]>
Commit | Line | Data |
---|---|---|
774c051c | 1 | /* |
4ac4a490 | 2 | * Copyright (C) 1996-2017 The Squid Software Foundation and contributors |
bbc27441 AJ |
3 | * |
4 | * Squid software is distributed under GPLv2+ license and includes | |
5 | * contributions from numerous individuals and organizations. | |
6 | * Please see the COPYING and CONTRIBUTORS files for details. | |
774c051c | 7 | */ |
8 | ||
bbc27441 AJ |
9 | /* DEBUG: section 93 ICAP (RFC 3507) Client */ |
10 | ||
582c2af2 | 11 | #include "squid.h" |
3d93a84d | 12 | #include "AccessLogEntry.h" |
1adcebc3 | 13 | #include "adaptation/Answer.h" |
3d93a84d AJ |
14 | #include "adaptation/History.h" |
15 | #include "adaptation/icap/Client.h" | |
16 | #include "adaptation/icap/Config.h" | |
17 | #include "adaptation/icap/History.h" | |
18 | #include "adaptation/icap/Launcher.h" | |
19 | #include "adaptation/icap/ModXact.h" | |
20 | #include "adaptation/icap/ServiceRep.h" | |
21 | #include "adaptation/Initiator.h" | |
22 | #include "auth/UserRequest.h" | |
23 | #include "base/TextException.h" | |
25f98340 | 24 | #include "base64.h" |
774c051c | 25 | #include "comm.h" |
d6327017 | 26 | #include "comm/Connection.h" |
582c2af2 | 27 | #include "err_detail_type.h" |
db1720f8 | 28 | #include "http/one/TeChunkedParser.h" |
a5bac1d2 | 29 | #include "HttpHeaderTools.h" |
774c051c | 30 | #include "HttpReply.h" |
985c86bc | 31 | #include "SquidTime.h" |
b1bd952a | 32 | #include "URL.h" |
774c051c | 33 | |
34 | // flow and terminology: | |
35 | // HTTP| --> receive --> encode --> write --> |network | |
36 | // end | <-- send <-- parse <-- read <-- |end | |
37 | ||
774c051c | 38 | // TODO: replace gotEncapsulated() with something faster; we call it often |
39 | ||
26cc52cb AR |
40 | CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXact); |
41 | CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXactLauncher); | |
774c051c | 42 | |
5f8252d2 | 43 | static const size_t TheBackupLimit = BodyPipe::MaxCapacity; |
774c051c | 44 | |
26cc52cb | 45 | Adaptation::Icap::ModXact::State::State() |
774c051c | 46 | { |
09bfe95f | 47 | memset(this, 0, sizeof(*this)); |
774c051c | 48 | } |
49 | ||
63df1d28 | 50 | Adaptation::Icap::ModXact::ModXact(Http::Message *virginHeader, |
af0ded40 | 51 | HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::Icap::ServiceRep::Pointer &aService): |
f53969cc SM |
52 | AsyncJob("Adaptation::Icap::ModXact"), |
53 | Adaptation::Icap::Xaction("Adaptation::Icap::ModXact", aService), | |
54 | virginConsumed(0), | |
55 | bodyParser(NULL), | |
56 | canStartBypass(false), // too early | |
57 | protectGroupBypass(true), | |
58 | replyHttpHeaderSize(-1), | |
59 | replyHttpBodySize(-1), | |
60 | adaptHistoryId(-1), | |
69c698a3 | 61 | trailerParser(nullptr), |
f53969cc | 62 | alMaster(alp) |
774c051c | 63 | { |
5f8252d2 | 64 | assert(virginHeader); |
774c051c | 65 | |
5f8252d2 | 66 | virgin.setHeader(virginHeader); // sets virgin.body_pipe if needed |
67 | virgin.setCause(virginCause); // may be NULL | |
774c051c | 68 | |
5f8252d2 | 69 | // adapted header and body are initialized when we parse them |
774c051c | 70 | |
26cc52cb | 71 | // writing and reading ends are handled by Adaptation::Icap::Xaction |
774c051c | 72 | |
73 | // encoding | |
74 | // nothing to do because we are using temporary buffers | |
75 | ||
3ff65596 | 76 | // parsing; TODO: do not set until we parse, see ICAPOptXact |
c7d51c86 | 77 | icapReply = new HttpReply; |
774c051c | 78 | icapReply->protoPrefix = "ICAP/"; // TODO: make an IcapReply class? |
79 | ||
192378eb | 80 | debugs(93,7, HERE << "initialized." << status()); |
774c051c | 81 | } |
82 | ||
5f8252d2 | 83 | // initiator wants us to start |
26cc52cb | 84 | void Adaptation::Icap::ModXact::start() |
774c051c | 85 | { |
26cc52cb | 86 | Adaptation::Icap::Xaction::start(); |
774c051c | 87 | |
3ff65596 | 88 | // reserve an adaptation history slot (attempts are known at this time) |
a22e6cd3 | 89 | Adaptation::History::Pointer ah = virginRequest().adaptLogHistory(); |
3ff65596 AR |
90 | if (ah != NULL) |
91 | adaptHistoryId = ah->recordXactStart(service().cfg().key, icap_tr_start, attempts > 1); | |
92 | ||
774c051c | 93 | estimateVirginBody(); // before virgin disappears! |
94 | ||
0bef8dd7 | 95 | canStartBypass = service().cfg().bypass; |
478cfe99 | 96 | |
774c051c | 97 | // it is an ICAP violation to send request to a service w/o known OPTIONS |
2dba5b8e CT |
98 | // and the service may is too busy for us: honor Max-Connections and such |
99 | if (service().up() && service().availableForNew()) | |
774c051c | 100 | startWriting(); |
101 | else | |
102 | waitForService(); | |
774c051c | 103 | } |
104 | ||
26cc52cb | 105 | void Adaptation::Icap::ModXact::waitForService() |
774c051c | 106 | { |
2dba5b8e | 107 | const char *comment; |
774c051c | 108 | Must(!state.serviceWaiting); |
2dba5b8e CT |
109 | |
110 | if (!service().up()) { | |
111 | AsyncCall::Pointer call = JobCallback(93,5, | |
112 | ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceReady); | |
113 | ||
114 | service().callWhenReady(call); | |
115 | comment = "to be up"; | |
116 | } else { | |
117 | //The service is unavailable because of max-connection or other reason | |
118 | ||
119 | if (service().cfg().onOverload != srvWait) { | |
120 | // The service is overloaded, but waiting to be available prohibited by | |
121 | // user configuration (onOverload is set to "block" or "bypass") | |
122 | if (service().cfg().onOverload == srvBlock) | |
123 | disableBypass("not available", true); | |
124 | else //if (service().cfg().onOverload == srvBypass) | |
125 | canStartBypass = true; | |
126 | ||
127 | disableRetries(); | |
128 | disableRepeats("ICAP service is not available"); | |
129 | ||
130 | debugs(93, 7, HERE << "will not wait for the service to be available" << | |
131 | status()); | |
132 | ||
133 | throw TexcHere("ICAP service is not available"); | |
134 | } | |
135 | ||
136 | AsyncCall::Pointer call = JobCallback(93,5, | |
137 | ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceAvailable); | |
138 | service().callWhenAvailable(call, state.waitedForService); | |
139 | comment = "to be available"; | |
140 | } | |
141 | ||
142 | debugs(93, 7, HERE << "will wait for the service " << comment << status()); | |
c7d51c86 | 143 | state.serviceWaiting = true; // after callWhenReady() which may throw |
2dba5b8e | 144 | state.waitedForService = true; |
774c051c | 145 | } |
146 | ||
26cc52cb | 147 | void Adaptation::Icap::ModXact::noteServiceReady() |
774c051c | 148 | { |
774c051c | 149 | Must(state.serviceWaiting); |
150 | state.serviceWaiting = false; | |
c99de607 | 151 | |
2dba5b8e | 152 | if (!service().up()) { |
c824c43b | 153 | disableRetries(); |
3ff65596 | 154 | disableRepeats("ICAP service is unusable"); |
478cfe99 | 155 | throw TexcHere("ICAP service is unusable"); |
c824c43b | 156 | } |
2dba5b8e CT |
157 | |
158 | if (service().availableForOld()) | |
159 | startWriting(); | |
160 | else | |
161 | waitForService(); | |
162 | } | |
163 | ||
164 | void Adaptation::Icap::ModXact::noteServiceAvailable() | |
165 | { | |
166 | Must(state.serviceWaiting); | |
167 | state.serviceWaiting = false; | |
168 | ||
169 | if (service().up() && service().availableForOld()) | |
170 | startWriting(); | |
171 | else | |
172 | waitForService(); | |
774c051c | 173 | } |
174 | ||
26cc52cb | 175 | void Adaptation::Icap::ModXact::startWriting() |
774c051c | 176 | { |
774c051c | 177 | state.writing = State::writingConnect; |
c824c43b | 178 | |
179 | decideOnPreview(); // must be decided before we decideOnRetries | |
180 | decideOnRetries(); | |
181 | ||
774c051c | 182 | openConnection(); |
774c051c | 183 | } |
184 | ||
185 | // connection with the ICAP service established | |
26cc52cb | 186 | void Adaptation::Icap::ModXact::handleCommConnected() |
774c051c | 187 | { |
188 | Must(state.writing == State::writingConnect); | |
189 | ||
190 | startReading(); // wait for early errors from the ICAP server | |
191 | ||
192 | MemBuf requestBuf; | |
193 | requestBuf.init(); | |
194 | ||
195 | makeRequestHeaders(requestBuf); | |
192378eb | 196 | debugs(93, 9, HERE << "will write" << status() << ":\n" << |
774c051c | 197 | (requestBuf.terminate(), requestBuf.content())); |
198 | ||
199 | // write headers | |
200 | state.writing = State::writingHeaders; | |
3ff65596 | 201 | icap_tio_start = current_time; |
774c051c | 202 | scheduleWrite(requestBuf); |
203 | } | |
204 | ||
26cc52cb | 205 | void Adaptation::Icap::ModXact::handleCommWrote(size_t sz) |
774c051c | 206 | { |
b107a5a5 | 207 | debugs(93, 5, HERE << "Wrote " << sz << " bytes"); |
208 | ||
774c051c | 209 | if (state.writing == State::writingHeaders) |
210 | handleCommWroteHeaders(); | |
211 | else | |
212 | handleCommWroteBody(); | |
213 | } | |
214 | ||
26cc52cb | 215 | void Adaptation::Icap::ModXact::handleCommWroteHeaders() |
774c051c | 216 | { |
217 | Must(state.writing == State::writingHeaders); | |
218 | ||
5f8252d2 | 219 | // determine next step |
23e05fb1 AR |
220 | if (preview.enabled()) { |
221 | if (preview.done()) | |
222 | decideWritingAfterPreview("zero-size"); | |
223 | else | |
224 | state.writing = State::writingPreview; | |
225 | } else if (virginBody.expected()) { | |
e1381638 | 226 | state.writing = State::writingPrime; |
23e05fb1 | 227 | } else { |
e1381638 AJ |
228 | stopWriting(true); |
229 | return; | |
230 | } | |
5f8252d2 | 231 | |
232 | writeMore(); | |
774c051c | 233 | } |
234 | ||
26cc52cb | 235 | void Adaptation::Icap::ModXact::writeMore() |
774c051c | 236 | { |
5f8252d2 | 237 | debugs(93, 5, HERE << "checking whether to write more" << status()); |
238 | ||
bd7f2ede | 239 | if (writer != NULL) // already writing something |
774c051c | 240 | return; |
241 | ||
242 | switch (state.writing) { | |
243 | ||
244 | case State::writingInit: // waiting for service OPTIONS | |
245 | Must(state.serviceWaiting); | |
246 | ||
247 | case State::writingConnect: // waiting for the connection to establish | |
248 | ||
249 | case State::writingHeaders: // waiting for the headers to be written | |
250 | ||
251 | case State::writingPaused: // waiting for the ICAP server response | |
252 | ||
c99de607 | 253 | case State::writingReallyDone: // nothing more to write |
254 | return; | |
255 | ||
256 | case State::writingAlmostDone: // was waiting for the last write | |
257 | stopWriting(false); | |
774c051c | 258 | return; |
259 | ||
260 | case State::writingPreview: | |
5f8252d2 | 261 | writePreviewBody(); |
774c051c | 262 | return; |
263 | ||
264 | case State::writingPrime: | |
265 | writePrimeBody(); | |
266 | return; | |
267 | ||
268 | default: | |
26cc52cb | 269 | throw TexcHere("Adaptation::Icap::ModXact in bad writing state"); |
774c051c | 270 | } |
271 | } | |
272 | ||
26cc52cb | 273 | void Adaptation::Icap::ModXact::writePreviewBody() |
774c051c | 274 | { |
5f8252d2 | 275 | debugs(93, 8, HERE << "will write Preview body from " << |
9e008dda | 276 | virgin.body_pipe << status()); |
774c051c | 277 | Must(state.writing == State::writingPreview); |
5f8252d2 | 278 | Must(virgin.body_pipe != NULL); |
774c051c | 279 | |
5f8252d2 | 280 | const size_t sizeMax = (size_t)virgin.body_pipe->buf().contentSize(); |
d85c3078 | 281 | const size_t size = min(preview.debt(), sizeMax); |
774c051c | 282 | writeSomeBody("preview body", size); |
283 | ||
284 | // change state once preview is written | |
285 | ||
23e05fb1 AR |
286 | if (preview.done()) |
287 | decideWritingAfterPreview("body"); | |
288 | } | |
774c051c | 289 | |
23e05fb1 AR |
290 | /// determine state.writing after we wrote the entire preview |
291 | void Adaptation::Icap::ModXact::decideWritingAfterPreview(const char *kind) | |
292 | { | |
293 | if (preview.ieof()) // nothing more to write | |
294 | stopWriting(true); | |
e81d21e0 | 295 | else if (state.parsing == State::psIcapHeader) // did not get a reply yet |
23e05fb1 AR |
296 | state.writing = State::writingPaused; // wait for the ICAP server reply |
297 | else | |
298 | stopWriting(true); // ICAP server reply implies no post-preview writing | |
299 | ||
300 | debugs(93, 6, HERE << "decided on writing after " << kind << " preview" << | |
e81d21e0 | 301 | status()); |
774c051c | 302 | } |
303 | ||
26cc52cb | 304 | void Adaptation::Icap::ModXact::writePrimeBody() |
774c051c | 305 | { |
306 | Must(state.writing == State::writingPrime); | |
5f8252d2 | 307 | Must(virginBodyWriting.active()); |
774c051c | 308 | |
5f8252d2 | 309 | const size_t size = (size_t)virgin.body_pipe->buf().contentSize(); |
774c051c | 310 | writeSomeBody("prime virgin body", size); |
311 | ||
5f8252d2 | 312 | if (virginBodyEndReached(virginBodyWriting)) { |
313 | debugs(93, 5, HERE << "wrote entire body"); | |
c99de607 | 314 | stopWriting(true); |
b107a5a5 | 315 | } |
774c051c | 316 | } |
317 | ||
26cc52cb | 318 | void Adaptation::Icap::ModXact::writeSomeBody(const char *label, size_t size) |
774c051c | 319 | { |
c99de607 | 320 | Must(!writer && state.writing < state.writingAlmostDone); |
5f8252d2 | 321 | Must(virgin.body_pipe != NULL); |
12f4b710 | 322 | debugs(93, 8, HERE << "will write up to " << size << " bytes of " << |
774c051c | 323 | label); |
324 | ||
325 | MemBuf writeBuf; // TODO: suggest a min size based on size and lastChunk | |
326 | ||
327 | writeBuf.init(); // note: we assume that last-chunk will fit | |
328 | ||
5f8252d2 | 329 | const size_t writableSize = virginContentSize(virginBodyWriting); |
d85c3078 | 330 | const size_t chunkSize = min(writableSize, size); |
774c051c | 331 | |
332 | if (chunkSize) { | |
12f4b710 | 333 | debugs(93, 7, HERE << "will write " << chunkSize << |
774c051c | 334 | "-byte chunk of " << label); |
5f8252d2 | 335 | |
336 | openChunk(writeBuf, chunkSize, false); | |
337 | writeBuf.append(virginContentData(virginBodyWriting), chunkSize); | |
338 | closeChunk(writeBuf); | |
339 | ||
340 | virginBodyWriting.progress(chunkSize); | |
341 | virginConsume(); | |
774c051c | 342 | } else { |
192378eb | 343 | debugs(93, 7, HERE << "has no writable " << label << " content"); |
774c051c | 344 | } |
345 | ||
5f8252d2 | 346 | const bool wroteEof = virginBodyEndReached(virginBodyWriting); |
347 | bool lastChunk = wroteEof; | |
348 | if (state.writing == State::writingPreview) { | |
349 | preview.wrote(chunkSize, wroteEof); // even if wrote nothing | |
350 | lastChunk = lastChunk || preview.done(); | |
351 | } | |
774c051c | 352 | |
5f8252d2 | 353 | if (lastChunk) { |
12f4b710 | 354 | debugs(93, 8, HERE << "will write last-chunk of " << label); |
774c051c | 355 | addLastRequestChunk(writeBuf); |
356 | } | |
357 | ||
12f4b710 | 358 | debugs(93, 7, HERE << "will write " << writeBuf.contentSize() |
774c051c | 359 | << " raw bytes of " << label); |
360 | ||
361 | if (writeBuf.hasContent()) { | |
362 | scheduleWrite(writeBuf); // comm will free the chunk | |
363 | } else { | |
364 | writeBuf.clean(); | |
365 | } | |
366 | } | |
367 | ||
26cc52cb | 368 | void Adaptation::Icap::ModXact::addLastRequestChunk(MemBuf &buf) |
774c051c | 369 | { |
c99de607 | 370 | const bool ieof = state.writing == State::writingPreview && preview.ieof(); |
371 | openChunk(buf, 0, ieof); | |
372 | closeChunk(buf); | |
774c051c | 373 | } |
374 | ||
26cc52cb | 375 | void Adaptation::Icap::ModXact::openChunk(MemBuf &buf, size_t chunkSize, bool ieof) |
774c051c | 376 | { |
4391cd15 | 377 | buf.appendf((ieof ? "%x; ieof\r\n" : "%x\r\n"), (int) chunkSize); |
774c051c | 378 | } |
379 | ||
26cc52cb | 380 | void Adaptation::Icap::ModXact::closeChunk(MemBuf &buf) |
774c051c | 381 | { |
774c051c | 382 | buf.append(ICAP::crlf, 2); // chunk-terminating CRLF |
383 | } | |
384 | ||
3ff65596 AR |
385 | const HttpRequest &Adaptation::Icap::ModXact::virginRequest() const |
386 | { | |
387 | const HttpRequest *request = virgin.cause ? | |
e1381638 | 388 | virgin.cause : dynamic_cast<const HttpRequest*>(virgin.header); |
3ff65596 AR |
389 | Must(request); |
390 | return *request; | |
391 | } | |
392 | ||
5f8252d2 | 393 | // did the activity reached the end of the virgin body? |
26cc52cb | 394 | bool Adaptation::Icap::ModXact::virginBodyEndReached(const Adaptation::Icap::VirginBodyAct &act) const |
5f8252d2 | 395 | { |
9e008dda | 396 | return |
5f8252d2 | 397 | !act.active() || // did all (assuming it was originally planned) |
398 | !virgin.body_pipe->expectMoreAfter(act.offset()); // wont have more | |
399 | } | |
400 | ||
401 | // the size of buffered virgin body data available for the specified activity | |
402 | // if this size is zero, we may be done or may be waiting for more data | |
26cc52cb | 403 | size_t Adaptation::Icap::ModXact::virginContentSize(const Adaptation::Icap::VirginBodyAct &act) const |
774c051c | 404 | { |
5f8252d2 | 405 | Must(act.active()); |
406 | // asbolute start of unprocessed data | |
b0365bd9 | 407 | const uint64_t dataStart = act.offset(); |
5f8252d2 | 408 | // absolute end of buffered data |
b0365bd9 FC |
409 | const uint64_t dataEnd = virginConsumed + virgin.body_pipe->buf().contentSize(); |
410 | Must(virginConsumed <= dataStart && dataStart <= dataEnd); | |
411 | return static_cast<size_t>(dataEnd - dataStart); | |
774c051c | 412 | } |
413 | ||
5f8252d2 | 414 | // pointer to buffered virgin body data available for the specified activity |
26cc52cb | 415 | const char *Adaptation::Icap::ModXact::virginContentData(const Adaptation::Icap::VirginBodyAct &act) const |
774c051c | 416 | { |
5f8252d2 | 417 | Must(act.active()); |
b0365bd9 FC |
418 | const uint64_t dataStart = act.offset(); |
419 | Must(virginConsumed <= dataStart); | |
420 | return virgin.body_pipe->buf().content() + static_cast<size_t>(dataStart-virginConsumed); | |
774c051c | 421 | } |
422 | ||
26cc52cb | 423 | void Adaptation::Icap::ModXact::virginConsume() |
774c051c | 424 | { |
3ff65596 | 425 | debugs(93, 9, HERE << "consumption guards: " << !virgin.body_pipe << isRetriable << |
a22e6cd3 | 426 | isRepeatable << canStartBypass << protectGroupBypass); |
478cfe99 | 427 | |
5f8252d2 | 428 | if (!virgin.body_pipe) |
c824c43b | 429 | return; // nothing to consume |
430 | ||
431 | if (isRetriable) | |
432 | return; // do not consume if we may have to retry later | |
5f8252d2 | 433 | |
434 | BodyPipe &bp = *virgin.body_pipe; | |
a22e6cd3 | 435 | const bool wantToPostpone = isRepeatable || canStartBypass || protectGroupBypass; |
478cfe99 | 436 | |
437 | // Why > 2? HttpState does not use the last bytes in the buffer | |
9e008dda | 438 | // because delayAwareRead() is arguably broken. See |
478cfe99 | 439 | // HttpStateData::maybeReadVirginBody for more details. |
3ff65596 | 440 | if (wantToPostpone && bp.buf().spaceSize() > 2) { |
478cfe99 | 441 | // Postponing may increase memory footprint and slow the HTTP side |
9e008dda | 442 | // down. Not postponing may increase the number of ICAP errors |
478cfe99 | 443 | // if the ICAP service fails. We may also use "potential" space to |
444 | // postpone more aggressively. Should the trade-off be configurable? | |
445 | debugs(93, 8, HERE << "postponing consumption from " << bp.status()); | |
446 | return; | |
447 | } | |
448 | ||
5f8252d2 | 449 | const size_t have = static_cast<size_t>(bp.buf().contentSize()); |
47f6e231 | 450 | const uint64_t end = virginConsumed + have; |
451 | uint64_t offset = end; | |
774c051c | 452 | |
478cfe99 | 453 | debugs(93, 9, HERE << "max virgin consumption offset=" << offset << |
9e008dda AJ |
454 | " acts " << virginBodyWriting.active() << virginBodySending.active() << |
455 | " consumed=" << virginConsumed << | |
456 | " from " << virgin.body_pipe->status()); | |
478cfe99 | 457 | |
5f8252d2 | 458 | if (virginBodyWriting.active()) |
d85c3078 | 459 | offset = min(virginBodyWriting.offset(), offset); |
774c051c | 460 | |
5f8252d2 | 461 | if (virginBodySending.active()) |
d85c3078 | 462 | offset = min(virginBodySending.offset(), offset); |
774c051c | 463 | |
464 | Must(virginConsumed <= offset && offset <= end); | |
465 | ||
47f6e231 | 466 | if (const size_t size = static_cast<size_t>(offset - virginConsumed)) { |
b107a5a5 | 467 | debugs(93, 8, HERE << "consuming " << size << " out of " << have << |
774c051c | 468 | " virgin body bytes"); |
5f8252d2 | 469 | bp.consume(size); |
774c051c | 470 | virginConsumed += size; |
c824c43b | 471 | Must(!isRetriable); // or we should not be consuming |
3ff65596 | 472 | disableRepeats("consumed content"); |
a22e6cd3 | 473 | disableBypass("consumed content", true); |
774c051c | 474 | } |
475 | } | |
476 | ||
26cc52cb | 477 | void Adaptation::Icap::ModXact::handleCommWroteBody() |
774c051c | 478 | { |
479 | writeMore(); | |
480 | } | |
481 | ||
c99de607 | 482 | // Called when we do not expect to call comm_write anymore. |
483 | // We may have a pending write though. | |
484 | // If stopping nicely, we will just wait for that pending write, if any. | |
26cc52cb | 485 | void Adaptation::Icap::ModXact::stopWriting(bool nicely) |
774c051c | 486 | { |
c99de607 | 487 | if (state.writing == State::writingReallyDone) |
774c051c | 488 | return; |
489 | ||
bd7f2ede | 490 | if (writer != NULL) { |
c99de607 | 491 | if (nicely) { |
5f8252d2 | 492 | debugs(93, 7, HERE << "will wait for the last write" << status()); |
c99de607 | 493 | state.writing = State::writingAlmostDone; // may already be set |
5f8252d2 | 494 | checkConsuming(); |
c99de607 | 495 | return; |
496 | } | |
4932ad93 | 497 | debugs(93, 3, HERE << "will NOT wait for the last write" << status()); |
774c051c | 498 | |
c99de607 | 499 | // Comm does not have an interface to clear the writer callback nicely, |
500 | // but without clearing the writer we cannot recycle the connection. | |
501 | // We prevent connection reuse and hope that we can handle a callback | |
5f8252d2 | 502 | // call at any time, usually in the middle of the destruction sequence! |
503 | // Somebody should add comm_remove_write_handler() to comm API. | |
c99de607 | 504 | reuseConnection = false; |
478cfe99 | 505 | ignoreLastWrite = true; |
c99de607 | 506 | } |
507 | ||
5f8252d2 | 508 | debugs(93, 7, HERE << "will no longer write" << status()); |
5f8252d2 | 509 | if (virginBodyWriting.active()) { |
510 | virginBodyWriting.disable(); | |
511 | virginConsume(); | |
512 | } | |
478cfe99 | 513 | state.writing = State::writingReallyDone; |
514 | checkConsuming(); | |
774c051c | 515 | } |
516 | ||
26cc52cb | 517 | void Adaptation::Icap::ModXact::stopBackup() |
774c051c | 518 | { |
5f8252d2 | 519 | if (!virginBodySending.active()) |
774c051c | 520 | return; |
521 | ||
192378eb | 522 | debugs(93, 7, HERE << "will no longer backup" << status()); |
5f8252d2 | 523 | virginBodySending.disable(); |
774c051c | 524 | virginConsume(); |
525 | } | |
526 | ||
26cc52cb | 527 | bool Adaptation::Icap::ModXact::doneAll() const |
774c051c | 528 | { |
26cc52cb | 529 | return Adaptation::Icap::Xaction::doneAll() && !state.serviceWaiting && |
5f8252d2 | 530 | doneSending() && |
774c051c | 531 | doneReading() && state.doneWriting(); |
532 | } | |
533 | ||
26cc52cb | 534 | void Adaptation::Icap::ModXact::startReading() |
774c051c | 535 | { |
aed188fd | 536 | Must(haveConnection()); |
774c051c | 537 | Must(!reader); |
5f8252d2 | 538 | Must(!adapted.header); |
539 | Must(!adapted.body_pipe); | |
774c051c | 540 | |
541 | // we use the same buffer for headers and body and then consume headers | |
542 | readMore(); | |
543 | } | |
544 | ||
26cc52cb | 545 | void Adaptation::Icap::ModXact::readMore() |
774c051c | 546 | { |
bd7f2ede | 547 | if (reader != NULL || doneReading()) { |
c99de607 | 548 | debugs(93,3,HERE << "returning from readMore because reader or doneReading()"); |
774c051c | 549 | return; |
3b299123 | 550 | } |
774c051c | 551 | |
552 | // do not fill readBuf if we have no space to store the result | |
5f8252d2 | 553 | if (adapted.body_pipe != NULL && |
9e008dda | 554 | !adapted.body_pipe->buf().hasPotentialSpace()) { |
5f8252d2 | 555 | debugs(93,3,HERE << "not reading because ICAP reply pipe is full"); |
774c051c | 556 | return; |
3b299123 | 557 | } |
774c051c | 558 | |
2b42f3fd | 559 | if (readBuf.length() < SQUID_TCP_SO_RCVBUF) |
774c051c | 560 | scheduleRead(); |
3b299123 | 561 | else |
2b42f3fd | 562 | debugs(93,3,HERE << "cannot read with a full buffer"); |
774c051c | 563 | } |
564 | ||
565 | // comm module read a portion of the ICAP response for us | |
26cc52cb | 566 | void Adaptation::Icap::ModXact::handleCommRead(size_t) |
774c051c | 567 | { |
568 | Must(!state.doneParsing()); | |
3ff65596 | 569 | icap_tio_finish = current_time; |
774c051c | 570 | parseMore(); |
571 | readMore(); | |
572 | } | |
573 | ||
26cc52cb | 574 | void Adaptation::Icap::ModXact::echoMore() |
774c051c | 575 | { |
576 | Must(state.sending == State::sendingVirgin); | |
5f8252d2 | 577 | Must(adapted.body_pipe != NULL); |
578 | Must(virginBodySending.active()); | |
579 | ||
580 | const size_t sizeMax = virginContentSize(virginBodySending); | |
581 | debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes from " << | |
9e008dda | 582 | virgin.body_pipe->status()); |
5f8252d2 | 583 | debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes to " << |
9e008dda | 584 | adapted.body_pipe->status()); |
5f8252d2 | 585 | |
586 | if (sizeMax > 0) { | |
587 | const size_t size = adapted.body_pipe->putMoreData(virginContentData(virginBodySending), sizeMax); | |
588 | debugs(93,5, HERE << "echoed " << size << " out of " << sizeMax << | |
9e008dda | 589 | " bytes"); |
5f8252d2 | 590 | virginBodySending.progress(size); |
3ff65596 | 591 | disableRepeats("echoed content"); |
a22e6cd3 AR |
592 | disableBypass("echoed content", true); |
593 | virginConsume(); | |
774c051c | 594 | } |
595 | ||
5f8252d2 | 596 | if (virginBodyEndReached(virginBodySending)) { |
192378eb | 597 | debugs(93, 5, HERE << "echoed all" << status()); |
774c051c | 598 | stopSending(true); |
599 | } else { | |
192378eb | 600 | debugs(93, 5, HERE << "has " << |
9e008dda AJ |
601 | virgin.body_pipe->buf().contentSize() << " bytes " << |
602 | "and expects more to echo" << status()); | |
5f8252d2 | 603 | // TODO: timeout if virgin or adapted pipes are broken |
774c051c | 604 | } |
605 | } | |
606 | ||
26cc52cb | 607 | bool Adaptation::Icap::ModXact::doneSending() const |
774c051c | 608 | { |
774c051c | 609 | return state.sending == State::sendingDone; |
610 | } | |
611 | ||
478cfe99 | 612 | // stop (or do not start) sending adapted message body |
26cc52cb | 613 | void Adaptation::Icap::ModXact::stopSending(bool nicely) |
774c051c | 614 | { |
3ff65596 | 615 | debugs(93, 7, HERE << "Enter stop sending "); |
774c051c | 616 | if (doneSending()) |
617 | return; | |
3ff65596 | 618 | debugs(93, 7, HERE << "Proceed with stop sending "); |
774c051c | 619 | |
620 | if (state.sending != State::sendingUndecided) { | |
192378eb | 621 | debugs(93, 7, HERE << "will no longer send" << status()); |
5f8252d2 | 622 | if (adapted.body_pipe != NULL) { |
623 | virginBodySending.disable(); | |
624 | // we may leave debts if we were echoing and the virgin | |
625 | // body_pipe got exhausted before we echoed all planned bytes | |
626 | const bool leftDebts = adapted.body_pipe->needsMoreData(); | |
627 | stopProducingFor(adapted.body_pipe, nicely && !leftDebts); | |
628 | } | |
774c051c | 629 | } else { |
192378eb | 630 | debugs(93, 7, HERE << "will not start sending" << status()); |
5f8252d2 | 631 | Must(!adapted.body_pipe); |
774c051c | 632 | } |
633 | ||
634 | state.sending = State::sendingDone; | |
5f8252d2 | 635 | checkConsuming(); |
774c051c | 636 | } |
637 | ||
5f8252d2 | 638 | // should be called after certain state.writing or state.sending changes |
26cc52cb | 639 | void Adaptation::Icap::ModXact::checkConsuming() |
774c051c | 640 | { |
5f8252d2 | 641 | // quit if we already stopped or are still using the pipe |
642 | if (!virgin.body_pipe || !state.doneConsumingVirgin()) | |
774c051c | 643 | return; |
644 | ||
5f8252d2 | 645 | debugs(93, 7, HERE << "will stop consuming" << status()); |
646 | stopConsumingFrom(virgin.body_pipe); | |
774c051c | 647 | } |
648 | ||
26cc52cb | 649 | void Adaptation::Icap::ModXact::parseMore() |
774c051c | 650 | { |
84ae6223 AJ |
651 | debugs(93, 5, "have " << readBuf.length() << " bytes to parse" << status()); |
652 | debugs(93, 5, "\n" << readBuf); | |
774c051c | 653 | |
654 | if (state.parsingHeaders()) | |
655 | parseHeaders(); | |
656 | ||
657 | if (state.parsing == State::psBody) | |
658 | parseBody(); | |
69c698a3 EB |
659 | |
660 | if (state.parsing == State::psIcapTrailer) | |
661 | parseIcapTrailer(); | |
774c051c | 662 | } |
663 | ||
26cc52cb | 664 | void Adaptation::Icap::ModXact::callException(const std::exception &e) |
478cfe99 | 665 | { |
666 | if (!canStartBypass || isRetriable) { | |
64b66b76 CT |
667 | if (!isRetriable) { |
668 | if (const TextException *te = dynamic_cast<const TextException *>(&e)) | |
669 | detailError(ERR_DETAIL_EXCEPTION_START + te->id()); | |
670 | else | |
671 | detailError(ERR_DETAIL_EXCEPTION_OTHER); | |
672 | } | |
26cc52cb | 673 | Adaptation::Icap::Xaction::callException(e); |
478cfe99 | 674 | return; |
675 | } | |
676 | ||
677 | try { | |
192378eb | 678 | debugs(93, 3, HERE << "bypassing " << inCall << " exception: " << |
af6a12ee | 679 | e.what() << ' ' << status()); |
478cfe99 | 680 | bypassFailure(); |
64b66b76 CT |
681 | } catch (const TextException &bypassTe) { |
682 | detailError(ERR_DETAIL_EXCEPTION_START + bypassTe.id()); | |
683 | Adaptation::Icap::Xaction::callException(bypassTe); | |
9e008dda | 684 | } catch (const std::exception &bypassE) { |
64b66b76 | 685 | detailError(ERR_DETAIL_EXCEPTION_OTHER); |
26cc52cb | 686 | Adaptation::Icap::Xaction::callException(bypassE); |
478cfe99 | 687 | } |
688 | } | |
689 | ||
26cc52cb | 690 | void Adaptation::Icap::ModXact::bypassFailure() |
478cfe99 | 691 | { |
a22e6cd3 | 692 | disableBypass("already started to bypass", false); |
478cfe99 | 693 | |
694 | Must(!isRetriable); // or we should not be bypassing | |
3ff65596 | 695 | // TODO: should the same be enforced for isRepeatable? Check icap_repeat?? |
478cfe99 | 696 | |
697 | prepEchoing(); | |
698 | ||
699 | startSending(); | |
700 | ||
701 | // end all activities associated with the ICAP server | |
702 | ||
69c698a3 | 703 | stopParsing(false); |
478cfe99 | 704 | |
705 | stopWriting(true); // or should we force it? | |
aed188fd | 706 | if (haveConnection()) { |
478cfe99 | 707 | reuseConnection = false; // be conservative |
708 | cancelRead(); // may not work; and we cannot stop connecting either | |
709 | if (!doneWithIo()) | |
192378eb | 710 | debugs(93, 7, HERE << "Warning: bypass failed to stop I/O" << status()); |
478cfe99 | 711 | } |
61cb3565 AR |
712 | |
713 | service().noteFailure(); // we are bypassing, but this is still a failure | |
478cfe99 | 714 | } |
715 | ||
a22e6cd3 | 716 | void Adaptation::Icap::ModXact::disableBypass(const char *reason, bool includingGroupBypass) |
478cfe99 | 717 | { |
718 | if (canStartBypass) { | |
719 | debugs(93,7, HERE << "will never start bypass because " << reason); | |
720 | canStartBypass = false; | |
721 | } | |
a22e6cd3 AR |
722 | if (protectGroupBypass && includingGroupBypass) { |
723 | debugs(93,7, HERE << "not protecting group bypass because " << reason); | |
724 | protectGroupBypass = false; | |
725 | } | |
478cfe99 | 726 | } |
727 | ||
774c051c | 728 | // note that allocation for echoing is done in handle204NoContent() |
26cc52cb | 729 | void Adaptation::Icap::ModXact::maybeAllocateHttpMsg() |
774c051c | 730 | { |
5f8252d2 | 731 | if (adapted.header) // already allocated |
774c051c | 732 | return; |
733 | ||
734 | if (gotEncapsulated("res-hdr")) { | |
5f8252d2 | 735 | adapted.setHeader(new HttpReply); |
3ff65596 | 736 | setOutcome(service().cfg().method == ICAP::methodReqmod ? |
e1381638 | 737 | xoSatisfied : xoModified); |
774c051c | 738 | } else if (gotEncapsulated("req-hdr")) { |
5f8252d2 | 739 | adapted.setHeader(new HttpRequest); |
3ff65596 | 740 | setOutcome(xoModified); |
774c051c | 741 | } else |
742 | throw TexcHere("Neither res-hdr nor req-hdr in maybeAllocateHttpMsg()"); | |
743 | } | |
744 | ||
26cc52cb | 745 | void Adaptation::Icap::ModXact::parseHeaders() |
774c051c | 746 | { |
747 | Must(state.parsingHeaders()); | |
748 | ||
b107a5a5 | 749 | if (state.parsing == State::psIcapHeader) { |
750 | debugs(93, 5, HERE << "parse ICAP headers"); | |
774c051c | 751 | parseIcapHead(); |
b107a5a5 | 752 | } |
774c051c | 753 | |
b107a5a5 | 754 | if (state.parsing == State::psHttpHeader) { |
755 | debugs(93, 5, HERE << "parse HTTP headers"); | |
774c051c | 756 | parseHttpHead(); |
b107a5a5 | 757 | } |
774c051c | 758 | |
759 | if (state.parsingHeaders()) { // need more data | |
760 | Must(mayReadMore()); | |
761 | return; | |
762 | } | |
763 | ||
478cfe99 | 764 | startSending(); |
765 | } | |
766 | ||
767 | // called after parsing all headers or when bypassing an exception | |
26cc52cb | 768 | void Adaptation::Icap::ModXact::startSending() |
478cfe99 | 769 | { |
3ff65596 | 770 | disableRepeats("sent headers"); |
a22e6cd3 | 771 | disableBypass("sent headers", true); |
3af10ac0 | 772 | sendAnswer(Answer::Forward(adapted.header)); |
774c051c | 773 | |
774 | if (state.sending == State::sendingVirgin) | |
775 | echoMore(); | |
88df846b | 776 | else { |
ff89bfa0 | 777 | // If we are not using the virgin HTTP object update the |
63df1d28 | 778 | // Http::Message::sources flag. |
88df846b | 779 | // The state.sending may set to State::sendingVirgin in the case |
63df1d28 | 780 | // of 206 responses too, where we do not want to update Http::Message::sources |
ff89bfa0 SM |
781 | // flag. However even for 206 responses the state.sending is |
782 | // not set yet to sendingVirgin. This is done in later step | |
88df846b CT |
783 | // after the parseBody method called. |
784 | updateSources(); | |
785 | } | |
774c051c | 786 | } |
787 | ||
26cc52cb | 788 | void Adaptation::Icap::ModXact::parseIcapHead() |
774c051c | 789 | { |
790 | Must(state.sending == State::sendingUndecided); | |
791 | ||
b248c2a3 | 792 | if (!parseHead(icapReply.getRaw())) |
774c051c | 793 | return; |
794 | ||
69c698a3 EB |
795 | if (expectIcapTrailers()) { |
796 | Must(!trailerParser); | |
797 | trailerParser = new TrailerParser; | |
798 | } | |
799 | ||
d5f18517 AJ |
800 | static SBuf close("close", 5); |
801 | if (httpHeaderHasConnDir(&icapReply->header, close)) { | |
fc764d26 | 802 | debugs(93, 5, HERE << "found connection close"); |
803 | reuseConnection = false; | |
804 | } | |
805 | ||
9b769c67 | 806 | switch (icapReply->sline.status()) { |
774c051c | 807 | |
9b769c67 | 808 | case Http::scContinue: |
774c051c | 809 | handle100Continue(); |
810 | break; | |
811 | ||
9b769c67 AJ |
812 | case Http::scOkay: |
813 | case Http::scCreated: // Symantec Scan Engine 5.0 and later when modifying HTTP msg | |
b559db5d | 814 | |
815 | if (!validate200Ok()) { | |
816 | throw TexcHere("Invalid ICAP Response"); | |
817 | } else { | |
818 | handle200Ok(); | |
819 | } | |
820 | ||
774c051c | 821 | break; |
822 | ||
9b769c67 | 823 | case Http::scNoContent: |
774c051c | 824 | handle204NoContent(); |
825 | break; | |
826 | ||
9b769c67 | 827 | case Http::scPartialContent: |
83c51da9 CT |
828 | handle206PartialContent(); |
829 | break; | |
830 | ||
774c051c | 831 | default: |
9b769c67 | 832 | debugs(93, 5, "ICAP status " << icapReply->sline.status()); |
774c051c | 833 | handleUnknownScode(); |
834 | break; | |
835 | } | |
836 | ||
3ff65596 AR |
837 | const HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
838 | if (!request) | |
839 | request = &virginRequest(); | |
840 | ||
841 | // update the cross-transactional database if needed (all status codes!) | |
842 | if (const char *xxName = Adaptation::Config::masterx_shared_name) { | |
a22e6cd3 | 843 | Adaptation::History::Pointer ah = request->adaptHistory(true); |
5038f9d8 | 844 | if (ah != NULL) { // TODO: reorder checks to avoid creating history |
3ff65596 AR |
845 | const String val = icapReply->header.getByName(xxName); |
846 | if (val.size() > 0) // XXX: HttpHeader lacks empty value detection | |
847 | ah->updateXxRecord(xxName, val); | |
848 | } | |
849 | } | |
850 | ||
a22e6cd3 AR |
851 | // update the adaptation plan if needed (all status codes!) |
852 | if (service().cfg().routing) { | |
853 | String services; | |
789217a2 | 854 | if (icapReply->header.getList(Http::HdrType::X_NEXT_SERVICES, &services)) { |
a22e6cd3 AR |
855 | Adaptation::History::Pointer ah = request->adaptHistory(true); |
856 | if (ah != NULL) | |
857 | ah->updateNextServices(services); | |
858 | } | |
789217a2 | 859 | } // TODO: else warn (occasionally!) if we got Http::HdrType::X_NEXT_SERVICES |
a22e6cd3 | 860 | |
3ff65596 AR |
861 | // We need to store received ICAP headers for <icapLastHeader logformat option. |
862 | // If we already have stored headers from previous ICAP transaction related to this | |
863 | // request, old headers will be replaced with the new one. | |
e1381638 | 864 | |
5038f9d8 AR |
865 | Adaptation::History::Pointer ah = request->adaptLogHistory(); |
866 | if (ah != NULL) | |
867 | ah->recordMeta(&icapReply->header); | |
3ff65596 | 868 | |
774c051c | 869 | // handle100Continue() manages state.writing on its own. |
870 | // Non-100 status means the server needs no postPreview data from us. | |
871 | if (state.writing == State::writingPaused) | |
c99de607 | 872 | stopWriting(true); |
774c051c | 873 | } |
874 | ||
69c698a3 EB |
875 | /// Parses ICAP trailers and stops parsing, if all trailer data |
876 | /// have been received. | |
877 | void Adaptation::Icap::ModXact::parseIcapTrailer() { | |
b559db5d | 878 | |
69c698a3 EB |
879 | if (parsePart(trailerParser, "trailer")) { |
880 | for (const auto &e: trailerParser->trailer.entries) | |
881 | debugs(93, 5, "ICAP trailer: " << e->name << ": " << e->value); | |
882 | stopParsing(); | |
b559db5d | 883 | } |
69c698a3 | 884 | } |
b559db5d | 885 | |
69c698a3 EB |
886 | bool Adaptation::Icap::ModXact::validate200Ok() |
887 | { | |
888 | if (service().cfg().method == ICAP::methodRespmod) | |
889 | return gotEncapsulated("res-hdr"); | |
b559db5d | 890 | |
69c698a3 EB |
891 | return service().cfg().method == ICAP::methodReqmod && |
892 | expectHttpHeader(); | |
b559db5d | 893 | } |
894 | ||
26cc52cb | 895 | void Adaptation::Icap::ModXact::handle100Continue() |
774c051c | 896 | { |
897 | Must(state.writing == State::writingPaused); | |
5f8252d2 | 898 | // server must not respond before the end of preview: we may send ieof |
774c051c | 899 | Must(preview.enabled() && preview.done() && !preview.ieof()); |
774c051c | 900 | |
83c51da9 CT |
901 | // 100 "Continue" cancels our Preview commitment, |
902 | // but not commitment to handle 204 or 206 outside Preview | |
903 | if (!state.allowedPostview204 && !state.allowedPostview206) | |
774c051c | 904 | stopBackup(); |
905 | ||
c99de607 | 906 | state.parsing = State::psIcapHeader; // eventually |
907 | icapReply->reset(); | |
774c051c | 908 | |
909 | state.writing = State::writingPrime; | |
910 | ||
911 | writeMore(); | |
912 | } | |
913 | ||
26cc52cb | 914 | void Adaptation::Icap::ModXact::handle200Ok() |
774c051c | 915 | { |
916 | state.parsing = State::psHttpHeader; | |
917 | state.sending = State::sendingAdapted; | |
918 | stopBackup(); | |
5f8252d2 | 919 | checkConsuming(); |
774c051c | 920 | } |
921 | ||
26cc52cb | 922 | void Adaptation::Icap::ModXact::handle204NoContent() |
774c051c | 923 | { |
924 | stopParsing(); | |
478cfe99 | 925 | prepEchoing(); |
926 | } | |
927 | ||
83c51da9 CT |
928 | void Adaptation::Icap::ModXact::handle206PartialContent() |
929 | { | |
930 | if (state.writing == State::writingPaused) { | |
931 | Must(preview.enabled()); | |
932 | Must(state.allowedPreview206); | |
933 | debugs(93, 7, HERE << "206 inside preview"); | |
934 | } else { | |
935 | Must(state.writing > State::writingPaused); | |
936 | Must(state.allowedPostview206); | |
937 | debugs(93, 7, HERE << "206 outside preview"); | |
938 | } | |
939 | state.parsing = State::psHttpHeader; | |
940 | state.sending = State::sendingAdapted; | |
941 | state.readyForUob = true; | |
942 | checkConsuming(); | |
943 | } | |
944 | ||
478cfe99 | 945 | // Called when we receive a 204 No Content response and |
946 | // when we are trying to bypass a service failure. | |
947 | // We actually start sending (echoig or not) in startSending. | |
26cc52cb | 948 | void Adaptation::Icap::ModXact::prepEchoing() |
478cfe99 | 949 | { |
3ff65596 | 950 | disableRepeats("preparing to echo content"); |
a22e6cd3 | 951 | disableBypass("preparing to echo content", true); |
3ff65596 | 952 | setOutcome(xoEcho); |
774c051c | 953 | |
954 | // We want to clone the HTTP message, but we do not want | |
63df1d28 | 955 | // to copy some non-HTTP state parts that Http::Message kids carry in them. |
774c051c | 956 | // Thus, we cannot use a smart pointer, copy constructor, or equivalent. |
957 | // Instead, we simply write the HTTP message and "clone" it by parsing. | |
63df1d28 | 958 | // TODO: use Http::Message::clone()! |
774c051c | 959 | |
63df1d28 | 960 | Http::Message *oldHead = virgin.header; |
192378eb | 961 | debugs(93, 7, HERE << "cloning virgin message " << oldHead); |
774c051c | 962 | |
963 | MemBuf httpBuf; | |
964 | ||
965 | // write the virgin message into a memory buffer | |
966 | httpBuf.init(); | |
967 | packHead(httpBuf, oldHead); | |
968 | ||
c99de607 | 969 | // allocate the adapted message and copy metainfo |
5f8252d2 | 970 | Must(!adapted.header); |
c7d51c86 | 971 | { |
63df1d28 | 972 | Http::MessagePointer newHead; |
73a805c2 | 973 | if (dynamic_cast<const HttpRequest*>(oldHead)) { |
b248c2a3 | 974 | newHead = new HttpRequest; |
e6f9e263 A |
975 | } else if (dynamic_cast<const HttpReply*>(oldHead)) { |
976 | newHead = new HttpReply; | |
977 | } | |
d39901ed | 978 | Must(newHead); |
774c051c | 979 | |
e6f9e263 | 980 | newHead->inheritProperties(oldHead); |
774c051c | 981 | |
b248c2a3 | 982 | adapted.setHeader(newHead.getRaw()); |
c7d51c86 | 983 | } |
7514268e | 984 | |
774c051c | 985 | // parse the buffer back |
955394ce | 986 | Http::StatusCode error = Http::scNone; |
774c051c | 987 | |
63df1d28 | 988 | httpBuf.terminate(); // Http::Message::parse requires nil-terminated buffer |
84ae6223 | 989 | Must(adapted.header->parse(httpBuf.content(), httpBuf.contentSize(), true, &error)); |
c7d51c86 | 990 | Must(adapted.header->hdr_sz == httpBuf.contentSize()); // no leftovers |
774c051c | 991 | |
992 | httpBuf.clean(); | |
993 | ||
192378eb | 994 | debugs(93, 7, HERE << "cloned virgin message " << oldHead << " to " << |
c7d51c86 | 995 | adapted.header); |
5f8252d2 | 996 | |
997 | // setup adapted body pipe if needed | |
998 | if (oldHead->body_pipe != NULL) { | |
999 | debugs(93, 7, HERE << "will echo virgin body from " << | |
9e008dda | 1000 | oldHead->body_pipe); |
478cfe99 | 1001 | if (!virginBodySending.active()) |
1002 | virginBodySending.plan(); // will throw if not possible | |
5f8252d2 | 1003 | state.sending = State::sendingVirgin; |
1004 | checkConsuming(); | |
478cfe99 | 1005 | |
5f8252d2 | 1006 | // TODO: optimize: is it possible to just use the oldHead pipe and |
1007 | // remove ICAP from the loop? This echoing is probably a common case! | |
1008 | makeAdaptedBodyPipe("echoed virgin response"); | |
1009 | if (oldHead->body_pipe->bodySizeKnown()) | |
1010 | adapted.body_pipe->setBodySize(oldHead->body_pipe->bodySize()); | |
1011 | debugs(93, 7, HERE << "will echo virgin body to " << | |
9e008dda | 1012 | adapted.body_pipe); |
5f8252d2 | 1013 | } else { |
1014 | debugs(93, 7, HERE << "no virgin body to echo"); | |
1015 | stopSending(true); | |
1016 | } | |
774c051c | 1017 | } |
1018 | ||
83c51da9 CT |
1019 | /// Called when we received use-original-body chunk extension in 206 response. |
1020 | /// We actually start sending (echoing or not) in startSending(). | |
1021 | void Adaptation::Icap::ModXact::prepPartialBodyEchoing(uint64_t pos) | |
1022 | { | |
1023 | Must(virginBodySending.active()); | |
1024 | Must(virgin.header->body_pipe != NULL); | |
1025 | ||
1026 | setOutcome(xoPartEcho); | |
1027 | ||
1028 | debugs(93, 7, HERE << "will echo virgin body suffix from " << | |
1029 | virgin.header->body_pipe << " offset " << pos ); | |
1030 | ||
1031 | // check that use-original-body=N does not point beyond buffered data | |
1032 | const uint64_t virginDataEnd = virginConsumed + | |
7ddcfbab | 1033 | virgin.body_pipe->buf().contentSize(); |
83c51da9 CT |
1034 | Must(pos <= virginDataEnd); |
1035 | virginBodySending.progress(static_cast<size_t>(pos)); | |
1036 | ||
1037 | state.sending = State::sendingVirgin; | |
1038 | checkConsuming(); | |
1039 | ||
1040 | if (virgin.header->body_pipe->bodySizeKnown()) | |
1041 | adapted.body_pipe->expectProductionEndAfter(virgin.header->body_pipe->bodySize() - pos); | |
1042 | ||
1043 | debugs(93, 7, HERE << "will echo virgin body suffix to " << | |
1044 | adapted.body_pipe); | |
1045 | ||
1046 | // Start echoing data | |
1047 | echoMore(); | |
1048 | } | |
1049 | ||
26cc52cb | 1050 | void Adaptation::Icap::ModXact::handleUnknownScode() |
774c051c | 1051 | { |
69c698a3 | 1052 | stopParsing(false); |
774c051c | 1053 | stopBackup(); |
1054 | // TODO: mark connection as "bad" | |
1055 | ||
1056 | // Terminate the transaction; we do not know how to handle this response. | |
1057 | throw TexcHere("Unsupported ICAP status code"); | |
1058 | } | |
1059 | ||
26cc52cb | 1060 | void Adaptation::Icap::ModXact::parseHttpHead() |
774c051c | 1061 | { |
69c698a3 | 1062 | if (expectHttpHeader()) { |
bae917ac | 1063 | replyHttpHeaderSize = 0; |
774c051c | 1064 | maybeAllocateHttpMsg(); |
1065 | ||
5f8252d2 | 1066 | if (!parseHead(adapted.header)) |
c99de607 | 1067 | return; // need more header data |
5f8252d2 | 1068 | |
bae917ac CT |
1069 | if (adapted.header) |
1070 | replyHttpHeaderSize = adapted.header->hdr_sz; | |
1071 | ||
d67acb4e | 1072 | if (dynamic_cast<HttpRequest*>(adapted.header)) { |
5f8252d2 | 1073 | const HttpRequest *oldR = dynamic_cast<const HttpRequest*>(virgin.header); |
1074 | Must(oldR); | |
9e008dda AJ |
1075 | // TODO: the adapted request did not really originate from the |
1076 | // client; give proxy admin an option to prevent copying of | |
5f8252d2 | 1077 | // sensitive client information here. See the following thread: |
1078 | // http://www.squid-cache.org/mail-archive/squid-dev/200703/0040.html | |
5f8252d2 | 1079 | } |
d67acb4e | 1080 | |
9e008dda AJ |
1081 | // Maybe adapted.header==NULL if HttpReply and have Http 0.9 .... |
1082 | if (adapted.header) | |
1083 | adapted.header->inheritProperties(virgin.header); | |
774c051c | 1084 | } |
1085 | ||
5f8252d2 | 1086 | decideOnParsingBody(); |
774c051c | 1087 | } |
1088 | ||
69c698a3 EB |
1089 | template<class Part> |
1090 | bool Adaptation::Icap::ModXact::parsePart(Part *part, const char *description) | |
774c051c | 1091 | { |
69c698a3 EB |
1092 | Must(part); |
1093 | debugs(93, 5, "have " << readBuf.length() << ' ' << description << " bytes to parse; state: " << state.parsing); | |
955394ce | 1094 | Http::StatusCode error = Http::scNone; |
84ae6223 | 1095 | // XXX: performance regression. c_str() data copies |
63df1d28 | 1096 | // XXX: Http::Message::parse requires a terminated string buffer |
84ae6223 | 1097 | const char *tmpBuf = readBuf.c_str(); |
69c698a3 EB |
1098 | const bool parsed = part->parse(tmpBuf, readBuf.length(), commEof, &error); |
1099 | debugs(93, (!parsed && error) ? 2 : 5, description << " parsing result: " << parsed << " detail: " << error); | |
1100 | Must(parsed || !error); | |
1101 | if (parsed) | |
1102 | readBuf.consume(part->hdr_sz); | |
1103 | return parsed; | |
1104 | } | |
774c051c | 1105 | |
69c698a3 | 1106 | // parses both HTTP and ICAP headers |
63df1d28 AJ |
1107 | bool |
1108 | Adaptation::Icap::ModXact::parseHead(Http::Message *head) | |
69c698a3 EB |
1109 | { |
1110 | if (!parsePart(head, "head")) { | |
774c051c | 1111 | head->reset(); |
1112 | return false; | |
1113 | } | |
774c051c | 1114 | return true; |
1115 | } | |
1116 | ||
69c698a3 EB |
1117 | bool Adaptation::Icap::ModXact::expectHttpHeader() const |
1118 | { | |
1119 | return gotEncapsulated("res-hdr") || gotEncapsulated("req-hdr"); | |
1120 | } | |
1121 | ||
1122 | bool Adaptation::Icap::ModXact::expectHttpBody() const | |
1123 | { | |
1124 | return gotEncapsulated("res-body") || gotEncapsulated("req-body"); | |
1125 | } | |
1126 | ||
1127 | bool Adaptation::Icap::ModXact::expectIcapTrailers() const | |
1128 | { | |
1129 | String trailers; | |
f29d429e | 1130 | const bool promisesToSendTrailer = icapReply->header.getByIdIfPresent(Http::HdrType::TRAILER, &trailers); |
69c698a3 EB |
1131 | const bool supportsTrailers = icapReply->header.hasListMember(Http::HdrType::ALLOW, "trailers", ','); |
1132 | // ICAP Trailer specs require us to reject transactions having either Trailer | |
1133 | // header or Allow:trailers | |
1134 | Must((promisesToSendTrailer == supportsTrailers) || (!promisesToSendTrailer && supportsTrailers)); | |
1135 | if (promisesToSendTrailer && !trailers.size()) | |
1136 | debugs(93, DBG_IMPORTANT, "ERROR: ICAP Trailer response header field must not be empty (salvaged)"); | |
1137 | return promisesToSendTrailer; | |
1138 | } | |
1139 | ||
26cc52cb | 1140 | void Adaptation::Icap::ModXact::decideOnParsingBody() |
9e008dda | 1141 | { |
69c698a3 | 1142 | if (expectHttpBody()) { |
5f8252d2 | 1143 | debugs(93, 5, HERE << "expecting a body"); |
1144 | state.parsing = State::psBody; | |
bae917ac | 1145 | replyHttpBodySize = 0; |
db1720f8 | 1146 | bodyParser = new Http1::TeChunkedParser; |
5f8252d2 | 1147 | makeAdaptedBodyPipe("adapted response from the ICAP server"); |
1148 | Must(state.sending == State::sendingAdapted); | |
774c051c | 1149 | } else { |
b559db5d | 1150 | debugs(93, 5, HERE << "not expecting a body"); |
69c698a3 EB |
1151 | if (trailerParser) |
1152 | state.parsing = State::psIcapTrailer; | |
1153 | else | |
1154 | stopParsing(); | |
5f8252d2 | 1155 | stopSending(true); |
774c051c | 1156 | } |
774c051c | 1157 | } |
1158 | ||
26cc52cb | 1159 | void Adaptation::Icap::ModXact::parseBody() |
774c051c | 1160 | { |
5f8252d2 | 1161 | Must(state.parsing == State::psBody); |
1162 | Must(bodyParser); | |
774c051c | 1163 | |
84ae6223 | 1164 | debugs(93, 5, "have " << readBuf.length() << " body bytes to parse"); |
774c051c | 1165 | |
5f8252d2 | 1166 | // the parser will throw on errors |
1167 | BodyPipeCheckout bpc(*adapted.body_pipe); | |
be29ee33 AJ |
1168 | bodyParser->setPayloadBuffer(&bpc.buf); |
1169 | const bool parsed = bodyParser->parse(readBuf); | |
1170 | readBuf = bodyParser->remaining(); // sync buffers after parse | |
5f8252d2 | 1171 | bpc.checkIn(); |
774c051c | 1172 | |
84ae6223 | 1173 | debugs(93, 5, "have " << readBuf.length() << " body bytes after parsed all: " << parsed); |
bae917ac | 1174 | replyHttpBodySize += adapted.body_pipe->buf().contentSize(); |
774c051c | 1175 | |
478cfe99 | 1176 | // TODO: expose BodyPipe::putSize() to make this check simpler and clearer |
3ff65596 AR |
1177 | // TODO: do we really need this if we disable when sending headers? |
1178 | if (adapted.body_pipe->buf().contentSize() > 0) { // parsed something sometime | |
1179 | disableRepeats("sent adapted content"); | |
a22e6cd3 | 1180 | disableBypass("sent adapted content", true); |
3ff65596 | 1181 | } |
478cfe99 | 1182 | |
5f8252d2 | 1183 | if (parsed) { |
69c698a3 EB |
1184 | if (state.readyForUob && bodyParser->useOriginBody >= 0) |
1185 | prepPartialBodyEchoing(static_cast<uint64_t>(bodyParser->useOriginBody)); | |
1186 | else | |
1187 | stopSending(true); // the parser succeeds only if all parsed data fits | |
1188 | if (trailerParser) | |
1189 | state.parsing = State::psIcapTrailer; | |
1190 | else | |
83c51da9 | 1191 | stopParsing(); |
5f8252d2 | 1192 | return; |
1193 | } | |
774c051c | 1194 | |
c99de607 | 1195 | debugs(93,3,HERE << this << " needsMoreData = " << bodyParser->needsMoreData()); |
3b299123 | 1196 | |
1197 | if (bodyParser->needsMoreData()) { | |
c99de607 | 1198 | debugs(93,3,HERE << this); |
774c051c | 1199 | Must(mayReadMore()); |
3b299123 | 1200 | readMore(); |
1201 | } | |
774c051c | 1202 | |
1203 | if (bodyParser->needsMoreSpace()) { | |
1204 | Must(!doneSending()); // can hope for more space | |
5f8252d2 | 1205 | Must(adapted.body_pipe->buf().contentSize() > 0); // paranoid |
1206 | // TODO: there should be a timeout in case the sink is broken | |
1207 | // or cannot consume partial content (while we need more space) | |
774c051c | 1208 | } |
774c051c | 1209 | } |
1210 | ||
69c698a3 | 1211 | void Adaptation::Icap::ModXact::stopParsing(const bool checkUnparsedData) |
774c051c | 1212 | { |
1213 | if (state.parsing == State::psDone) | |
1214 | return; | |
1215 | ||
69c698a3 EB |
1216 | if (checkUnparsedData) |
1217 | Must(readBuf.isEmpty()); | |
1218 | ||
1219 | debugs(93, 7, "will no longer parse" << status()); | |
774c051c | 1220 | |
1221 | delete bodyParser; | |
69c698a3 | 1222 | bodyParser = nullptr; |
774c051c | 1223 | |
69c698a3 EB |
1224 | delete trailerParser; |
1225 | trailerParser = nullptr; | |
774c051c | 1226 | |
1227 | state.parsing = State::psDone; | |
1228 | } | |
1229 | ||
1230 | // HTTP side added virgin body data | |
26cc52cb | 1231 | void Adaptation::Icap::ModXact::noteMoreBodyDataAvailable(BodyPipe::Pointer) |
774c051c | 1232 | { |
774c051c | 1233 | writeMore(); |
1234 | ||
1235 | if (state.sending == State::sendingVirgin) | |
1236 | echoMore(); | |
774c051c | 1237 | } |
1238 | ||
1239 | // HTTP side sent us all virgin info | |
26cc52cb | 1240 | void Adaptation::Icap::ModXact::noteBodyProductionEnded(BodyPipe::Pointer) |
774c051c | 1241 | { |
5f8252d2 | 1242 | Must(virgin.body_pipe->productionEnded()); |
774c051c | 1243 | |
1244 | // push writer and sender in case we were waiting for the last-chunk | |
1245 | writeMore(); | |
1246 | ||
1247 | if (state.sending == State::sendingVirgin) | |
1248 | echoMore(); | |
774c051c | 1249 | } |
1250 | ||
9e008dda | 1251 | // body producer aborted, but the initiator may still want to know |
585ab260 | 1252 | // the answer, even though the HTTP message has been truncated |
26cc52cb | 1253 | void Adaptation::Icap::ModXact::noteBodyProducerAborted(BodyPipe::Pointer) |
774c051c | 1254 | { |
585ab260 | 1255 | Must(virgin.body_pipe->productionEnded()); |
1256 | ||
1257 | // push writer and sender in case we were waiting for the last-chunk | |
1258 | writeMore(); | |
1259 | ||
1260 | if (state.sending == State::sendingVirgin) | |
1261 | echoMore(); | |
5f8252d2 | 1262 | } |
1263 | ||
9e008dda | 1264 | // adapted body consumer wants more adapted data and |
5f8252d2 | 1265 | // possibly freed some buffer space |
26cc52cb | 1266 | void Adaptation::Icap::ModXact::noteMoreBodySpaceAvailable(BodyPipe::Pointer) |
774c051c | 1267 | { |
774c051c | 1268 | if (state.sending == State::sendingVirgin) |
1269 | echoMore(); | |
3b299123 | 1270 | else if (state.sending == State::sendingAdapted) |
1271 | parseMore(); | |
774c051c | 1272 | else |
3b299123 | 1273 | Must(state.sending == State::sendingUndecided); |
774c051c | 1274 | } |
1275 | ||
5f8252d2 | 1276 | // adapted body consumer aborted |
26cc52cb | 1277 | void Adaptation::Icap::ModXact::noteBodyConsumerAborted(BodyPipe::Pointer) |
774c051c | 1278 | { |
64b66b76 | 1279 | detailError(ERR_DETAIL_ICAP_XACT_BODY_CONSUMER_ABORT); |
5f8252d2 | 1280 | mustStop("adapted body consumer aborted"); |
774c051c | 1281 | } |
1282 | ||
c7d51c86 AR |
1283 | Adaptation::Icap::ModXact::~ModXact() |
1284 | { | |
1285 | delete bodyParser; | |
69c698a3 | 1286 | delete trailerParser; |
c7d51c86 AR |
1287 | } |
1288 | ||
774c051c | 1289 | // internal cleanup |
26cc52cb | 1290 | void Adaptation::Icap::ModXact::swanSong() |
774c051c | 1291 | { |
5f8252d2 | 1292 | debugs(93, 5, HERE << "swan sings" << status()); |
1293 | ||
c99de607 | 1294 | stopWriting(false); |
c824c43b | 1295 | stopSending(false); |
774c051c | 1296 | |
64b66b76 CT |
1297 | if (theInitiator.set()) // we have not sent the answer to the initiator |
1298 | detailError(ERR_DETAIL_ICAP_XACT_OTHER); | |
1299 | ||
3ff65596 | 1300 | // update adaptation history if start was called and we reserved a slot |
a22e6cd3 | 1301 | Adaptation::History::Pointer ah = virginRequest().adaptLogHistory(); |
3ff65596 AR |
1302 | if (ah != NULL && adaptHistoryId >= 0) |
1303 | ah->recordXactFinish(adaptHistoryId); | |
774c051c | 1304 | |
26cc52cb | 1305 | Adaptation::Icap::Xaction::swanSong(); |
774c051c | 1306 | } |
1307 | ||
41ebd397 | 1308 | void prepareLogWithRequestDetails(HttpRequest *, AccessLogEntry::Pointer &); |
3ff65596 AR |
1309 | |
1310 | void Adaptation::Icap::ModXact::finalizeLogInfo() | |
1311 | { | |
bd59d61c EB |
1312 | HttpRequest *adapted_request_ = nullptr; |
1313 | HttpReply *adapted_reply_ = nullptr; | |
a2958f2f | 1314 | HttpRequest *virgin_request_ = const_cast<HttpRequest*>(&virginRequest()); |
3ecb654f | 1315 | if (!(adapted_request_ = dynamic_cast<HttpRequest*>(adapted.header))) { |
bd59d61c EB |
1316 | // if the request was not adapted, use virgin request to simplify |
1317 | // the code further below | |
1318 | adapted_request_ = virgin_request_; | |
1319 | adapted_reply_ = dynamic_cast<HttpReply*>(adapted.header); | |
3ff65596 AR |
1320 | } |
1321 | ||
a2958f2f | 1322 | Adaptation::Icap::History::Pointer h = virgin_request_->icapHistory(); |
e1381638 AJ |
1323 | Must(h != NULL); // ICAPXaction::maybeLog calls only if there is a log |
1324 | al.icp.opcode = ICP_INVALID; | |
1325 | al.url = h->log_uri.termedBuf(); | |
1326 | const Adaptation::Icap::ServiceRep &s = service(); | |
1327 | al.icap.reqMethod = s.cfg().method; | |
3ff65596 | 1328 | |
bd59d61c | 1329 | al.cache.caddr = virgin_request_->client_addr; |
3ff65596 | 1330 | |
bd59d61c | 1331 | al.request = virgin_request_; |
b248c2a3 | 1332 | HTTPMSGLOCK(al.request); |
3ecb654f CT |
1333 | al.adapted_request = adapted_request_; |
1334 | HTTPMSGLOCK(al.adapted_request); | |
1335 | ||
bd59d61c EB |
1336 | if (adapted_reply_) { |
1337 | al.reply = adapted_reply_; | |
b248c2a3 AJ |
1338 | HTTPMSGLOCK(al.reply); |
1339 | } else | |
e1381638 | 1340 | al.reply = NULL; |
3ff65596 | 1341 | |
e1381638 AJ |
1342 | if (h->rfc931.size()) |
1343 | al.cache.rfc931 = h->rfc931.termedBuf(); | |
3ff65596 | 1344 | |
cb4f4424 | 1345 | #if USE_OPENSSL |
e1381638 AJ |
1346 | if (h->ssluser.size()) |
1347 | al.cache.ssluser = h->ssluser.termedBuf(); | |
3ff65596 | 1348 | #endif |
e1381638 | 1349 | al.cache.code = h->logType; |
bd59d61c | 1350 | |
63df1d28 | 1351 | const Http::Message *virgin_msg = dynamic_cast<HttpReply*>(virgin.header); |
bd59d61c EB |
1352 | if (!virgin_msg) |
1353 | virgin_msg = virgin_request_; | |
1354 | assert(virgin_msg != virgin.cause); | |
1355 | al.http.clientRequestSz.header = virgin_msg->hdr_sz; | |
7171d5fb CT |
1356 | if (virgin_msg->body_pipe != NULL) |
1357 | al.http.clientRequestSz.payloadData = virgin_msg->body_pipe->producedSize(); | |
bae917ac CT |
1358 | |
1359 | // leave al.icap.bodyBytesRead negative if no body | |
1360 | if (replyHttpHeaderSize >= 0 || replyHttpBodySize >= 0) { | |
1361 | const int64_t zero = 0; // to make max() argument types the same | |
bd59d61c EB |
1362 | const uint64_t headerSize = max(zero, replyHttpHeaderSize); |
1363 | const uint64_t bodySize = max(zero, replyHttpBodySize); | |
1364 | al.icap.bodyBytesRead = headerSize + bodySize; | |
1365 | al.http.clientReplySz.header = headerSize; | |
1366 | al.http.clientReplySz.payloadData = bodySize; | |
bae917ac CT |
1367 | } |
1368 | ||
bd59d61c EB |
1369 | if (adapted_reply_) { |
1370 | al.http.code = adapted_reply_->sline.status(); | |
1371 | al.http.content_type = adapted_reply_->content_type.termedBuf(); | |
1372 | if (replyHttpBodySize >= 0) | |
bae917ac | 1373 | al.cache.highOffset = replyHttpBodySize; |
e1381638 AJ |
1374 | //don't set al.cache.objectSize because it hasn't exist yet |
1375 | ||
e1381638 | 1376 | MemBuf mb; |
e1381638 | 1377 | mb.init(); |
bd59d61c | 1378 | adapted_reply_->header.packInto(&mb); |
e1381638 | 1379 | al.headers.reply = xstrdup(mb.buf); |
e1381638 AJ |
1380 | mb.clean(); |
1381 | } | |
3ecb654f | 1382 | prepareLogWithRequestDetails(adapted_request_, alep); |
e1381638 | 1383 | Xaction::finalizeLogInfo(); |
3ff65596 AR |
1384 | } |
1385 | ||
26cc52cb | 1386 | void Adaptation::Icap::ModXact::makeRequestHeaders(MemBuf &buf) |
774c051c | 1387 | { |
cc192b50 | 1388 | char ntoabuf[MAX_IPSTRLEN]; |
12b91c99 | 1389 | /* |
1390 | * XXX These should use HttpHdr interfaces instead of Printfs | |
1391 | */ | |
0bef8dd7 | 1392 | const Adaptation::ServiceConfig &s = service().cfg(); |
4391cd15 AJ |
1393 | buf.appendf("%s " SQUIDSTRINGPH " ICAP/1.0\r\n", s.methodStr(), SQUIDSTRINGPRINT(s.uri)); |
1394 | buf.appendf("Host: " SQUIDSTRINGPH ":%d\r\n", SQUIDSTRINGPRINT(s.host), s.port); | |
1395 | buf.appendf("Date: %s\r\n", mkrfc1123(squid_curtime)); | |
12b91c99 | 1396 | |
26cc52cb | 1397 | if (!TheConfig.reuse_connections) |
4391cd15 | 1398 | buf.appendf("Connection: close\r\n"); |
12b91c99 | 1399 | |
cb72cd25 CT |
1400 | const HttpRequest *request = &virginRequest(); |
1401 | ||
2cdeea82 | 1402 | // we must forward "Proxy-Authenticate" and "Proxy-Authorization" |
1403 | // as ICAP headers. | |
789217a2 | 1404 | if (virgin.header->header.has(Http::HdrType::PROXY_AUTHENTICATE)) { |
81ab22b6 | 1405 | String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHENTICATE); |
4391cd15 | 1406 | buf.appendf("Proxy-Authenticate: " SQUIDSTRINGPH "\r\n",SQUIDSTRINGPRINT(vh)); |
4232c626 | 1407 | } |
9e008dda | 1408 | |
789217a2 | 1409 | if (virgin.header->header.has(Http::HdrType::PROXY_AUTHORIZATION)) { |
81ab22b6 | 1410 | String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHORIZATION); |
4391cd15 | 1411 | buf.appendf("Proxy-Authorization: " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(vh)); |
b38b26cb | 1412 | } else if (request->extacl_user.size() > 0 && request->extacl_passwd.size() > 0) { |
aadbbd7d AJ |
1413 | struct base64_encode_ctx ctx; |
1414 | base64_encode_init(&ctx); | |
1415 | uint8_t base64buf[base64_encode_len(MAX_LOGIN_SZ)]; | |
1416 | size_t resultLen = base64_encode_update(&ctx, base64buf, request->extacl_user.size(), reinterpret_cast<const uint8_t*>(request->extacl_user.rawBuf())); | |
1417 | resultLen += base64_encode_update(&ctx, base64buf+resultLen, 1, reinterpret_cast<const uint8_t*>(":")); | |
1418 | resultLen += base64_encode_update(&ctx, base64buf+resultLen, request->extacl_passwd.size(), reinterpret_cast<const uint8_t*>(request->extacl_passwd.rawBuf())); | |
1419 | resultLen += base64_encode_final(&ctx, base64buf+resultLen); | |
4391cd15 | 1420 | buf.appendf("Proxy-Authorization: Basic %.*s\r\n", (int)resultLen, base64buf); |
4232c626 | 1421 | } |
2cdeea82 | 1422 | |
3ff65596 AR |
1423 | // share the cross-transactional database records if needed |
1424 | if (Adaptation::Config::masterx_shared_name) { | |
ba8a478d | 1425 | Adaptation::History::Pointer ah = request->adaptHistory(false); |
3ff65596 AR |
1426 | if (ah != NULL) { |
1427 | String name, value; | |
1428 | if (ah->getXxRecord(name, value)) { | |
4391cd15 | 1429 | buf.appendf(SQUIDSTRINGPH ": " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(name), SQUIDSTRINGPRINT(value)); |
3ff65596 AR |
1430 | } |
1431 | } | |
1432 | } | |
e1381638 | 1433 | |
4391cd15 | 1434 | buf.append("Encapsulated: ", 14); |
774c051c | 1435 | |
1436 | MemBuf httpBuf; | |
12b91c99 | 1437 | |
774c051c | 1438 | httpBuf.init(); |
1439 | ||
1440 | // build HTTP request header, if any | |
1441 | ICAP::Method m = s.method; | |
1442 | ||
5f8252d2 | 1443 | // to simplify, we could assume that request is always available |
c99de607 | 1444 | |
c99de607 | 1445 | if (request) { |
c99de607 | 1446 | if (ICAP::methodRespmod == m) |
1447 | encapsulateHead(buf, "req-hdr", httpBuf, request); | |
e1381638 AJ |
1448 | else if (ICAP::methodReqmod == m) |
1449 | encapsulateHead(buf, "req-hdr", httpBuf, virgin.header); | |
c99de607 | 1450 | } |
774c051c | 1451 | |
1452 | if (ICAP::methodRespmod == m) | |
63df1d28 | 1453 | if (const Http::Message *prime = virgin.header) |
774c051c | 1454 | encapsulateHead(buf, "res-hdr", httpBuf, prime); |
1455 | ||
1456 | if (!virginBody.expected()) | |
4391cd15 | 1457 | buf.appendf("null-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1458 | else if (ICAP::methodReqmod == m) |
4391cd15 | 1459 | buf.appendf("req-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1460 | else |
4391cd15 | 1461 | buf.appendf("res-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1462 | |
1463 | buf.append(ICAP::crlf, 2); // terminate Encapsulated line | |
1464 | ||
c824c43b | 1465 | if (preview.enabled()) { |
4391cd15 | 1466 | buf.appendf("Preview: %d\r\n", (int)preview.ad()); |
83c51da9 | 1467 | if (!virginBody.expected()) // there is no body to preview |
5f8252d2 | 1468 | finishNullOrEmptyBodyPreview(httpBuf); |
774c051c | 1469 | } |
1470 | ||
83c51da9 | 1471 | makeAllowHeader(buf); |
774c051c | 1472 | |
a9044668 | 1473 | if (TheConfig.send_client_ip && request) { |
b7ac5457 | 1474 | Ip::Address client_addr; |
57d76dd4 | 1475 | #if FOLLOW_X_FORWARDED_FOR |
22fff3bf | 1476 | if (TheConfig.use_indirect_client) { |
a9044668 A |
1477 | client_addr = request->indirect_client_addr; |
1478 | } else | |
57d76dd4 | 1479 | #endif |
a9044668 | 1480 | client_addr = request->client_addr; |
4dd643d5 | 1481 | if (!client_addr.isAnyAddr() && !client_addr.isNoAddr()) |
4391cd15 | 1482 | buf.appendf("X-Client-IP: %s\r\n", client_addr.toStr(ntoabuf,MAX_IPSTRLEN)); |
57d76dd4 | 1483 | } |
a97e82a8 | 1484 | |
22fff3bf | 1485 | if (TheConfig.send_username && request) |
5f8252d2 | 1486 | makeUsernameHeader(request, buf); |
a97e82a8 | 1487 | |
71be37e0 | 1488 | // Adaptation::Config::metaHeaders |
75d47340 | 1489 | for (auto h: Adaptation::Config::metaHeaders) { |
71be37e0 | 1490 | HttpRequest *r = virgin.cause ? |
71ee0835 | 1491 | virgin.cause : dynamic_cast<HttpRequest*>(virgin.header); |
71be37e0 CT |
1492 | Must(r); |
1493 | ||
1494 | HttpReply *reply = dynamic_cast<HttpReply*>(virgin.header); | |
1495 | ||
75d47340 CT |
1496 | SBuf matched; |
1497 | if (h->match(r, reply, alMaster, matched)) { | |
1498 | buf.append(h->key().rawContent(), h->key().length()); | |
1499 | buf.append(": ", 2); | |
1500 | buf.append(matched.rawContent(), matched.length()); | |
1501 | buf.append("\r\n", 2); | |
d7f4a0b7 | 1502 | Adaptation::History::Pointer ah = request->adaptHistory(false); |
cf9f0261 CT |
1503 | if (ah != NULL) { |
1504 | if (ah->metaHeaders == NULL) | |
1505 | ah->metaHeaders = new NotePairs; | |
75d47340 CT |
1506 | if (!ah->metaHeaders->hasPair(h->key(), matched)) |
1507 | ah->metaHeaders->add(h->key(), matched); | |
cf9f0261 | 1508 | } |
d7f4a0b7 | 1509 | } |
71be37e0 CT |
1510 | } |
1511 | ||
bb790702 | 1512 | // fprintf(stderr, "%s\n", buf.content()); |
a97e82a8 | 1513 | |
774c051c | 1514 | buf.append(ICAP::crlf, 2); // terminate ICAP header |
1515 | ||
a22e6cd3 AR |
1516 | // fill icapRequest for logging |
1517 | Must(icapRequest->parseCharBuf(buf.content(), buf.contentSize())); | |
1518 | ||
774c051c | 1519 | // start ICAP request body with encapsulated HTTP headers |
1520 | buf.append(httpBuf.content(), httpBuf.contentSize()); | |
1521 | ||
1522 | httpBuf.clean(); | |
1523 | } | |
1524 | ||
83c51da9 CT |
1525 | // decides which Allow values to write and updates the request buffer |
1526 | void Adaptation::Icap::ModXact::makeAllowHeader(MemBuf &buf) | |
1527 | { | |
1528 | const bool allow204in = preview.enabled(); // TODO: add shouldAllow204in() | |
1529 | const bool allow204out = state.allowedPostview204 = shouldAllow204(); | |
1530 | const bool allow206in = state.allowedPreview206 = shouldAllow206in(); | |
1531 | const bool allow206out = state.allowedPostview206 = shouldAllow206out(); | |
69c698a3 | 1532 | const bool allowTrailers = true; // TODO: make configurable |
83c51da9 | 1533 | |
6fbd6ef2 | 1534 | debugs(93, 9, "Allows: " << allow204in << allow204out << |
69c698a3 | 1535 | allow206in << allow206out << allowTrailers); |
83c51da9 CT |
1536 | |
1537 | const bool allow204 = allow204in || allow204out; | |
1538 | const bool allow206 = allow206in || allow206out; | |
1539 | ||
6fbd6ef2 | 1540 | if (!allow204 && !allow206 && !allowTrailers) |
83c51da9 CT |
1541 | return; // nothing to do |
1542 | ||
1543 | if (virginBody.expected()) // if there is a virgin body, plan to send it | |
1544 | virginBodySending.plan(); | |
1545 | ||
1546 | // writing Preview:... means we will honor 204 inside preview | |
1547 | // writing Allow/204 means we will honor 204 outside preview | |
1548 | // writing Allow:206 means we will honor 206 inside preview | |
1549 | // writing Allow:204,206 means we will honor 206 outside preview | |
69c698a3 EB |
1550 | if (allow204 || allow206 || allowTrailers) { |
1551 | buf.appendf("Allow: "); | |
1552 | if (allow204out) | |
1553 | buf.appendf("204, "); | |
1554 | if (allow206) | |
1555 | buf.appendf("206, "); | |
1556 | if (allowTrailers) | |
1557 | buf.appendf("trailers"); | |
1558 | buf.appendf("\r\n"); | |
83c51da9 CT |
1559 | } |
1560 | } | |
1561 | ||
26cc52cb | 1562 | void Adaptation::Icap::ModXact::makeUsernameHeader(const HttpRequest *request, MemBuf &buf) |
9e008dda | 1563 | { |
74f6c040 | 1564 | #if USE_AUTH |
aadbbd7d AJ |
1565 | struct base64_encode_ctx ctx; |
1566 | base64_encode_init(&ctx); | |
1567 | ||
1568 | const char *value = NULL; | |
a33a428a | 1569 | if (request->auth_user_request != NULL) { |
aadbbd7d | 1570 | value = request->auth_user_request->username(); |
b38b26cb | 1571 | } else if (request->extacl_user.size() > 0) { |
aadbbd7d AJ |
1572 | value = request->extacl_user.termedBuf(); |
1573 | } | |
1574 | ||
1575 | if (value) { | |
1576 | if (TheConfig.client_username_encode) { | |
1577 | uint8_t base64buf[base64_encode_len(MAX_LOGIN_SZ)]; | |
1578 | size_t resultLen = base64_encode_update(&ctx, base64buf, strlen(value), reinterpret_cast<const uint8_t*>(value)); | |
1579 | resultLen += base64_encode_final(&ctx, base64buf+resultLen); | |
4391cd15 | 1580 | buf.appendf("%s: %.*s\r\n", TheConfig.client_username_header, (int)resultLen, base64buf); |
aadbbd7d | 1581 | } else |
4391cd15 | 1582 | buf.appendf("%s: %s\r\n", TheConfig.client_username_header, value); |
5f8252d2 | 1583 | } |
74f6c040 | 1584 | #endif |
5f8252d2 | 1585 | } |
1586 | ||
63df1d28 AJ |
1587 | void |
1588 | Adaptation::Icap::ModXact::encapsulateHead(MemBuf &icapBuf, const char *section, MemBuf &httpBuf, const Http::Message *head) | |
774c051c | 1589 | { |
1590 | // update ICAP header | |
4391cd15 | 1591 | icapBuf.appendf("%s=%d, ", section, (int) httpBuf.contentSize()); |
774c051c | 1592 | |
2cdeea82 | 1593 | // begin cloning |
63df1d28 | 1594 | Http::MessagePointer headClone; |
9e008dda | 1595 | |
2cdeea82 | 1596 | if (const HttpRequest* old_request = dynamic_cast<const HttpRequest*>(head)) { |
c7d51c86 | 1597 | HttpRequest::Pointer new_request(new HttpRequest); |
63df1d28 | 1598 | // copy the request-line details |
851feda6 AJ |
1599 | new_request->method = old_request->method; |
1600 | new_request->url = old_request->url; | |
2cdeea82 | 1601 | new_request->http_ver = old_request->http_ver; |
b248c2a3 | 1602 | headClone = new_request.getRaw(); |
9e008dda | 1603 | } else if (const HttpReply *old_reply = dynamic_cast<const HttpReply*>(head)) { |
c7d51c86 | 1604 | HttpReply::Pointer new_reply(new HttpReply); |
2cdeea82 | 1605 | new_reply->sline = old_reply->sline; |
b248c2a3 | 1606 | headClone = new_reply.getRaw(); |
2cdeea82 | 1607 | } |
02dd0839 | 1608 | Must(headClone); |
d67acb4e | 1609 | headClone->inheritProperties(head); |
9e008dda | 1610 | |
2cdeea82 | 1611 | HttpHeaderPos pos = HttpHeaderInitPos; |
02dd0839 | 1612 | while (HttpHeaderEntry* p_head_entry = head->header.getEntry(&pos)) |
2cdeea82 | 1613 | headClone->header.addEntry(p_head_entry->clone()); |
1614 | ||
1615 | // end cloning | |
9e008dda | 1616 | |
2cdeea82 | 1617 | // remove all hop-by-hop headers from the clone |
789217a2 | 1618 | headClone->header.delById(Http::HdrType::PROXY_AUTHENTICATE); |
2cdeea82 | 1619 | headClone->header.removeHopByHopEntries(); |
1620 | ||
1621 | // pack polished HTTP header | |
b248c2a3 | 1622 | packHead(httpBuf, headClone.getRaw()); |
2cdeea82 | 1623 | |
c7d51c86 | 1624 | // headClone unlocks and, hence, deletes the message we packed |
774c051c | 1625 | } |
1626 | ||
63df1d28 AJ |
1627 | void |
1628 | Adaptation::Icap::ModXact::packHead(MemBuf &httpBuf, const Http::Message *head) | |
774c051c | 1629 | { |
10201568 | 1630 | head->packInto(&httpBuf, true); |
774c051c | 1631 | } |
1632 | ||
1633 | // decides whether to offer a preview and calculates its size | |
26cc52cb | 1634 | void Adaptation::Icap::ModXact::decideOnPreview() |
774c051c | 1635 | { |
26cc52cb | 1636 | if (!TheConfig.preview_enable) { |
7cdbbd47 | 1637 | debugs(93, 5, HERE << "preview disabled by squid.conf"); |
c824c43b | 1638 | return; |
7cdbbd47 | 1639 | } |
1640 | ||
51b5dcf5 | 1641 | const SBuf urlPath(virginRequest().url.path()); |
5f8252d2 | 1642 | size_t wantedSize; |
c99de607 | 1643 | if (!service().wantsPreview(urlPath, wantedSize)) { |
51b5dcf5 | 1644 | debugs(93, 5, "should not offer preview for " << urlPath); |
c824c43b | 1645 | return; |
774c051c | 1646 | } |
1647 | ||
c824c43b | 1648 | // we decided to do preview, now compute its size |
1649 | ||
774c051c | 1650 | // cannot preview more than we can backup |
d85c3078 | 1651 | size_t ad = min(wantedSize, TheBackupLimit); |
774c051c | 1652 | |
5f8252d2 | 1653 | if (!virginBody.expected()) |
1654 | ad = 0; | |
e1381638 AJ |
1655 | else if (virginBody.knownSize()) |
1656 | ad = min(static_cast<uint64_t>(ad), virginBody.size()); // not more than we have | |
774c051c | 1657 | |
192378eb | 1658 | debugs(93, 5, HERE << "should offer " << ad << "-byte preview " << |
774c051c | 1659 | "(service wanted " << wantedSize << ")"); |
1660 | ||
1661 | preview.enable(ad); | |
5f8252d2 | 1662 | Must(preview.enabled()); |
774c051c | 1663 | } |
1664 | ||
1665 | // decides whether to allow 204 responses | |
26cc52cb | 1666 | bool Adaptation::Icap::ModXact::shouldAllow204() |
774c051c | 1667 | { |
1668 | if (!service().allows204()) | |
1669 | return false; | |
1670 | ||
c824c43b | 1671 | return canBackupEverything(); |
1672 | } | |
1673 | ||
83c51da9 CT |
1674 | // decides whether to allow 206 responses in some mode |
1675 | bool Adaptation::Icap::ModXact::shouldAllow206any() | |
1676 | { | |
1677 | return TheConfig.allow206_enable && service().allows206() && | |
7ddcfbab | 1678 | virginBody.expected(); // no need for 206 without a body |
83c51da9 CT |
1679 | } |
1680 | ||
1681 | // decides whether to allow 206 responses in preview mode | |
1682 | bool Adaptation::Icap::ModXact::shouldAllow206in() | |
1683 | { | |
1684 | return shouldAllow206any() && preview.enabled(); | |
1685 | } | |
1686 | ||
1687 | // decides whether to allow 206 responses outside of preview | |
1688 | bool Adaptation::Icap::ModXact::shouldAllow206out() | |
1689 | { | |
1690 | return shouldAllow206any() && canBackupEverything(); | |
1691 | } | |
1692 | ||
c824c43b | 1693 | // used by shouldAllow204 and decideOnRetries |
26cc52cb | 1694 | bool Adaptation::Icap::ModXact::canBackupEverything() const |
c824c43b | 1695 | { |
774c051c | 1696 | if (!virginBody.expected()) |
c824c43b | 1697 | return true; // no body means no problems with backup |
774c051c | 1698 | |
c824c43b | 1699 | // if there is a body, check whether we can backup it all |
774c051c | 1700 | |
1701 | if (!virginBody.knownSize()) | |
1702 | return false; | |
1703 | ||
1704 | // or should we have a different backup limit? | |
1705 | // note that '<' allows for 0-termination of the "full" backup buffer | |
1706 | return virginBody.size() < TheBackupLimit; | |
1707 | } | |
1708 | ||
c824c43b | 1709 | // Decide whether this transaction can be retried if pconn fails |
1710 | // Must be called after decideOnPreview and before openConnection() | |
26cc52cb | 1711 | void Adaptation::Icap::ModXact::decideOnRetries() |
c824c43b | 1712 | { |
1713 | if (!isRetriable) | |
1714 | return; // no, already decided | |
1715 | ||
1716 | if (preview.enabled()) | |
1717 | return; // yes, because preview provides enough guarantees | |
1718 | ||
1719 | if (canBackupEverything()) | |
1720 | return; // yes, because we can back everything up | |
1721 | ||
1722 | disableRetries(); // no, because we cannot back everything up | |
1723 | } | |
1724 | ||
5f8252d2 | 1725 | // Normally, the body-writing code handles preview body. It can deal with |
1726 | // bodies of unexpected size, including those that turn out to be empty. | |
1727 | // However, that code assumes that the body was expected and body control | |
1728 | // structures were initialized. This is not the case when there is no body | |
1729 | // or the body is known to be empty, because the virgin message will lack a | |
1730 | // body_pipe. So we handle preview of null-body and zero-size bodies here. | |
ced8def3 | 1731 | void Adaptation::Icap::ModXact::finishNullOrEmptyBodyPreview(MemBuf &) |
5f8252d2 | 1732 | { |
1733 | Must(!virginBodyWriting.active()); // one reason we handle it here | |
1734 | Must(!virgin.body_pipe); // another reason we handle it here | |
1735 | Must(!preview.ad()); | |
1736 | ||
1737 | // do not add last-chunk because our Encapsulated header says null-body | |
bb790702 | 1738 | // addLastRequestChunk(buf); |
5f8252d2 | 1739 | preview.wrote(0, true); |
1740 | ||
1741 | Must(preview.done()); | |
1742 | Must(preview.ieof()); | |
1743 | } | |
1744 | ||
26cc52cb | 1745 | void Adaptation::Icap::ModXact::fillPendingStatus(MemBuf &buf) const |
774c051c | 1746 | { |
26cc52cb | 1747 | Adaptation::Icap::Xaction::fillPendingStatus(buf); |
c99de607 | 1748 | |
774c051c | 1749 | if (state.serviceWaiting) |
1750 | buf.append("U", 1); | |
1751 | ||
5f8252d2 | 1752 | if (virgin.body_pipe != NULL) |
c99de607 | 1753 | buf.append("R", 1); |
1754 | ||
aed188fd | 1755 | if (haveConnection() && !doneReading()) |
c99de607 | 1756 | buf.append("r", 1); |
1757 | ||
774c051c | 1758 | if (!state.doneWriting() && state.writing != State::writingInit) |
4391cd15 | 1759 | buf.appendf("w(%d)", state.writing); |
774c051c | 1760 | |
1761 | if (preview.enabled()) { | |
1762 | if (!preview.done()) | |
4391cd15 | 1763 | buf.appendf("P(%d)", (int) preview.debt()); |
774c051c | 1764 | } |
1765 | ||
5f8252d2 | 1766 | if (virginBodySending.active()) |
774c051c | 1767 | buf.append("B", 1); |
1768 | ||
1769 | if (!state.doneParsing() && state.parsing != State::psIcapHeader) | |
4391cd15 | 1770 | buf.appendf("p(%d)", state.parsing); |
774c051c | 1771 | |
1772 | if (!doneSending() && state.sending != State::sendingUndecided) | |
4391cd15 | 1773 | buf.appendf("S(%d)", state.sending); |
478cfe99 | 1774 | |
83c51da9 CT |
1775 | if (state.readyForUob) |
1776 | buf.append("6", 1); | |
1777 | ||
478cfe99 | 1778 | if (canStartBypass) |
9e008dda | 1779 | buf.append("Y", 1); |
a22e6cd3 AR |
1780 | |
1781 | if (protectGroupBypass) | |
1782 | buf.append("G", 1); | |
774c051c | 1783 | } |
1784 | ||
26cc52cb | 1785 | void Adaptation::Icap::ModXact::fillDoneStatus(MemBuf &buf) const |
774c051c | 1786 | { |
26cc52cb | 1787 | Adaptation::Icap::Xaction::fillDoneStatus(buf); |
c99de607 | 1788 | |
5f8252d2 | 1789 | if (!virgin.body_pipe) |
774c051c | 1790 | buf.append("R", 1); |
1791 | ||
1792 | if (state.doneWriting()) | |
1793 | buf.append("w", 1); | |
1794 | ||
1795 | if (preview.enabled()) { | |
1796 | if (preview.done()) | |
4391cd15 | 1797 | buf.appendf("P%s", preview.ieof() ? "(ieof)" : ""); |
774c051c | 1798 | } |
1799 | ||
1800 | if (doneReading()) | |
1801 | buf.append("r", 1); | |
1802 | ||
1803 | if (state.doneParsing()) | |
1804 | buf.append("p", 1); | |
1805 | ||
1806 | if (doneSending()) | |
1807 | buf.append("S", 1); | |
1808 | } | |
1809 | ||
26cc52cb | 1810 | bool Adaptation::Icap::ModXact::gotEncapsulated(const char *section) const |
774c051c | 1811 | { |
a9925b40 | 1812 | return icapReply->header.getByNameListMember("Encapsulated", |
1813 | section, ',').size() > 0; | |
774c051c | 1814 | } |
1815 | ||
1816 | // calculate whether there is a virgin HTTP body and | |
1817 | // whether its expected size is known | |
5f8252d2 | 1818 | // TODO: rename because we do not just estimate |
26cc52cb | 1819 | void Adaptation::Icap::ModXact::estimateVirginBody() |
774c051c | 1820 | { |
5f8252d2 | 1821 | // note: lack of size info may disable previews and 204s |
774c051c | 1822 | |
63df1d28 | 1823 | Http::Message *msg = virgin.header; |
5f8252d2 | 1824 | Must(msg); |
774c051c | 1825 | |
60745f24 | 1826 | HttpRequestMethod method; |
774c051c | 1827 | |
5f8252d2 | 1828 | if (virgin.cause) |
1829 | method = virgin.cause->method; | |
e1381638 AJ |
1830 | else if (HttpRequest *req = dynamic_cast<HttpRequest*>(msg)) |
1831 | method = req->method; | |
774c051c | 1832 | else |
c2a7cefd | 1833 | method = Http::METHOD_NONE; |
774c051c | 1834 | |
47f6e231 | 1835 | int64_t size; |
5f8252d2 | 1836 | // expectingBody returns true for zero-sized bodies, but we will not |
1837 | // get a pipe for that body, so we treat the message as bodyless | |
c2a7cefd | 1838 | if (method != Http::METHOD_NONE && msg->expectingBody(method, size) && size) { |
192378eb | 1839 | debugs(93, 6, HERE << "expects virgin body from " << |
9e008dda | 1840 | virgin.body_pipe << "; size: " << size); |
5f8252d2 | 1841 | |
1842 | virginBody.expect(size); | |
1843 | virginBodyWriting.plan(); | |
1844 | ||
1845 | // sign up as a body consumer | |
1846 | Must(msg->body_pipe != NULL); | |
1847 | Must(msg->body_pipe == virgin.body_pipe); | |
1848 | Must(virgin.body_pipe->setConsumerIfNotLate(this)); | |
1849 | ||
1850 | // make sure TheBackupLimit is in-sync with the buffer size | |
9c175897 | 1851 | Must(TheBackupLimit <= static_cast<size_t>(msg->body_pipe->buf().max_capacity)); |
774c051c | 1852 | } else { |
192378eb | 1853 | debugs(93, 6, HERE << "does not expect virgin body"); |
5f8252d2 | 1854 | Must(msg->body_pipe == NULL); |
1855 | checkConsuming(); | |
774c051c | 1856 | } |
1857 | } | |
1858 | ||
26cc52cb | 1859 | void Adaptation::Icap::ModXact::makeAdaptedBodyPipe(const char *what) |
9e008dda | 1860 | { |
5f8252d2 | 1861 | Must(!adapted.body_pipe); |
1862 | Must(!adapted.header->body_pipe); | |
1863 | adapted.header->body_pipe = new BodyPipe(this); | |
1864 | adapted.body_pipe = adapted.header->body_pipe; | |
1865 | debugs(93, 7, HERE << "will supply " << what << " via " << | |
9e008dda | 1866 | adapted.body_pipe << " pipe"); |
5f8252d2 | 1867 | } |
1868 | ||
26cc52cb | 1869 | // TODO: Move SizedEstimate and Preview elsewhere |
774c051c | 1870 | |
26cc52cb | 1871 | Adaptation::Icap::SizedEstimate::SizedEstimate() |
f53969cc | 1872 | : theData(dtUnexpected) |
774c051c | 1873 | {} |
1874 | ||
26cc52cb | 1875 | void Adaptation::Icap::SizedEstimate::expect(int64_t aSize) |
774c051c | 1876 | { |
47f6e231 | 1877 | theData = (aSize >= 0) ? aSize : (int64_t)dtUnknown; |
774c051c | 1878 | } |
1879 | ||
26cc52cb | 1880 | bool Adaptation::Icap::SizedEstimate::expected() const |
774c051c | 1881 | { |
1882 | return theData != dtUnexpected; | |
1883 | } | |
1884 | ||
26cc52cb | 1885 | bool Adaptation::Icap::SizedEstimate::knownSize() const |
774c051c | 1886 | { |
1887 | Must(expected()); | |
1888 | return theData != dtUnknown; | |
1889 | } | |
1890 | ||
26cc52cb | 1891 | uint64_t Adaptation::Icap::SizedEstimate::size() const |
774c051c | 1892 | { |
1893 | Must(knownSize()); | |
47f6e231 | 1894 | return static_cast<uint64_t>(theData); |
774c051c | 1895 | } |
1896 | ||
26cc52cb | 1897 | Adaptation::Icap::VirginBodyAct::VirginBodyAct(): theStart(0), theState(stUndecided) |
774c051c | 1898 | {} |
1899 | ||
26cc52cb | 1900 | void Adaptation::Icap::VirginBodyAct::plan() |
774c051c | 1901 | { |
478cfe99 | 1902 | Must(!disabled()); |
1903 | Must(!theStart); // not started | |
1904 | theState = stActive; | |
774c051c | 1905 | } |
1906 | ||
26cc52cb | 1907 | void Adaptation::Icap::VirginBodyAct::disable() |
774c051c | 1908 | { |
478cfe99 | 1909 | theState = stDisabled; |
774c051c | 1910 | } |
1911 | ||
26cc52cb | 1912 | void Adaptation::Icap::VirginBodyAct::progress(size_t size) |
774c051c | 1913 | { |
1914 | Must(active()); | |
46e172d9 FC |
1915 | #if SIZEOF_SIZE_T > 4 |
1916 | /* always true for smaller size_t's */ | |
d897ae49 | 1917 | Must(static_cast<int64_t>(size) >= 0); |
46e172d9 | 1918 | #endif |
47f6e231 | 1919 | theStart += static_cast<int64_t>(size); |
774c051c | 1920 | } |
1921 | ||
26cc52cb | 1922 | uint64_t Adaptation::Icap::VirginBodyAct::offset() const |
774c051c | 1923 | { |
1924 | Must(active()); | |
47f6e231 | 1925 | return static_cast<uint64_t>(theStart); |
774c051c | 1926 | } |
1927 | ||
26cc52cb | 1928 | Adaptation::Icap::Preview::Preview(): theWritten(0), theAd(0), theState(stDisabled) |
774c051c | 1929 | {} |
1930 | ||
26cc52cb | 1931 | void Adaptation::Icap::Preview::enable(size_t anAd) |
774c051c | 1932 | { |
1933 | // TODO: check for anAd not exceeding preview size limit | |
774c051c | 1934 | Must(!enabled()); |
1935 | theAd = anAd; | |
1936 | theState = stWriting; | |
1937 | } | |
1938 | ||
26cc52cb | 1939 | bool Adaptation::Icap::Preview::enabled() const |
774c051c | 1940 | { |
1941 | return theState != stDisabled; | |
1942 | } | |
1943 | ||
26cc52cb | 1944 | size_t Adaptation::Icap::Preview::ad() const |
774c051c | 1945 | { |
1946 | Must(enabled()); | |
1947 | return theAd; | |
1948 | } | |
1949 | ||
26cc52cb | 1950 | bool Adaptation::Icap::Preview::done() const |
774c051c | 1951 | { |
1952 | Must(enabled()); | |
1953 | return theState >= stIeof; | |
1954 | } | |
1955 | ||
26cc52cb | 1956 | bool Adaptation::Icap::Preview::ieof() const |
774c051c | 1957 | { |
1958 | Must(enabled()); | |
1959 | return theState == stIeof; | |
1960 | } | |
1961 | ||
26cc52cb | 1962 | size_t Adaptation::Icap::Preview::debt() const |
774c051c | 1963 | { |
1964 | Must(enabled()); | |
1965 | return done() ? 0 : (theAd - theWritten); | |
1966 | } | |
1967 | ||
26cc52cb | 1968 | void Adaptation::Icap::Preview::wrote(size_t size, bool wroteEof) |
774c051c | 1969 | { |
1970 | Must(enabled()); | |
5f8252d2 | 1971 | |
774c051c | 1972 | theWritten += size; |
1973 | ||
9e008dda | 1974 | Must(theWritten <= theAd); |
5f8252d2 | 1975 | |
9e008dda AJ |
1976 | if (wroteEof) |
1977 | theState = stIeof; // written size is irrelevant | |
e1381638 AJ |
1978 | else if (theWritten >= theAd) |
1979 | theState = stDone; | |
774c051c | 1980 | } |
1981 | ||
26cc52cb | 1982 | bool Adaptation::Icap::ModXact::fillVirginHttpHeader(MemBuf &mb) const |
3cfc19b3 | 1983 | { |
5f8252d2 | 1984 | if (virgin.header == NULL) |
3cfc19b3 | 1985 | return false; |
1986 | ||
5f8252d2 | 1987 | virgin.header->firstLineBuf(mb); |
3cfc19b3 | 1988 | |
1989 | return true; | |
1990 | } | |
c824c43b | 1991 | |
64b66b76 CT |
1992 | void Adaptation::Icap::ModXact::detailError(int errDetail) |
1993 | { | |
e9fa5493 AR |
1994 | HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
1995 | // if no adapted request, update virgin (and inherit its properties later) | |
1996 | // TODO: make this and HttpRequest::detailError constant, like adaptHistory | |
1997 | if (!request) | |
1998 | request = const_cast<HttpRequest*>(&virginRequest()); | |
1999 | ||
2000 | if (request) | |
64b66b76 | 2001 | request->detailError(ERR_ICAP_FAILURE, errDetail); |
64b66b76 | 2002 | } |
c824c43b | 2003 | |
129fe2a1 CT |
2004 | void Adaptation::Icap::ModXact::clearError() |
2005 | { | |
87f237a9 | 2006 | HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
129fe2a1 CT |
2007 | // if no adapted request, update virgin (and inherit its properties later) |
2008 | if (!request) | |
2009 | request = const_cast<HttpRequest*>(&virginRequest()); | |
2010 | ||
2011 | if (request) | |
2012 | request->clearError(); | |
2013 | } | |
2014 | ||
88df846b CT |
2015 | void Adaptation::Icap::ModXact::updateSources() |
2016 | { | |
2017 | Must(adapted.header); | |
63df1d28 | 2018 | adapted.header->sources |= (service().cfg().connectionEncryption ? Http::Message::srcIcaps : Http::Message::srcIcap); |
88df846b CT |
2019 | } |
2020 | ||
26cc52cb | 2021 | /* Adaptation::Icap::ModXactLauncher */ |
c824c43b | 2022 | |
63df1d28 | 2023 | Adaptation::Icap::ModXactLauncher::ModXactLauncher(Http::Message *virginHeader, HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::ServicePointer aService): |
f53969cc SM |
2024 | AsyncJob("Adaptation::Icap::ModXactLauncher"), |
2025 | Adaptation::Icap::Launcher("Adaptation::Icap::ModXactLauncher", aService), | |
2026 | al(alp) | |
c824c43b | 2027 | { |
2028 | virgin.setHeader(virginHeader); | |
2029 | virgin.setCause(virginCause); | |
3ff65596 | 2030 | updateHistory(true); |
c824c43b | 2031 | } |
2032 | ||
26cc52cb | 2033 | Adaptation::Icap::Xaction *Adaptation::Icap::ModXactLauncher::createXaction() |
c824c43b | 2034 | { |
26cc52cb AR |
2035 | Adaptation::Icap::ServiceRep::Pointer s = |
2036 | dynamic_cast<Adaptation::Icap::ServiceRep*>(theService.getRaw()); | |
0bef8dd7 | 2037 | Must(s != NULL); |
af0ded40 | 2038 | return new Adaptation::Icap::ModXact(virgin.header, virgin.cause, al, s); |
c824c43b | 2039 | } |
3ff65596 | 2040 | |
e1381638 AJ |
2041 | void Adaptation::Icap::ModXactLauncher::swanSong() |
2042 | { | |
3ff65596 AR |
2043 | debugs(93, 5, HERE << "swan sings"); |
2044 | updateHistory(false); | |
2045 | Adaptation::Icap::Launcher::swanSong(); | |
2046 | } | |
2047 | ||
b0365bd9 | 2048 | void Adaptation::Icap::ModXactLauncher::updateHistory(bool doStart) |
e1381638 AJ |
2049 | { |
2050 | HttpRequest *r = virgin.cause ? | |
2051 | virgin.cause : dynamic_cast<HttpRequest*>(virgin.header); | |
2052 | ||
2053 | // r should never be NULL but we play safe; TODO: add Should() | |
2054 | if (r) { | |
2055 | Adaptation::Icap::History::Pointer h = r->icapHistory(); | |
2056 | if (h != NULL) { | |
b0365bd9 | 2057 | if (doStart) |
e1381638 AJ |
2058 | h->start("ICAPModXactLauncher"); |
2059 | else | |
2060 | h->stop("ICAPModXactLauncher"); | |
2061 | } | |
2062 | } | |
3ff65596 | 2063 | } |
f53969cc | 2064 | |
69c698a3 EB |
2065 | bool Adaptation::Icap::TrailerParser::parse(const char *buf, int len, int atEnd, Http::StatusCode *error) { |
2066 | const int parsed = trailer.parse(buf, len, atEnd, hdr_sz); | |
2067 | if (parsed < 0) | |
2068 | *error = Http::scInvalidHeader; // TODO: should we add a new Http::scInvalidTrailer? | |
2069 | return parsed > 0; | |
2070 | } | |
2071 |