5f8252d2 1819// TODO: rename because we do not just estimate
26cc52cb 1820void Adaptation::Icap::ModXact::estimateVirginBody()
774c051c 1821{
5f8252d2 1822 // note: lack of size info may disable previews and 204s
774c051c 1823
63df1d28 1824 Http::Message *msg = virgin.header;
5f8252d2 1825 Must(msg);
774c051c 1826
60745f24 1827 HttpRequestMethod method;
774c051c 1828
5f8252d2 1829 if (virgin.cause)
1830 method = virgin.cause->method;
e1381638
AJ
1831 else if (HttpRequest *req = dynamic_cast<HttpRequest*>(msg))
1832 method = req->method;
774c051c 1833 else
c2a7cefd 1834 method = Http::METHOD_NONE;
774c051c 1835
47f6e231 1836 int64_t size;
5f8252d2 1837 // expectingBody returns true for zero-sized bodies, but we will not
1838 // get a pipe for that body, so we treat the message as bodyless
c2a7cefd 1839 if (method != Http::METHOD_NONE && msg->expectingBody(method, size) && size) {
192378eb 1840 debugs(93, 6, HERE << "expects virgin body from " <<
9e008dda 1841 virgin.body_pipe << "; size: " << size);
5f8252d2 1842
1843 virginBody.expect(size);
1844 virginBodyWriting.plan();
1845
1846 // sign up as a body consumer
1847 Must(msg->body_pipe != NULL);
1848 Must(msg->body_pipe == virgin.body_pipe);
1849 Must(virgin.body_pipe->setConsumerIfNotLate(this));
1850
1851 // make sure TheBackupLimit is in-sync with the buffer size
9c175897 1852 Must(TheBackupLimit <= static_cast<size_t>(msg->body_pipe->buf().max_capacity));
774c051c 1853 } else {
192378eb 1854 debugs(93, 6, HERE << "does not expect virgin body");
5f8252d2 1855 Must(msg->body_pipe == NULL);
1856 checkConsuming();
774c051c 1857 }
1858}
1859
26cc52cb 1860void Adaptation::Icap::ModXact::makeAdaptedBodyPipe(const char *what)
9e008dda 1861{
5f8252d2 1862 Must(!adapted.body_pipe);
1863 Must(!adapted.header->body_pipe);
1864 adapted.header->body_pipe = new BodyPipe(this);
1865 adapted.body_pipe = adapted.header->body_pipe;
1866 debugs(93, 7, HERE << "will supply " << what << " via " <<
9e008dda 1867 adapted.body_pipe << " pipe");
5f8252d2 1868}
1869
26cc52cb 1870// TODO: Move SizedEstimate and Preview elsewhere
774c051c 1871
26cc52cb 1872Adaptation::Icap::SizedEstimate::SizedEstimate()
f53969cc 1873 : theData(dtUnexpected)
774c051c 1874{}
1875
26cc52cb 1876void Adaptation::Icap::SizedEstimate::expect(int64_t aSize)
774c051c 1877{
47f6e231 1878 theData = (aSize >= 0) ? aSize : (int64_t)dtUnknown;
774c051c 1879}
1880
26cc52cb 1881bool Adaptation::Icap::SizedEstimate::expected() const
774c051c 1882{
1883 return theData != dtUnexpected;
1884}
1885
26cc52cb 1886bool Adaptation::Icap::SizedEstimate::knownSize() const
774c051c 1887{
1888 Must(expected());
1889 return theData != dtUnknown;
1890}
1891
26cc52cb 1892uint64_t Adaptation::Icap::SizedEstimate::size() const
774c051c 1893{
1894 Must(knownSize());
47f6e231 1895 return static_cast<uint64_t>(theData);
774c051c 1896}
1897
26cc52cb 1898Adaptation::Icap::VirginBodyAct::VirginBodyAct(): theStart(0), theState(stUndecided)
774c051c 1899{}
1900
26cc52cb 1901void Adaptation::Icap::VirginBodyAct::plan()
774c051c 1902{
478cfe99 1903 Must(!disabled());
1904 Must(!theStart); // not started
1905 theState = stActive;
774c051c 1906}
1907
26cc52cb 1908void Adaptation::Icap::VirginBodyAct::disable()
774c051c 1909{
478cfe99 1910 theState = stDisabled;
774c051c 1911}
1912
26cc52cb 1913void Adaptation::Icap::VirginBodyAct::progress(size_t size)
774c051c 1914{
1915 Must(active());
46e172d9
FC
1916#if SIZEOF_SIZE_T > 4
1917 /* always true for smaller size_t's */
d897ae49 1918 Must(static_cast<int64_t>(size) >= 0);
46e172d9 1919#endif
47f6e231 1920 theStart += static_cast<int64_t>(size);
774c051c 1921}
1922
26cc52cb 1923uint64_t Adaptation::Icap::VirginBodyAct::offset() const
774c051c 1924{
1925 Must(active());
47f6e231 1926 return static_cast<uint64_t>(theStart);
774c051c 1927}
1928
26cc52cb 1929Adaptation::Icap::Preview::Preview(): theWritten(0), theAd(0), theState(stDisabled)
774c051c 1930{}
1931
26cc52cb 1932void Adaptation::Icap::Preview::enable(size_t anAd)
774c051c 1933{
1934 // TODO: check for anAd not exceeding preview size limit
774c051c 1935 Must(!enabled());
1936 theAd = anAd;
1937 theState = stWriting;
1938}
1939
26cc52cb 1940bool Adaptation::Icap::Preview::enabled() const
774c051c 1941{
1942 return theState != stDisabled;
1943}
1944
26cc52cb 1945size_t Adaptation::Icap::Preview::ad() const
774c051c 1946{
1947 Must(enabled());
1948 return theAd;
1949}
1950
26cc52cb 1951bool Adaptation::Icap::Preview::done() const
774c051c 1952{
1953 Must(enabled());
1954 return theState >= stIeof;
1955}
1956
26cc52cb 1957bool Adaptation::Icap::Preview::ieof() const
774c051c 1958{
1959 Must(enabled());
1960 return theState == stIeof;
1961}
1962
26cc52cb 1963size_t Adaptation::Icap::Preview::debt() const
774c051c 1964{
1965 Must(enabled());
1966 return done() ? 0 : (theAd - theWritten);
1967}
1968
26cc52cb 1969void Adaptation::Icap::Preview::wrote(size_t size, bool wroteEof)
774c051c 1970{
1971 Must(enabled());
5f8252d2 1972
774c051c 1973 theWritten += size;
1974
9e008dda 1975 Must(theWritten <= theAd);
5f8252d2 1976
9e008dda
AJ
1977 if (wroteEof)
1978 theState = stIeof; // written size is irrelevant
e1381638
AJ
1979 else if (theWritten >= theAd)
1980 theState = stDone;
774c051c 1981}
1982
26cc52cb 1983bool Adaptation::Icap::ModXact::fillVirginHttpHeader(MemBuf &mb) const
3cfc19b3 1984{
5f8252d2 1985 if (virgin.header == NULL)
3cfc19b3 1986 return false;
1987
5f8252d2 1988 virgin.header->firstLineBuf(mb);
3cfc19b3 1989
1990 return true;
1991}
c824c43b 1992
64b66b76
CT
1993void Adaptation::Icap::ModXact::detailError(int errDetail)
1994{
e9fa5493
AR
1995 HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header);
1996 // if no adapted request, update virgin (and inherit its properties later)
1997 // TODO: make this and HttpRequest::detailError constant, like adaptHistory
1998 if (!request)
1999 request = const_cast<HttpRequest*>(&virginRequest());
2000
2001 if (request)
64b66b76 2002 request->detailError(ERR_ICAP_FAILURE, errDetail);
64b66b76 2003}
c824c43b 2004
129fe2a1
CT
2005void Adaptation::Icap::ModXact::clearError()
2006{
87f237a9 2007 HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header);
129fe2a1
CT
2008 // if no adapted request, update virgin (and inherit its properties later)
2009 if (!request)
2010 request = const_cast<HttpRequest*>(&virginRequest());
2011
2012 if (request)
2013 request->clearError();
2014}
2015
88df846b
CT
2016void Adaptation::Icap::ModXact::updateSources()
2017{
2018 Must(adapted.header);
63df1d28 2019 adapted.header->sources |= (service().cfg().connectionEncryption ? Http::Message::srcIcaps : Http::Message::srcIcap);
88df846b
CT
2020}
2021
26cc52cb 2022/* Adaptation::Icap::ModXactLauncher */
c824c43b 2023
63df1d28 2024Adaptation::Icap::ModXactLauncher::ModXactLauncher(Http::Message *virginHeader, HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::ServicePointer aService):
f53969cc
SM
2025 AsyncJob("Adaptation::Icap::ModXactLauncher"),
2026 Adaptation::Icap::Launcher("Adaptation::Icap::ModXactLauncher", aService),
2027 al(alp)
c824c43b 2028{
2029 virgin.setHeader(virginHeader);
2030 virgin.setCause(virginCause);
3ff65596 2031 updateHistory(true);
c824c43b 2032}
2033
26cc52cb 2034Adaptation::Icap::Xaction *Adaptation::Icap::ModXactLauncher::createXaction()
c824c43b 2035{
26cc52cb
AR
2036 Adaptation::Icap::ServiceRep::Pointer s =
2037 dynamic_cast<Adaptation::Icap::ServiceRep*>(theService.getRaw());
0bef8dd7 2038 Must(s != NULL);
af0ded40 2039 return new Adaptation::Icap::ModXact(virgin.header, virgin.cause, al, s);
c824c43b 2040}
3ff65596 2041
e1381638
AJ
2042void Adaptation::Icap::ModXactLauncher::swanSong()
2043{
3ff65596
AR
2044 debugs(93, 5, HERE << "swan sings");
2045 updateHistory(false);
2046 Adaptation::Icap::Launcher::swanSong();
2047}
2048
b0365bd9 2049void Adaptation::Icap::ModXactLauncher::updateHistory(bool doStart)
e1381638
AJ
2050{
2051 HttpRequest *r = virgin.cause ?
2052 virgin.cause : dynamic_cast<HttpRequest*>(virgin.header);
2053
2054 // r should never be NULL but we play safe; TODO: add Should()
2055 if (r) {
2056 Adaptation::Icap::History::Pointer h = r->icapHistory();
2057 if (h != NULL) {
b0365bd9 2058 if (doStart)
e1381638
AJ
2059 h->start("ICAPModXactLauncher");
2060 else
2061 h->stop("ICAPModXactLauncher");
2062 }
2063 }
3ff65596 2064}
f53969cc 2065
69c698a3 2066bool Adaptation::Icap::TrailerParser::parse(const char *buf, int len, int atEnd, Http::StatusCode *error) {
4f1c93a7
EB
2067 Http::ContentLengthInterpreter clen;
2068 // RFC 7230 section 4.1.2: MUST NOT generate a trailer that contains
2069 // a field necessary for message framing (e.g., Transfer-Encoding and Content-Length)
2070 clen.applyTrailerRules();
2071 const int parsed = trailer.parse(buf, len, atEnd, hdr_sz, clen);
69c698a3
EB
2072 if (parsed < 0)
2073 *error = Http::scInvalidHeader; // TODO: should we add a new Http::scInvalidTrailer?
2074 return parsed > 0;
2075}
2076