]>
Commit | Line | Data |
---|---|---|
774c051c | 1 | /* |
f6e9a3ee | 2 | * Copyright (C) 1996-2019 The Squid Software Foundation and contributors |
bbc27441 AJ |
3 | * |
4 | * Squid software is distributed under GPLv2+ license and includes | |
5 | * contributions from numerous individuals and organizations. | |
6 | * Please see the COPYING and CONTRIBUTORS files for details. | |
774c051c | 7 | */ |
8 | ||
bbc27441 AJ |
9 | /* DEBUG: section 93 ICAP (RFC 3507) Client */ |
10 | ||
582c2af2 | 11 | #include "squid.h" |
3d93a84d | 12 | #include "AccessLogEntry.h" |
1adcebc3 | 13 | #include "adaptation/Answer.h" |
3d93a84d AJ |
14 | #include "adaptation/History.h" |
15 | #include "adaptation/icap/Client.h" | |
16 | #include "adaptation/icap/Config.h" | |
17 | #include "adaptation/icap/History.h" | |
18 | #include "adaptation/icap/Launcher.h" | |
19 | #include "adaptation/icap/ModXact.h" | |
20 | #include "adaptation/icap/ServiceRep.h" | |
21 | #include "adaptation/Initiator.h" | |
22 | #include "auth/UserRequest.h" | |
23 | #include "base/TextException.h" | |
25f98340 | 24 | #include "base64.h" |
774c051c | 25 | #include "comm.h" |
d6327017 | 26 | #include "comm/Connection.h" |
582c2af2 | 27 | #include "err_detail_type.h" |
4f1c93a7 | 28 | #include "http/ContentLengthInterpreter.h" |
db1720f8 | 29 | #include "http/one/TeChunkedParser.h" |
a5bac1d2 | 30 | #include "HttpHeaderTools.h" |
774c051c | 31 | #include "HttpReply.h" |
5ceaee75 | 32 | #include "MasterXaction.h" |
985c86bc | 33 | #include "SquidTime.h" |
774c051c | 34 | |
35 | // flow and terminology: | |
36 | // HTTP| --> receive --> encode --> write --> |network | |
37 | // end | <-- send <-- parse <-- read <-- |end | |
38 | ||
774c051c | 39 | // TODO: replace gotEncapsulated() with something faster; we call it often |
40 | ||
26cc52cb AR |
41 | CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXact); |
42 | CBDATA_NAMESPACED_CLASS_INIT(Adaptation::Icap, ModXactLauncher); | |
774c051c | 43 | |
5f8252d2 | 44 | static const size_t TheBackupLimit = BodyPipe::MaxCapacity; |
774c051c | 45 | |
26cc52cb | 46 | Adaptation::Icap::ModXact::State::State() |
774c051c | 47 | { |
09bfe95f | 48 | memset(this, 0, sizeof(*this)); |
774c051c | 49 | } |
50 | ||
63df1d28 | 51 | Adaptation::Icap::ModXact::ModXact(Http::Message *virginHeader, |
af0ded40 | 52 | HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::Icap::ServiceRep::Pointer &aService): |
f53969cc SM |
53 | AsyncJob("Adaptation::Icap::ModXact"), |
54 | Adaptation::Icap::Xaction("Adaptation::Icap::ModXact", aService), | |
55 | virginConsumed(0), | |
56 | bodyParser(NULL), | |
57 | canStartBypass(false), // too early | |
58 | protectGroupBypass(true), | |
59 | replyHttpHeaderSize(-1), | |
60 | replyHttpBodySize(-1), | |
61 | adaptHistoryId(-1), | |
69c698a3 | 62 | trailerParser(nullptr), |
f53969cc | 63 | alMaster(alp) |
774c051c | 64 | { |
5f8252d2 | 65 | assert(virginHeader); |
774c051c | 66 | |
5f8252d2 | 67 | virgin.setHeader(virginHeader); // sets virgin.body_pipe if needed |
68 | virgin.setCause(virginCause); // may be NULL | |
774c051c | 69 | |
5f8252d2 | 70 | // adapted header and body are initialized when we parse them |
774c051c | 71 | |
26cc52cb | 72 | // writing and reading ends are handled by Adaptation::Icap::Xaction |
774c051c | 73 | |
74 | // encoding | |
75 | // nothing to do because we are using temporary buffers | |
76 | ||
3ff65596 | 77 | // parsing; TODO: do not set until we parse, see ICAPOptXact |
c7d51c86 | 78 | icapReply = new HttpReply; |
774c051c | 79 | icapReply->protoPrefix = "ICAP/"; // TODO: make an IcapReply class? |
80 | ||
192378eb | 81 | debugs(93,7, HERE << "initialized." << status()); |
774c051c | 82 | } |
83 | ||
5f8252d2 | 84 | // initiator wants us to start |
26cc52cb | 85 | void Adaptation::Icap::ModXact::start() |
774c051c | 86 | { |
26cc52cb | 87 | Adaptation::Icap::Xaction::start(); |
774c051c | 88 | |
3ff65596 | 89 | // reserve an adaptation history slot (attempts are known at this time) |
a22e6cd3 | 90 | Adaptation::History::Pointer ah = virginRequest().adaptLogHistory(); |
3ff65596 AR |
91 | if (ah != NULL) |
92 | adaptHistoryId = ah->recordXactStart(service().cfg().key, icap_tr_start, attempts > 1); | |
93 | ||
774c051c | 94 | estimateVirginBody(); // before virgin disappears! |
95 | ||
0bef8dd7 | 96 | canStartBypass = service().cfg().bypass; |
478cfe99 | 97 | |
774c051c | 98 | // it is an ICAP violation to send request to a service w/o known OPTIONS |
2dba5b8e CT |
99 | // and the service may is too busy for us: honor Max-Connections and such |
100 | if (service().up() && service().availableForNew()) | |
774c051c | 101 | startWriting(); |
102 | else | |
103 | waitForService(); | |
774c051c | 104 | } |
105 | ||
26cc52cb | 106 | void Adaptation::Icap::ModXact::waitForService() |
774c051c | 107 | { |
2dba5b8e | 108 | const char *comment; |
774c051c | 109 | Must(!state.serviceWaiting); |
2dba5b8e CT |
110 | |
111 | if (!service().up()) { | |
112 | AsyncCall::Pointer call = JobCallback(93,5, | |
113 | ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceReady); | |
114 | ||
115 | service().callWhenReady(call); | |
116 | comment = "to be up"; | |
117 | } else { | |
118 | //The service is unavailable because of max-connection or other reason | |
119 | ||
120 | if (service().cfg().onOverload != srvWait) { | |
121 | // The service is overloaded, but waiting to be available prohibited by | |
122 | // user configuration (onOverload is set to "block" or "bypass") | |
123 | if (service().cfg().onOverload == srvBlock) | |
124 | disableBypass("not available", true); | |
125 | else //if (service().cfg().onOverload == srvBypass) | |
126 | canStartBypass = true; | |
127 | ||
128 | disableRetries(); | |
129 | disableRepeats("ICAP service is not available"); | |
130 | ||
131 | debugs(93, 7, HERE << "will not wait for the service to be available" << | |
132 | status()); | |
133 | ||
134 | throw TexcHere("ICAP service is not available"); | |
135 | } | |
136 | ||
137 | AsyncCall::Pointer call = JobCallback(93,5, | |
138 | ConnWaiterDialer, this, Adaptation::Icap::ModXact::noteServiceAvailable); | |
139 | service().callWhenAvailable(call, state.waitedForService); | |
140 | comment = "to be available"; | |
141 | } | |
142 | ||
143 | debugs(93, 7, HERE << "will wait for the service " << comment << status()); | |
c7d51c86 | 144 | state.serviceWaiting = true; // after callWhenReady() which may throw |
2dba5b8e | 145 | state.waitedForService = true; |
774c051c | 146 | } |
147 | ||
26cc52cb | 148 | void Adaptation::Icap::ModXact::noteServiceReady() |
774c051c | 149 | { |
774c051c | 150 | Must(state.serviceWaiting); |
151 | state.serviceWaiting = false; | |
c99de607 | 152 | |
2dba5b8e | 153 | if (!service().up()) { |
c824c43b | 154 | disableRetries(); |
3ff65596 | 155 | disableRepeats("ICAP service is unusable"); |
478cfe99 | 156 | throw TexcHere("ICAP service is unusable"); |
c824c43b | 157 | } |
2dba5b8e CT |
158 | |
159 | if (service().availableForOld()) | |
160 | startWriting(); | |
161 | else | |
162 | waitForService(); | |
163 | } | |
164 | ||
165 | void Adaptation::Icap::ModXact::noteServiceAvailable() | |
166 | { | |
167 | Must(state.serviceWaiting); | |
168 | state.serviceWaiting = false; | |
169 | ||
170 | if (service().up() && service().availableForOld()) | |
171 | startWriting(); | |
172 | else | |
173 | waitForService(); | |
774c051c | 174 | } |
175 | ||
26cc52cb | 176 | void Adaptation::Icap::ModXact::startWriting() |
774c051c | 177 | { |
774c051c | 178 | state.writing = State::writingConnect; |
c824c43b | 179 | |
180 | decideOnPreview(); // must be decided before we decideOnRetries | |
181 | decideOnRetries(); | |
182 | ||
774c051c | 183 | openConnection(); |
774c051c | 184 | } |
185 | ||
186 | // connection with the ICAP service established | |
26cc52cb | 187 | void Adaptation::Icap::ModXact::handleCommConnected() |
774c051c | 188 | { |
189 | Must(state.writing == State::writingConnect); | |
190 | ||
191 | startReading(); // wait for early errors from the ICAP server | |
192 | ||
193 | MemBuf requestBuf; | |
194 | requestBuf.init(); | |
195 | ||
196 | makeRequestHeaders(requestBuf); | |
192378eb | 197 | debugs(93, 9, HERE << "will write" << status() << ":\n" << |
774c051c | 198 | (requestBuf.terminate(), requestBuf.content())); |
199 | ||
200 | // write headers | |
201 | state.writing = State::writingHeaders; | |
3ff65596 | 202 | icap_tio_start = current_time; |
774c051c | 203 | scheduleWrite(requestBuf); |
204 | } | |
205 | ||
26cc52cb | 206 | void Adaptation::Icap::ModXact::handleCommWrote(size_t sz) |
774c051c | 207 | { |
b107a5a5 | 208 | debugs(93, 5, HERE << "Wrote " << sz << " bytes"); |
209 | ||
774c051c | 210 | if (state.writing == State::writingHeaders) |
211 | handleCommWroteHeaders(); | |
212 | else | |
213 | handleCommWroteBody(); | |
214 | } | |
215 | ||
26cc52cb | 216 | void Adaptation::Icap::ModXact::handleCommWroteHeaders() |
774c051c | 217 | { |
218 | Must(state.writing == State::writingHeaders); | |
219 | ||
5f8252d2 | 220 | // determine next step |
23e05fb1 AR |
221 | if (preview.enabled()) { |
222 | if (preview.done()) | |
223 | decideWritingAfterPreview("zero-size"); | |
224 | else | |
225 | state.writing = State::writingPreview; | |
226 | } else if (virginBody.expected()) { | |
e1381638 | 227 | state.writing = State::writingPrime; |
23e05fb1 | 228 | } else { |
e1381638 AJ |
229 | stopWriting(true); |
230 | return; | |
231 | } | |
5f8252d2 | 232 | |
233 | writeMore(); | |
774c051c | 234 | } |
235 | ||
26cc52cb | 236 | void Adaptation::Icap::ModXact::writeMore() |
774c051c | 237 | { |
5f8252d2 | 238 | debugs(93, 5, HERE << "checking whether to write more" << status()); |
239 | ||
bd7f2ede | 240 | if (writer != NULL) // already writing something |
774c051c | 241 | return; |
242 | ||
243 | switch (state.writing) { | |
244 | ||
245 | case State::writingInit: // waiting for service OPTIONS | |
246 | Must(state.serviceWaiting); | |
247 | ||
248 | case State::writingConnect: // waiting for the connection to establish | |
249 | ||
250 | case State::writingHeaders: // waiting for the headers to be written | |
251 | ||
252 | case State::writingPaused: // waiting for the ICAP server response | |
253 | ||
c99de607 | 254 | case State::writingReallyDone: // nothing more to write |
255 | return; | |
256 | ||
257 | case State::writingAlmostDone: // was waiting for the last write | |
258 | stopWriting(false); | |
774c051c | 259 | return; |
260 | ||
261 | case State::writingPreview: | |
5f8252d2 | 262 | writePreviewBody(); |
774c051c | 263 | return; |
264 | ||
265 | case State::writingPrime: | |
266 | writePrimeBody(); | |
267 | return; | |
268 | ||
269 | default: | |
26cc52cb | 270 | throw TexcHere("Adaptation::Icap::ModXact in bad writing state"); |
774c051c | 271 | } |
272 | } | |
273 | ||
26cc52cb | 274 | void Adaptation::Icap::ModXact::writePreviewBody() |
774c051c | 275 | { |
5f8252d2 | 276 | debugs(93, 8, HERE << "will write Preview body from " << |
9e008dda | 277 | virgin.body_pipe << status()); |
774c051c | 278 | Must(state.writing == State::writingPreview); |
5f8252d2 | 279 | Must(virgin.body_pipe != NULL); |
774c051c | 280 | |
5f8252d2 | 281 | const size_t sizeMax = (size_t)virgin.body_pipe->buf().contentSize(); |
d85c3078 | 282 | const size_t size = min(preview.debt(), sizeMax); |
774c051c | 283 | writeSomeBody("preview body", size); |
284 | ||
285 | // change state once preview is written | |
286 | ||
23e05fb1 AR |
287 | if (preview.done()) |
288 | decideWritingAfterPreview("body"); | |
289 | } | |
774c051c | 290 | |
23e05fb1 AR |
291 | /// determine state.writing after we wrote the entire preview |
292 | void Adaptation::Icap::ModXact::decideWritingAfterPreview(const char *kind) | |
293 | { | |
294 | if (preview.ieof()) // nothing more to write | |
295 | stopWriting(true); | |
e81d21e0 | 296 | else if (state.parsing == State::psIcapHeader) // did not get a reply yet |
23e05fb1 AR |
297 | state.writing = State::writingPaused; // wait for the ICAP server reply |
298 | else | |
299 | stopWriting(true); // ICAP server reply implies no post-preview writing | |
300 | ||
301 | debugs(93, 6, HERE << "decided on writing after " << kind << " preview" << | |
e81d21e0 | 302 | status()); |
774c051c | 303 | } |
304 | ||
26cc52cb | 305 | void Adaptation::Icap::ModXact::writePrimeBody() |
774c051c | 306 | { |
307 | Must(state.writing == State::writingPrime); | |
5f8252d2 | 308 | Must(virginBodyWriting.active()); |
774c051c | 309 | |
5f8252d2 | 310 | const size_t size = (size_t)virgin.body_pipe->buf().contentSize(); |
774c051c | 311 | writeSomeBody("prime virgin body", size); |
312 | ||
5f8252d2 | 313 | if (virginBodyEndReached(virginBodyWriting)) { |
314 | debugs(93, 5, HERE << "wrote entire body"); | |
c99de607 | 315 | stopWriting(true); |
b107a5a5 | 316 | } |
774c051c | 317 | } |
318 | ||
26cc52cb | 319 | void Adaptation::Icap::ModXact::writeSomeBody(const char *label, size_t size) |
774c051c | 320 | { |
c99de607 | 321 | Must(!writer && state.writing < state.writingAlmostDone); |
5f8252d2 | 322 | Must(virgin.body_pipe != NULL); |
12f4b710 | 323 | debugs(93, 8, HERE << "will write up to " << size << " bytes of " << |
774c051c | 324 | label); |
325 | ||
326 | MemBuf writeBuf; // TODO: suggest a min size based on size and lastChunk | |
327 | ||
328 | writeBuf.init(); // note: we assume that last-chunk will fit | |
329 | ||
5f8252d2 | 330 | const size_t writableSize = virginContentSize(virginBodyWriting); |
d85c3078 | 331 | const size_t chunkSize = min(writableSize, size); |
774c051c | 332 | |
333 | if (chunkSize) { | |
12f4b710 | 334 | debugs(93, 7, HERE << "will write " << chunkSize << |
774c051c | 335 | "-byte chunk of " << label); |
5f8252d2 | 336 | |
337 | openChunk(writeBuf, chunkSize, false); | |
338 | writeBuf.append(virginContentData(virginBodyWriting), chunkSize); | |
339 | closeChunk(writeBuf); | |
340 | ||
341 | virginBodyWriting.progress(chunkSize); | |
342 | virginConsume(); | |
774c051c | 343 | } else { |
192378eb | 344 | debugs(93, 7, HERE << "has no writable " << label << " content"); |
774c051c | 345 | } |
346 | ||
5f8252d2 | 347 | const bool wroteEof = virginBodyEndReached(virginBodyWriting); |
348 | bool lastChunk = wroteEof; | |
349 | if (state.writing == State::writingPreview) { | |
350 | preview.wrote(chunkSize, wroteEof); // even if wrote nothing | |
351 | lastChunk = lastChunk || preview.done(); | |
352 | } | |
774c051c | 353 | |
5f8252d2 | 354 | if (lastChunk) { |
12f4b710 | 355 | debugs(93, 8, HERE << "will write last-chunk of " << label); |
774c051c | 356 | addLastRequestChunk(writeBuf); |
357 | } | |
358 | ||
12f4b710 | 359 | debugs(93, 7, HERE << "will write " << writeBuf.contentSize() |
774c051c | 360 | << " raw bytes of " << label); |
361 | ||
362 | if (writeBuf.hasContent()) { | |
363 | scheduleWrite(writeBuf); // comm will free the chunk | |
364 | } else { | |
365 | writeBuf.clean(); | |
366 | } | |
367 | } | |
368 | ||
26cc52cb | 369 | void Adaptation::Icap::ModXact::addLastRequestChunk(MemBuf &buf) |
774c051c | 370 | { |
c99de607 | 371 | const bool ieof = state.writing == State::writingPreview && preview.ieof(); |
372 | openChunk(buf, 0, ieof); | |
373 | closeChunk(buf); | |
774c051c | 374 | } |
375 | ||
26cc52cb | 376 | void Adaptation::Icap::ModXact::openChunk(MemBuf &buf, size_t chunkSize, bool ieof) |
774c051c | 377 | { |
4391cd15 | 378 | buf.appendf((ieof ? "%x; ieof\r\n" : "%x\r\n"), (int) chunkSize); |
774c051c | 379 | } |
380 | ||
26cc52cb | 381 | void Adaptation::Icap::ModXact::closeChunk(MemBuf &buf) |
774c051c | 382 | { |
774c051c | 383 | buf.append(ICAP::crlf, 2); // chunk-terminating CRLF |
384 | } | |
385 | ||
3ff65596 AR |
386 | const HttpRequest &Adaptation::Icap::ModXact::virginRequest() const |
387 | { | |
388 | const HttpRequest *request = virgin.cause ? | |
e1381638 | 389 | virgin.cause : dynamic_cast<const HttpRequest*>(virgin.header); |
3ff65596 AR |
390 | Must(request); |
391 | return *request; | |
392 | } | |
393 | ||
5f8252d2 | 394 | // did the activity reached the end of the virgin body? |
26cc52cb | 395 | bool Adaptation::Icap::ModXact::virginBodyEndReached(const Adaptation::Icap::VirginBodyAct &act) const |
5f8252d2 | 396 | { |
9e008dda | 397 | return |
5f8252d2 | 398 | !act.active() || // did all (assuming it was originally planned) |
61beade2 | 399 | !virgin.body_pipe->expectMoreAfter(act.offset()); // will not have more |
5f8252d2 | 400 | } |
401 | ||
402 | // the size of buffered virgin body data available for the specified activity | |
403 | // if this size is zero, we may be done or may be waiting for more data | |
26cc52cb | 404 | size_t Adaptation::Icap::ModXact::virginContentSize(const Adaptation::Icap::VirginBodyAct &act) const |
774c051c | 405 | { |
5f8252d2 | 406 | Must(act.active()); |
407 | // asbolute start of unprocessed data | |
b0365bd9 | 408 | const uint64_t dataStart = act.offset(); |
5f8252d2 | 409 | // absolute end of buffered data |
b0365bd9 FC |
410 | const uint64_t dataEnd = virginConsumed + virgin.body_pipe->buf().contentSize(); |
411 | Must(virginConsumed <= dataStart && dataStart <= dataEnd); | |
412 | return static_cast<size_t>(dataEnd - dataStart); | |
774c051c | 413 | } |
414 | ||
5f8252d2 | 415 | // pointer to buffered virgin body data available for the specified activity |
26cc52cb | 416 | const char *Adaptation::Icap::ModXact::virginContentData(const Adaptation::Icap::VirginBodyAct &act) const |
774c051c | 417 | { |
5f8252d2 | 418 | Must(act.active()); |
b0365bd9 FC |
419 | const uint64_t dataStart = act.offset(); |
420 | Must(virginConsumed <= dataStart); | |
421 | return virgin.body_pipe->buf().content() + static_cast<size_t>(dataStart-virginConsumed); | |
774c051c | 422 | } |
423 | ||
26cc52cb | 424 | void Adaptation::Icap::ModXact::virginConsume() |
774c051c | 425 | { |
3ff65596 | 426 | debugs(93, 9, HERE << "consumption guards: " << !virgin.body_pipe << isRetriable << |
a22e6cd3 | 427 | isRepeatable << canStartBypass << protectGroupBypass); |
478cfe99 | 428 | |
5f8252d2 | 429 | if (!virgin.body_pipe) |
c824c43b | 430 | return; // nothing to consume |
431 | ||
432 | if (isRetriable) | |
433 | return; // do not consume if we may have to retry later | |
5f8252d2 | 434 | |
435 | BodyPipe &bp = *virgin.body_pipe; | |
a22e6cd3 | 436 | const bool wantToPostpone = isRepeatable || canStartBypass || protectGroupBypass; |
478cfe99 | 437 | |
438 | // Why > 2? HttpState does not use the last bytes in the buffer | |
9e008dda | 439 | // because delayAwareRead() is arguably broken. See |
478cfe99 | 440 | // HttpStateData::maybeReadVirginBody for more details. |
3ff65596 | 441 | if (wantToPostpone && bp.buf().spaceSize() > 2) { |
478cfe99 | 442 | // Postponing may increase memory footprint and slow the HTTP side |
9e008dda | 443 | // down. Not postponing may increase the number of ICAP errors |
478cfe99 | 444 | // if the ICAP service fails. We may also use "potential" space to |
445 | // postpone more aggressively. Should the trade-off be configurable? | |
446 | debugs(93, 8, HERE << "postponing consumption from " << bp.status()); | |
447 | return; | |
448 | } | |
449 | ||
5f8252d2 | 450 | const size_t have = static_cast<size_t>(bp.buf().contentSize()); |
47f6e231 | 451 | const uint64_t end = virginConsumed + have; |
452 | uint64_t offset = end; | |
774c051c | 453 | |
478cfe99 | 454 | debugs(93, 9, HERE << "max virgin consumption offset=" << offset << |
9e008dda AJ |
455 | " acts " << virginBodyWriting.active() << virginBodySending.active() << |
456 | " consumed=" << virginConsumed << | |
457 | " from " << virgin.body_pipe->status()); | |
478cfe99 | 458 | |
5f8252d2 | 459 | if (virginBodyWriting.active()) |
d85c3078 | 460 | offset = min(virginBodyWriting.offset(), offset); |
774c051c | 461 | |
5f8252d2 | 462 | if (virginBodySending.active()) |
d85c3078 | 463 | offset = min(virginBodySending.offset(), offset); |
774c051c | 464 | |
465 | Must(virginConsumed <= offset && offset <= end); | |
466 | ||
47f6e231 | 467 | if (const size_t size = static_cast<size_t>(offset - virginConsumed)) { |
b107a5a5 | 468 | debugs(93, 8, HERE << "consuming " << size << " out of " << have << |
774c051c | 469 | " virgin body bytes"); |
5f8252d2 | 470 | bp.consume(size); |
774c051c | 471 | virginConsumed += size; |
c824c43b | 472 | Must(!isRetriable); // or we should not be consuming |
3ff65596 | 473 | disableRepeats("consumed content"); |
a22e6cd3 | 474 | disableBypass("consumed content", true); |
774c051c | 475 | } |
476 | } | |
477 | ||
26cc52cb | 478 | void Adaptation::Icap::ModXact::handleCommWroteBody() |
774c051c | 479 | { |
480 | writeMore(); | |
481 | } | |
482 | ||
c99de607 | 483 | // Called when we do not expect to call comm_write anymore. |
484 | // We may have a pending write though. | |
485 | // If stopping nicely, we will just wait for that pending write, if any. | |
26cc52cb | 486 | void Adaptation::Icap::ModXact::stopWriting(bool nicely) |
774c051c | 487 | { |
c99de607 | 488 | if (state.writing == State::writingReallyDone) |
774c051c | 489 | return; |
490 | ||
bd7f2ede | 491 | if (writer != NULL) { |
c99de607 | 492 | if (nicely) { |
5f8252d2 | 493 | debugs(93, 7, HERE << "will wait for the last write" << status()); |
c99de607 | 494 | state.writing = State::writingAlmostDone; // may already be set |
5f8252d2 | 495 | checkConsuming(); |
c99de607 | 496 | return; |
497 | } | |
4932ad93 | 498 | debugs(93, 3, HERE << "will NOT wait for the last write" << status()); |
774c051c | 499 | |
c99de607 | 500 | // Comm does not have an interface to clear the writer callback nicely, |
501 | // but without clearing the writer we cannot recycle the connection. | |
502 | // We prevent connection reuse and hope that we can handle a callback | |
5f8252d2 | 503 | // call at any time, usually in the middle of the destruction sequence! |
504 | // Somebody should add comm_remove_write_handler() to comm API. | |
c99de607 | 505 | reuseConnection = false; |
478cfe99 | 506 | ignoreLastWrite = true; |
c99de607 | 507 | } |
508 | ||
5f8252d2 | 509 | debugs(93, 7, HERE << "will no longer write" << status()); |
5f8252d2 | 510 | if (virginBodyWriting.active()) { |
511 | virginBodyWriting.disable(); | |
512 | virginConsume(); | |
513 | } | |
478cfe99 | 514 | state.writing = State::writingReallyDone; |
515 | checkConsuming(); | |
774c051c | 516 | } |
517 | ||
26cc52cb | 518 | void Adaptation::Icap::ModXact::stopBackup() |
774c051c | 519 | { |
5f8252d2 | 520 | if (!virginBodySending.active()) |
774c051c | 521 | return; |
522 | ||
192378eb | 523 | debugs(93, 7, HERE << "will no longer backup" << status()); |
5f8252d2 | 524 | virginBodySending.disable(); |
774c051c | 525 | virginConsume(); |
526 | } | |
527 | ||
26cc52cb | 528 | bool Adaptation::Icap::ModXact::doneAll() const |
774c051c | 529 | { |
26cc52cb | 530 | return Adaptation::Icap::Xaction::doneAll() && !state.serviceWaiting && |
5f8252d2 | 531 | doneSending() && |
774c051c | 532 | doneReading() && state.doneWriting(); |
533 | } | |
534 | ||
26cc52cb | 535 | void Adaptation::Icap::ModXact::startReading() |
774c051c | 536 | { |
aed188fd | 537 | Must(haveConnection()); |
774c051c | 538 | Must(!reader); |
5f8252d2 | 539 | Must(!adapted.header); |
540 | Must(!adapted.body_pipe); | |
774c051c | 541 | |
542 | // we use the same buffer for headers and body and then consume headers | |
543 | readMore(); | |
544 | } | |
545 | ||
26cc52cb | 546 | void Adaptation::Icap::ModXact::readMore() |
774c051c | 547 | { |
bd7f2ede | 548 | if (reader != NULL || doneReading()) { |
c99de607 | 549 | debugs(93,3,HERE << "returning from readMore because reader or doneReading()"); |
774c051c | 550 | return; |
3b299123 | 551 | } |
774c051c | 552 | |
553 | // do not fill readBuf if we have no space to store the result | |
5f8252d2 | 554 | if (adapted.body_pipe != NULL && |
9e008dda | 555 | !adapted.body_pipe->buf().hasPotentialSpace()) { |
5f8252d2 | 556 | debugs(93,3,HERE << "not reading because ICAP reply pipe is full"); |
774c051c | 557 | return; |
3b299123 | 558 | } |
774c051c | 559 | |
2b42f3fd | 560 | if (readBuf.length() < SQUID_TCP_SO_RCVBUF) |
774c051c | 561 | scheduleRead(); |
3b299123 | 562 | else |
2b42f3fd | 563 | debugs(93,3,HERE << "cannot read with a full buffer"); |
774c051c | 564 | } |
565 | ||
566 | // comm module read a portion of the ICAP response for us | |
26cc52cb | 567 | void Adaptation::Icap::ModXact::handleCommRead(size_t) |
774c051c | 568 | { |
569 | Must(!state.doneParsing()); | |
3ff65596 | 570 | icap_tio_finish = current_time; |
774c051c | 571 | parseMore(); |
572 | readMore(); | |
573 | } | |
574 | ||
26cc52cb | 575 | void Adaptation::Icap::ModXact::echoMore() |
774c051c | 576 | { |
577 | Must(state.sending == State::sendingVirgin); | |
5f8252d2 | 578 | Must(adapted.body_pipe != NULL); |
579 | Must(virginBodySending.active()); | |
580 | ||
581 | const size_t sizeMax = virginContentSize(virginBodySending); | |
582 | debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes from " << | |
9e008dda | 583 | virgin.body_pipe->status()); |
5f8252d2 | 584 | debugs(93,5, HERE << "will echo up to " << sizeMax << " bytes to " << |
9e008dda | 585 | adapted.body_pipe->status()); |
5f8252d2 | 586 | |
587 | if (sizeMax > 0) { | |
588 | const size_t size = adapted.body_pipe->putMoreData(virginContentData(virginBodySending), sizeMax); | |
589 | debugs(93,5, HERE << "echoed " << size << " out of " << sizeMax << | |
9e008dda | 590 | " bytes"); |
5f8252d2 | 591 | virginBodySending.progress(size); |
3ff65596 | 592 | disableRepeats("echoed content"); |
a22e6cd3 AR |
593 | disableBypass("echoed content", true); |
594 | virginConsume(); | |
774c051c | 595 | } |
596 | ||
5f8252d2 | 597 | if (virginBodyEndReached(virginBodySending)) { |
192378eb | 598 | debugs(93, 5, HERE << "echoed all" << status()); |
774c051c | 599 | stopSending(true); |
600 | } else { | |
192378eb | 601 | debugs(93, 5, HERE << "has " << |
9e008dda AJ |
602 | virgin.body_pipe->buf().contentSize() << " bytes " << |
603 | "and expects more to echo" << status()); | |
5f8252d2 | 604 | // TODO: timeout if virgin or adapted pipes are broken |
774c051c | 605 | } |
606 | } | |
607 | ||
26cc52cb | 608 | bool Adaptation::Icap::ModXact::doneSending() const |
774c051c | 609 | { |
774c051c | 610 | return state.sending == State::sendingDone; |
611 | } | |
612 | ||
478cfe99 | 613 | // stop (or do not start) sending adapted message body |
26cc52cb | 614 | void Adaptation::Icap::ModXact::stopSending(bool nicely) |
774c051c | 615 | { |
3ff65596 | 616 | debugs(93, 7, HERE << "Enter stop sending "); |
774c051c | 617 | if (doneSending()) |
618 | return; | |
3ff65596 | 619 | debugs(93, 7, HERE << "Proceed with stop sending "); |
774c051c | 620 | |
621 | if (state.sending != State::sendingUndecided) { | |
192378eb | 622 | debugs(93, 7, HERE << "will no longer send" << status()); |
5f8252d2 | 623 | if (adapted.body_pipe != NULL) { |
624 | virginBodySending.disable(); | |
625 | // we may leave debts if we were echoing and the virgin | |
626 | // body_pipe got exhausted before we echoed all planned bytes | |
627 | const bool leftDebts = adapted.body_pipe->needsMoreData(); | |
628 | stopProducingFor(adapted.body_pipe, nicely && !leftDebts); | |
629 | } | |
774c051c | 630 | } else { |
192378eb | 631 | debugs(93, 7, HERE << "will not start sending" << status()); |
5f8252d2 | 632 | Must(!adapted.body_pipe); |
774c051c | 633 | } |
634 | ||
635 | state.sending = State::sendingDone; | |
5f8252d2 | 636 | checkConsuming(); |
774c051c | 637 | } |
638 | ||
5f8252d2 | 639 | // should be called after certain state.writing or state.sending changes |
26cc52cb | 640 | void Adaptation::Icap::ModXact::checkConsuming() |
774c051c | 641 | { |
5f8252d2 | 642 | // quit if we already stopped or are still using the pipe |
643 | if (!virgin.body_pipe || !state.doneConsumingVirgin()) | |
774c051c | 644 | return; |
645 | ||
5f8252d2 | 646 | debugs(93, 7, HERE << "will stop consuming" << status()); |
647 | stopConsumingFrom(virgin.body_pipe); | |
774c051c | 648 | } |
649 | ||
26cc52cb | 650 | void Adaptation::Icap::ModXact::parseMore() |
774c051c | 651 | { |
84ae6223 AJ |
652 | debugs(93, 5, "have " << readBuf.length() << " bytes to parse" << status()); |
653 | debugs(93, 5, "\n" << readBuf); | |
774c051c | 654 | |
655 | if (state.parsingHeaders()) | |
656 | parseHeaders(); | |
657 | ||
658 | if (state.parsing == State::psBody) | |
659 | parseBody(); | |
69c698a3 EB |
660 | |
661 | if (state.parsing == State::psIcapTrailer) | |
662 | parseIcapTrailer(); | |
774c051c | 663 | } |
664 | ||
26cc52cb | 665 | void Adaptation::Icap::ModXact::callException(const std::exception &e) |
478cfe99 | 666 | { |
667 | if (!canStartBypass || isRetriable) { | |
64b66b76 CT |
668 | if (!isRetriable) { |
669 | if (const TextException *te = dynamic_cast<const TextException *>(&e)) | |
670 | detailError(ERR_DETAIL_EXCEPTION_START + te->id()); | |
671 | else | |
672 | detailError(ERR_DETAIL_EXCEPTION_OTHER); | |
673 | } | |
26cc52cb | 674 | Adaptation::Icap::Xaction::callException(e); |
478cfe99 | 675 | return; |
676 | } | |
677 | ||
678 | try { | |
192378eb | 679 | debugs(93, 3, HERE << "bypassing " << inCall << " exception: " << |
af6a12ee | 680 | e.what() << ' ' << status()); |
478cfe99 | 681 | bypassFailure(); |
64b66b76 CT |
682 | } catch (const TextException &bypassTe) { |
683 | detailError(ERR_DETAIL_EXCEPTION_START + bypassTe.id()); | |
684 | Adaptation::Icap::Xaction::callException(bypassTe); | |
9e008dda | 685 | } catch (const std::exception &bypassE) { |
64b66b76 | 686 | detailError(ERR_DETAIL_EXCEPTION_OTHER); |
26cc52cb | 687 | Adaptation::Icap::Xaction::callException(bypassE); |
478cfe99 | 688 | } |
689 | } | |
690 | ||
26cc52cb | 691 | void Adaptation::Icap::ModXact::bypassFailure() |
478cfe99 | 692 | { |
a22e6cd3 | 693 | disableBypass("already started to bypass", false); |
478cfe99 | 694 | |
695 | Must(!isRetriable); // or we should not be bypassing | |
3ff65596 | 696 | // TODO: should the same be enforced for isRepeatable? Check icap_repeat?? |
478cfe99 | 697 | |
698 | prepEchoing(); | |
699 | ||
700 | startSending(); | |
701 | ||
702 | // end all activities associated with the ICAP server | |
703 | ||
69c698a3 | 704 | stopParsing(false); |
478cfe99 | 705 | |
706 | stopWriting(true); // or should we force it? | |
aed188fd | 707 | if (haveConnection()) { |
478cfe99 | 708 | reuseConnection = false; // be conservative |
709 | cancelRead(); // may not work; and we cannot stop connecting either | |
710 | if (!doneWithIo()) | |
192378eb | 711 | debugs(93, 7, HERE << "Warning: bypass failed to stop I/O" << status()); |
478cfe99 | 712 | } |
61cb3565 AR |
713 | |
714 | service().noteFailure(); // we are bypassing, but this is still a failure | |
478cfe99 | 715 | } |
716 | ||
a22e6cd3 | 717 | void Adaptation::Icap::ModXact::disableBypass(const char *reason, bool includingGroupBypass) |
478cfe99 | 718 | { |
719 | if (canStartBypass) { | |
720 | debugs(93,7, HERE << "will never start bypass because " << reason); | |
721 | canStartBypass = false; | |
722 | } | |
a22e6cd3 AR |
723 | if (protectGroupBypass && includingGroupBypass) { |
724 | debugs(93,7, HERE << "not protecting group bypass because " << reason); | |
725 | protectGroupBypass = false; | |
726 | } | |
478cfe99 | 727 | } |
728 | ||
774c051c | 729 | // note that allocation for echoing is done in handle204NoContent() |
26cc52cb | 730 | void Adaptation::Icap::ModXact::maybeAllocateHttpMsg() |
774c051c | 731 | { |
5f8252d2 | 732 | if (adapted.header) // already allocated |
774c051c | 733 | return; |
734 | ||
735 | if (gotEncapsulated("res-hdr")) { | |
5f8252d2 | 736 | adapted.setHeader(new HttpReply); |
3ff65596 | 737 | setOutcome(service().cfg().method == ICAP::methodReqmod ? |
e1381638 | 738 | xoSatisfied : xoModified); |
774c051c | 739 | } else if (gotEncapsulated("req-hdr")) { |
5ceaee75 | 740 | adapted.setHeader(new HttpRequest(virginRequest().masterXaction)); |
3ff65596 | 741 | setOutcome(xoModified); |
774c051c | 742 | } else |
743 | throw TexcHere("Neither res-hdr nor req-hdr in maybeAllocateHttpMsg()"); | |
744 | } | |
745 | ||
26cc52cb | 746 | void Adaptation::Icap::ModXact::parseHeaders() |
774c051c | 747 | { |
748 | Must(state.parsingHeaders()); | |
749 | ||
b107a5a5 | 750 | if (state.parsing == State::psIcapHeader) { |
751 | debugs(93, 5, HERE << "parse ICAP headers"); | |
774c051c | 752 | parseIcapHead(); |
b107a5a5 | 753 | } |
774c051c | 754 | |
b107a5a5 | 755 | if (state.parsing == State::psHttpHeader) { |
756 | debugs(93, 5, HERE << "parse HTTP headers"); | |
774c051c | 757 | parseHttpHead(); |
b107a5a5 | 758 | } |
774c051c | 759 | |
760 | if (state.parsingHeaders()) { // need more data | |
761 | Must(mayReadMore()); | |
762 | return; | |
763 | } | |
764 | ||
478cfe99 | 765 | startSending(); |
766 | } | |
767 | ||
768 | // called after parsing all headers or when bypassing an exception | |
26cc52cb | 769 | void Adaptation::Icap::ModXact::startSending() |
478cfe99 | 770 | { |
3ff65596 | 771 | disableRepeats("sent headers"); |
a22e6cd3 | 772 | disableBypass("sent headers", true); |
3af10ac0 | 773 | sendAnswer(Answer::Forward(adapted.header)); |
774c051c | 774 | |
775 | if (state.sending == State::sendingVirgin) | |
776 | echoMore(); | |
88df846b | 777 | else { |
ff89bfa0 | 778 | // If we are not using the virgin HTTP object update the |
63df1d28 | 779 | // Http::Message::sources flag. |
88df846b | 780 | // The state.sending may set to State::sendingVirgin in the case |
63df1d28 | 781 | // of 206 responses too, where we do not want to update Http::Message::sources |
ff89bfa0 SM |
782 | // flag. However even for 206 responses the state.sending is |
783 | // not set yet to sendingVirgin. This is done in later step | |
88df846b CT |
784 | // after the parseBody method called. |
785 | updateSources(); | |
786 | } | |
774c051c | 787 | } |
788 | ||
26cc52cb | 789 | void Adaptation::Icap::ModXact::parseIcapHead() |
774c051c | 790 | { |
791 | Must(state.sending == State::sendingUndecided); | |
792 | ||
b248c2a3 | 793 | if (!parseHead(icapReply.getRaw())) |
774c051c | 794 | return; |
795 | ||
69c698a3 EB |
796 | if (expectIcapTrailers()) { |
797 | Must(!trailerParser); | |
798 | trailerParser = new TrailerParser; | |
799 | } | |
800 | ||
d5f18517 AJ |
801 | static SBuf close("close", 5); |
802 | if (httpHeaderHasConnDir(&icapReply->header, close)) { | |
fc764d26 | 803 | debugs(93, 5, HERE << "found connection close"); |
804 | reuseConnection = false; | |
805 | } | |
806 | ||
9b769c67 | 807 | switch (icapReply->sline.status()) { |
774c051c | 808 | |
9b769c67 | 809 | case Http::scContinue: |
774c051c | 810 | handle100Continue(); |
811 | break; | |
812 | ||
9b769c67 AJ |
813 | case Http::scOkay: |
814 | case Http::scCreated: // Symantec Scan Engine 5.0 and later when modifying HTTP msg | |
b559db5d | 815 | |
816 | if (!validate200Ok()) { | |
817 | throw TexcHere("Invalid ICAP Response"); | |
818 | } else { | |
819 | handle200Ok(); | |
820 | } | |
821 | ||
774c051c | 822 | break; |
823 | ||
9b769c67 | 824 | case Http::scNoContent: |
774c051c | 825 | handle204NoContent(); |
826 | break; | |
827 | ||
9b769c67 | 828 | case Http::scPartialContent: |
83c51da9 CT |
829 | handle206PartialContent(); |
830 | break; | |
831 | ||
774c051c | 832 | default: |
9b769c67 | 833 | debugs(93, 5, "ICAP status " << icapReply->sline.status()); |
774c051c | 834 | handleUnknownScode(); |
835 | break; | |
836 | } | |
837 | ||
3ff65596 AR |
838 | const HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
839 | if (!request) | |
840 | request = &virginRequest(); | |
841 | ||
842 | // update the cross-transactional database if needed (all status codes!) | |
843 | if (const char *xxName = Adaptation::Config::masterx_shared_name) { | |
a22e6cd3 | 844 | Adaptation::History::Pointer ah = request->adaptHistory(true); |
5038f9d8 | 845 | if (ah != NULL) { // TODO: reorder checks to avoid creating history |
3ff65596 AR |
846 | const String val = icapReply->header.getByName(xxName); |
847 | if (val.size() > 0) // XXX: HttpHeader lacks empty value detection | |
848 | ah->updateXxRecord(xxName, val); | |
849 | } | |
850 | } | |
851 | ||
a22e6cd3 AR |
852 | // update the adaptation plan if needed (all status codes!) |
853 | if (service().cfg().routing) { | |
854 | String services; | |
789217a2 | 855 | if (icapReply->header.getList(Http::HdrType::X_NEXT_SERVICES, &services)) { |
a22e6cd3 AR |
856 | Adaptation::History::Pointer ah = request->adaptHistory(true); |
857 | if (ah != NULL) | |
858 | ah->updateNextServices(services); | |
859 | } | |
789217a2 | 860 | } // TODO: else warn (occasionally!) if we got Http::HdrType::X_NEXT_SERVICES |
a22e6cd3 | 861 | |
3ff65596 AR |
862 | // We need to store received ICAP headers for <icapLastHeader logformat option. |
863 | // If we already have stored headers from previous ICAP transaction related to this | |
864 | // request, old headers will be replaced with the new one. | |
e1381638 | 865 | |
5038f9d8 AR |
866 | Adaptation::History::Pointer ah = request->adaptLogHistory(); |
867 | if (ah != NULL) | |
868 | ah->recordMeta(&icapReply->header); | |
3ff65596 | 869 | |
774c051c | 870 | // handle100Continue() manages state.writing on its own. |
871 | // Non-100 status means the server needs no postPreview data from us. | |
872 | if (state.writing == State::writingPaused) | |
c99de607 | 873 | stopWriting(true); |
774c051c | 874 | } |
875 | ||
69c698a3 EB |
876 | /// Parses ICAP trailers and stops parsing, if all trailer data |
877 | /// have been received. | |
878 | void Adaptation::Icap::ModXact::parseIcapTrailer() { | |
b559db5d | 879 | |
69c698a3 EB |
880 | if (parsePart(trailerParser, "trailer")) { |
881 | for (const auto &e: trailerParser->trailer.entries) | |
882 | debugs(93, 5, "ICAP trailer: " << e->name << ": " << e->value); | |
883 | stopParsing(); | |
b559db5d | 884 | } |
69c698a3 | 885 | } |
b559db5d | 886 | |
69c698a3 EB |
887 | bool Adaptation::Icap::ModXact::validate200Ok() |
888 | { | |
889 | if (service().cfg().method == ICAP::methodRespmod) | |
890 | return gotEncapsulated("res-hdr"); | |
b559db5d | 891 | |
69c698a3 EB |
892 | return service().cfg().method == ICAP::methodReqmod && |
893 | expectHttpHeader(); | |
b559db5d | 894 | } |
895 | ||
26cc52cb | 896 | void Adaptation::Icap::ModXact::handle100Continue() |
774c051c | 897 | { |
898 | Must(state.writing == State::writingPaused); | |
5f8252d2 | 899 | // server must not respond before the end of preview: we may send ieof |
774c051c | 900 | Must(preview.enabled() && preview.done() && !preview.ieof()); |
774c051c | 901 | |
83c51da9 CT |
902 | // 100 "Continue" cancels our Preview commitment, |
903 | // but not commitment to handle 204 or 206 outside Preview | |
904 | if (!state.allowedPostview204 && !state.allowedPostview206) | |
774c051c | 905 | stopBackup(); |
906 | ||
c99de607 | 907 | state.parsing = State::psIcapHeader; // eventually |
908 | icapReply->reset(); | |
774c051c | 909 | |
910 | state.writing = State::writingPrime; | |
911 | ||
912 | writeMore(); | |
913 | } | |
914 | ||
26cc52cb | 915 | void Adaptation::Icap::ModXact::handle200Ok() |
774c051c | 916 | { |
917 | state.parsing = State::psHttpHeader; | |
918 | state.sending = State::sendingAdapted; | |
919 | stopBackup(); | |
5f8252d2 | 920 | checkConsuming(); |
774c051c | 921 | } |
922 | ||
26cc52cb | 923 | void Adaptation::Icap::ModXact::handle204NoContent() |
774c051c | 924 | { |
925 | stopParsing(); | |
478cfe99 | 926 | prepEchoing(); |
927 | } | |
928 | ||
83c51da9 CT |
929 | void Adaptation::Icap::ModXact::handle206PartialContent() |
930 | { | |
931 | if (state.writing == State::writingPaused) { | |
932 | Must(preview.enabled()); | |
933 | Must(state.allowedPreview206); | |
934 | debugs(93, 7, HERE << "206 inside preview"); | |
935 | } else { | |
936 | Must(state.writing > State::writingPaused); | |
937 | Must(state.allowedPostview206); | |
938 | debugs(93, 7, HERE << "206 outside preview"); | |
939 | } | |
940 | state.parsing = State::psHttpHeader; | |
941 | state.sending = State::sendingAdapted; | |
942 | state.readyForUob = true; | |
943 | checkConsuming(); | |
944 | } | |
945 | ||
478cfe99 | 946 | // Called when we receive a 204 No Content response and |
947 | // when we are trying to bypass a service failure. | |
948 | // We actually start sending (echoig or not) in startSending. | |
26cc52cb | 949 | void Adaptation::Icap::ModXact::prepEchoing() |
478cfe99 | 950 | { |
3ff65596 | 951 | disableRepeats("preparing to echo content"); |
a22e6cd3 | 952 | disableBypass("preparing to echo content", true); |
3ff65596 | 953 | setOutcome(xoEcho); |
774c051c | 954 | |
955 | // We want to clone the HTTP message, but we do not want | |
63df1d28 | 956 | // to copy some non-HTTP state parts that Http::Message kids carry in them. |
774c051c | 957 | // Thus, we cannot use a smart pointer, copy constructor, or equivalent. |
958 | // Instead, we simply write the HTTP message and "clone" it by parsing. | |
63df1d28 | 959 | // TODO: use Http::Message::clone()! |
774c051c | 960 | |
63df1d28 | 961 | Http::Message *oldHead = virgin.header; |
192378eb | 962 | debugs(93, 7, HERE << "cloning virgin message " << oldHead); |
774c051c | 963 | |
964 | MemBuf httpBuf; | |
965 | ||
966 | // write the virgin message into a memory buffer | |
967 | httpBuf.init(); | |
968 | packHead(httpBuf, oldHead); | |
969 | ||
c99de607 | 970 | // allocate the adapted message and copy metainfo |
5f8252d2 | 971 | Must(!adapted.header); |
c7d51c86 | 972 | { |
63df1d28 | 973 | Http::MessagePointer newHead; |
5ceaee75 CT |
974 | if (const HttpRequest *r = dynamic_cast<const HttpRequest*>(oldHead)) { |
975 | newHead = new HttpRequest(r->masterXaction); | |
e6f9e263 A |
976 | } else if (dynamic_cast<const HttpReply*>(oldHead)) { |
977 | newHead = new HttpReply; | |
978 | } | |
d39901ed | 979 | Must(newHead); |
774c051c | 980 | |
e6f9e263 | 981 | newHead->inheritProperties(oldHead); |
774c051c | 982 | |
b248c2a3 | 983 | adapted.setHeader(newHead.getRaw()); |
c7d51c86 | 984 | } |
7514268e | 985 | |
774c051c | 986 | // parse the buffer back |
955394ce | 987 | Http::StatusCode error = Http::scNone; |
774c051c | 988 | |
63df1d28 | 989 | httpBuf.terminate(); // Http::Message::parse requires nil-terminated buffer |
84ae6223 | 990 | Must(adapted.header->parse(httpBuf.content(), httpBuf.contentSize(), true, &error)); |
c7d51c86 | 991 | Must(adapted.header->hdr_sz == httpBuf.contentSize()); // no leftovers |
774c051c | 992 | |
993 | httpBuf.clean(); | |
994 | ||
192378eb | 995 | debugs(93, 7, HERE << "cloned virgin message " << oldHead << " to " << |
c7d51c86 | 996 | adapted.header); |
5f8252d2 | 997 | |
998 | // setup adapted body pipe if needed | |
999 | if (oldHead->body_pipe != NULL) { | |
1000 | debugs(93, 7, HERE << "will echo virgin body from " << | |
9e008dda | 1001 | oldHead->body_pipe); |
478cfe99 | 1002 | if (!virginBodySending.active()) |
1003 | virginBodySending.plan(); // will throw if not possible | |
5f8252d2 | 1004 | state.sending = State::sendingVirgin; |
1005 | checkConsuming(); | |
478cfe99 | 1006 | |
5f8252d2 | 1007 | // TODO: optimize: is it possible to just use the oldHead pipe and |
1008 | // remove ICAP from the loop? This echoing is probably a common case! | |
1009 | makeAdaptedBodyPipe("echoed virgin response"); | |
1010 | if (oldHead->body_pipe->bodySizeKnown()) | |
1011 | adapted.body_pipe->setBodySize(oldHead->body_pipe->bodySize()); | |
1012 | debugs(93, 7, HERE << "will echo virgin body to " << | |
9e008dda | 1013 | adapted.body_pipe); |
5f8252d2 | 1014 | } else { |
1015 | debugs(93, 7, HERE << "no virgin body to echo"); | |
1016 | stopSending(true); | |
1017 | } | |
774c051c | 1018 | } |
1019 | ||
83c51da9 CT |
1020 | /// Called when we received use-original-body chunk extension in 206 response. |
1021 | /// We actually start sending (echoing or not) in startSending(). | |
1022 | void Adaptation::Icap::ModXact::prepPartialBodyEchoing(uint64_t pos) | |
1023 | { | |
1024 | Must(virginBodySending.active()); | |
1025 | Must(virgin.header->body_pipe != NULL); | |
1026 | ||
1027 | setOutcome(xoPartEcho); | |
1028 | ||
1029 | debugs(93, 7, HERE << "will echo virgin body suffix from " << | |
1030 | virgin.header->body_pipe << " offset " << pos ); | |
1031 | ||
1032 | // check that use-original-body=N does not point beyond buffered data | |
1033 | const uint64_t virginDataEnd = virginConsumed + | |
7ddcfbab | 1034 | virgin.body_pipe->buf().contentSize(); |
83c51da9 CT |
1035 | Must(pos <= virginDataEnd); |
1036 | virginBodySending.progress(static_cast<size_t>(pos)); | |
1037 | ||
1038 | state.sending = State::sendingVirgin; | |
1039 | checkConsuming(); | |
1040 | ||
1041 | if (virgin.header->body_pipe->bodySizeKnown()) | |
1042 | adapted.body_pipe->expectProductionEndAfter(virgin.header->body_pipe->bodySize() - pos); | |
1043 | ||
1044 | debugs(93, 7, HERE << "will echo virgin body suffix to " << | |
1045 | adapted.body_pipe); | |
1046 | ||
1047 | // Start echoing data | |
1048 | echoMore(); | |
1049 | } | |
1050 | ||
26cc52cb | 1051 | void Adaptation::Icap::ModXact::handleUnknownScode() |
774c051c | 1052 | { |
69c698a3 | 1053 | stopParsing(false); |
774c051c | 1054 | stopBackup(); |
1055 | // TODO: mark connection as "bad" | |
1056 | ||
1057 | // Terminate the transaction; we do not know how to handle this response. | |
1058 | throw TexcHere("Unsupported ICAP status code"); | |
1059 | } | |
1060 | ||
26cc52cb | 1061 | void Adaptation::Icap::ModXact::parseHttpHead() |
774c051c | 1062 | { |
69c698a3 | 1063 | if (expectHttpHeader()) { |
bae917ac | 1064 | replyHttpHeaderSize = 0; |
774c051c | 1065 | maybeAllocateHttpMsg(); |
1066 | ||
5f8252d2 | 1067 | if (!parseHead(adapted.header)) |
c99de607 | 1068 | return; // need more header data |
5f8252d2 | 1069 | |
bae917ac CT |
1070 | if (adapted.header) |
1071 | replyHttpHeaderSize = adapted.header->hdr_sz; | |
1072 | ||
d67acb4e | 1073 | if (dynamic_cast<HttpRequest*>(adapted.header)) { |
5f8252d2 | 1074 | const HttpRequest *oldR = dynamic_cast<const HttpRequest*>(virgin.header); |
1075 | Must(oldR); | |
9e008dda AJ |
1076 | // TODO: the adapted request did not really originate from the |
1077 | // client; give proxy admin an option to prevent copying of | |
5f8252d2 | 1078 | // sensitive client information here. See the following thread: |
1079 | // http://www.squid-cache.org/mail-archive/squid-dev/200703/0040.html | |
5f8252d2 | 1080 | } |
d67acb4e | 1081 | |
9e008dda AJ |
1082 | // Maybe adapted.header==NULL if HttpReply and have Http 0.9 .... |
1083 | if (adapted.header) | |
1084 | adapted.header->inheritProperties(virgin.header); | |
774c051c | 1085 | } |
1086 | ||
5f8252d2 | 1087 | decideOnParsingBody(); |
774c051c | 1088 | } |
1089 | ||
69c698a3 EB |
1090 | template<class Part> |
1091 | bool Adaptation::Icap::ModXact::parsePart(Part *part, const char *description) | |
774c051c | 1092 | { |
69c698a3 EB |
1093 | Must(part); |
1094 | debugs(93, 5, "have " << readBuf.length() << ' ' << description << " bytes to parse; state: " << state.parsing); | |
955394ce | 1095 | Http::StatusCode error = Http::scNone; |
84ae6223 | 1096 | // XXX: performance regression. c_str() data copies |
63df1d28 | 1097 | // XXX: Http::Message::parse requires a terminated string buffer |
84ae6223 | 1098 | const char *tmpBuf = readBuf.c_str(); |
69c698a3 EB |
1099 | const bool parsed = part->parse(tmpBuf, readBuf.length(), commEof, &error); |
1100 | debugs(93, (!parsed && error) ? 2 : 5, description << " parsing result: " << parsed << " detail: " << error); | |
1101 | Must(parsed || !error); | |
1102 | if (parsed) | |
1103 | readBuf.consume(part->hdr_sz); | |
1104 | return parsed; | |
1105 | } | |
774c051c | 1106 | |
69c698a3 | 1107 | // parses both HTTP and ICAP headers |
63df1d28 AJ |
1108 | bool |
1109 | Adaptation::Icap::ModXact::parseHead(Http::Message *head) | |
69c698a3 EB |
1110 | { |
1111 | if (!parsePart(head, "head")) { | |
774c051c | 1112 | head->reset(); |
1113 | return false; | |
1114 | } | |
774c051c | 1115 | return true; |
1116 | } | |
1117 | ||
69c698a3 EB |
1118 | bool Adaptation::Icap::ModXact::expectHttpHeader() const |
1119 | { | |
1120 | return gotEncapsulated("res-hdr") || gotEncapsulated("req-hdr"); | |
1121 | } | |
1122 | ||
1123 | bool Adaptation::Icap::ModXact::expectHttpBody() const | |
1124 | { | |
1125 | return gotEncapsulated("res-body") || gotEncapsulated("req-body"); | |
1126 | } | |
1127 | ||
1128 | bool Adaptation::Icap::ModXact::expectIcapTrailers() const | |
1129 | { | |
1130 | String trailers; | |
f29d429e | 1131 | const bool promisesToSendTrailer = icapReply->header.getByIdIfPresent(Http::HdrType::TRAILER, &trailers); |
69c698a3 EB |
1132 | const bool supportsTrailers = icapReply->header.hasListMember(Http::HdrType::ALLOW, "trailers", ','); |
1133 | // ICAP Trailer specs require us to reject transactions having either Trailer | |
1134 | // header or Allow:trailers | |
1135 | Must((promisesToSendTrailer == supportsTrailers) || (!promisesToSendTrailer && supportsTrailers)); | |
1136 | if (promisesToSendTrailer && !trailers.size()) | |
1137 | debugs(93, DBG_IMPORTANT, "ERROR: ICAP Trailer response header field must not be empty (salvaged)"); | |
1138 | return promisesToSendTrailer; | |
1139 | } | |
1140 | ||
26cc52cb | 1141 | void Adaptation::Icap::ModXact::decideOnParsingBody() |
9e008dda | 1142 | { |
69c698a3 | 1143 | if (expectHttpBody()) { |
5f8252d2 | 1144 | debugs(93, 5, HERE << "expecting a body"); |
1145 | state.parsing = State::psBody; | |
bae917ac | 1146 | replyHttpBodySize = 0; |
db1720f8 | 1147 | bodyParser = new Http1::TeChunkedParser; |
5f8252d2 | 1148 | makeAdaptedBodyPipe("adapted response from the ICAP server"); |
1149 | Must(state.sending == State::sendingAdapted); | |
774c051c | 1150 | } else { |
b559db5d | 1151 | debugs(93, 5, HERE << "not expecting a body"); |
69c698a3 EB |
1152 | if (trailerParser) |
1153 | state.parsing = State::psIcapTrailer; | |
1154 | else | |
1155 | stopParsing(); | |
5f8252d2 | 1156 | stopSending(true); |
774c051c | 1157 | } |
774c051c | 1158 | } |
1159 | ||
26cc52cb | 1160 | void Adaptation::Icap::ModXact::parseBody() |
774c051c | 1161 | { |
5f8252d2 | 1162 | Must(state.parsing == State::psBody); |
1163 | Must(bodyParser); | |
774c051c | 1164 | |
84ae6223 | 1165 | debugs(93, 5, "have " << readBuf.length() << " body bytes to parse"); |
774c051c | 1166 | |
5f8252d2 | 1167 | // the parser will throw on errors |
1168 | BodyPipeCheckout bpc(*adapted.body_pipe); | |
be29ee33 AJ |
1169 | bodyParser->setPayloadBuffer(&bpc.buf); |
1170 | const bool parsed = bodyParser->parse(readBuf); | |
1171 | readBuf = bodyParser->remaining(); // sync buffers after parse | |
5f8252d2 | 1172 | bpc.checkIn(); |
774c051c | 1173 | |
84ae6223 | 1174 | debugs(93, 5, "have " << readBuf.length() << " body bytes after parsed all: " << parsed); |
bae917ac | 1175 | replyHttpBodySize += adapted.body_pipe->buf().contentSize(); |
774c051c | 1176 | |
478cfe99 | 1177 | // TODO: expose BodyPipe::putSize() to make this check simpler and clearer |
3ff65596 AR |
1178 | // TODO: do we really need this if we disable when sending headers? |
1179 | if (adapted.body_pipe->buf().contentSize() > 0) { // parsed something sometime | |
1180 | disableRepeats("sent adapted content"); | |
a22e6cd3 | 1181 | disableBypass("sent adapted content", true); |
3ff65596 | 1182 | } |
478cfe99 | 1183 | |
5f8252d2 | 1184 | if (parsed) { |
69c698a3 EB |
1185 | if (state.readyForUob && bodyParser->useOriginBody >= 0) |
1186 | prepPartialBodyEchoing(static_cast<uint64_t>(bodyParser->useOriginBody)); | |
1187 | else | |
1188 | stopSending(true); // the parser succeeds only if all parsed data fits | |
1189 | if (trailerParser) | |
1190 | state.parsing = State::psIcapTrailer; | |
1191 | else | |
83c51da9 | 1192 | stopParsing(); |
5f8252d2 | 1193 | return; |
1194 | } | |
774c051c | 1195 | |
c99de607 | 1196 | debugs(93,3,HERE << this << " needsMoreData = " << bodyParser->needsMoreData()); |
3b299123 | 1197 | |
1198 | if (bodyParser->needsMoreData()) { | |
c99de607 | 1199 | debugs(93,3,HERE << this); |
774c051c | 1200 | Must(mayReadMore()); |
3b299123 | 1201 | readMore(); |
1202 | } | |
774c051c | 1203 | |
1204 | if (bodyParser->needsMoreSpace()) { | |
1205 | Must(!doneSending()); // can hope for more space | |
5f8252d2 | 1206 | Must(adapted.body_pipe->buf().contentSize() > 0); // paranoid |
1207 | // TODO: there should be a timeout in case the sink is broken | |
1208 | // or cannot consume partial content (while we need more space) | |
774c051c | 1209 | } |
774c051c | 1210 | } |
1211 | ||
69c698a3 | 1212 | void Adaptation::Icap::ModXact::stopParsing(const bool checkUnparsedData) |
774c051c | 1213 | { |
1214 | if (state.parsing == State::psDone) | |
1215 | return; | |
1216 | ||
69c698a3 EB |
1217 | if (checkUnparsedData) |
1218 | Must(readBuf.isEmpty()); | |
1219 | ||
1220 | debugs(93, 7, "will no longer parse" << status()); | |
774c051c | 1221 | |
1222 | delete bodyParser; | |
69c698a3 | 1223 | bodyParser = nullptr; |
774c051c | 1224 | |
69c698a3 EB |
1225 | delete trailerParser; |
1226 | trailerParser = nullptr; | |
774c051c | 1227 | |
1228 | state.parsing = State::psDone; | |
1229 | } | |
1230 | ||
1231 | // HTTP side added virgin body data | |
26cc52cb | 1232 | void Adaptation::Icap::ModXact::noteMoreBodyDataAvailable(BodyPipe::Pointer) |
774c051c | 1233 | { |
774c051c | 1234 | writeMore(); |
1235 | ||
1236 | if (state.sending == State::sendingVirgin) | |
1237 | echoMore(); | |
774c051c | 1238 | } |
1239 | ||
1240 | // HTTP side sent us all virgin info | |
26cc52cb | 1241 | void Adaptation::Icap::ModXact::noteBodyProductionEnded(BodyPipe::Pointer) |
774c051c | 1242 | { |
5f8252d2 | 1243 | Must(virgin.body_pipe->productionEnded()); |
774c051c | 1244 | |
1245 | // push writer and sender in case we were waiting for the last-chunk | |
1246 | writeMore(); | |
1247 | ||
1248 | if (state.sending == State::sendingVirgin) | |
1249 | echoMore(); | |
774c051c | 1250 | } |
1251 | ||
9e008dda | 1252 | // body producer aborted, but the initiator may still want to know |
585ab260 | 1253 | // the answer, even though the HTTP message has been truncated |
26cc52cb | 1254 | void Adaptation::Icap::ModXact::noteBodyProducerAborted(BodyPipe::Pointer) |
774c051c | 1255 | { |
585ab260 | 1256 | Must(virgin.body_pipe->productionEnded()); |
1257 | ||
1258 | // push writer and sender in case we were waiting for the last-chunk | |
1259 | writeMore(); | |
1260 | ||
1261 | if (state.sending == State::sendingVirgin) | |
1262 | echoMore(); | |
5f8252d2 | 1263 | } |
1264 | ||
9e008dda | 1265 | // adapted body consumer wants more adapted data and |
5f8252d2 | 1266 | // possibly freed some buffer space |
26cc52cb | 1267 | void Adaptation::Icap::ModXact::noteMoreBodySpaceAvailable(BodyPipe::Pointer) |
774c051c | 1268 | { |
774c051c | 1269 | if (state.sending == State::sendingVirgin) |
1270 | echoMore(); | |
3b299123 | 1271 | else if (state.sending == State::sendingAdapted) |
1272 | parseMore(); | |
774c051c | 1273 | else |
3b299123 | 1274 | Must(state.sending == State::sendingUndecided); |
774c051c | 1275 | } |
1276 | ||
5f8252d2 | 1277 | // adapted body consumer aborted |
26cc52cb | 1278 | void Adaptation::Icap::ModXact::noteBodyConsumerAborted(BodyPipe::Pointer) |
774c051c | 1279 | { |
64b66b76 | 1280 | detailError(ERR_DETAIL_ICAP_XACT_BODY_CONSUMER_ABORT); |
5f8252d2 | 1281 | mustStop("adapted body consumer aborted"); |
774c051c | 1282 | } |
1283 | ||
c7d51c86 AR |
1284 | Adaptation::Icap::ModXact::~ModXact() |
1285 | { | |
1286 | delete bodyParser; | |
69c698a3 | 1287 | delete trailerParser; |
c7d51c86 AR |
1288 | } |
1289 | ||
774c051c | 1290 | // internal cleanup |
26cc52cb | 1291 | void Adaptation::Icap::ModXact::swanSong() |
774c051c | 1292 | { |
5f8252d2 | 1293 | debugs(93, 5, HERE << "swan sings" << status()); |
1294 | ||
c99de607 | 1295 | stopWriting(false); |
c824c43b | 1296 | stopSending(false); |
774c051c | 1297 | |
64b66b76 CT |
1298 | if (theInitiator.set()) // we have not sent the answer to the initiator |
1299 | detailError(ERR_DETAIL_ICAP_XACT_OTHER); | |
1300 | ||
3ff65596 | 1301 | // update adaptation history if start was called and we reserved a slot |
a22e6cd3 | 1302 | Adaptation::History::Pointer ah = virginRequest().adaptLogHistory(); |
3ff65596 AR |
1303 | if (ah != NULL && adaptHistoryId >= 0) |
1304 | ah->recordXactFinish(adaptHistoryId); | |
774c051c | 1305 | |
26cc52cb | 1306 | Adaptation::Icap::Xaction::swanSong(); |
774c051c | 1307 | } |
1308 | ||
41ebd397 | 1309 | void prepareLogWithRequestDetails(HttpRequest *, AccessLogEntry::Pointer &); |
3ff65596 AR |
1310 | |
1311 | void Adaptation::Icap::ModXact::finalizeLogInfo() | |
1312 | { | |
bd59d61c EB |
1313 | HttpRequest *adapted_request_ = nullptr; |
1314 | HttpReply *adapted_reply_ = nullptr; | |
a2958f2f | 1315 | HttpRequest *virgin_request_ = const_cast<HttpRequest*>(&virginRequest()); |
3ecb654f | 1316 | if (!(adapted_request_ = dynamic_cast<HttpRequest*>(adapted.header))) { |
bd59d61c EB |
1317 | // if the request was not adapted, use virgin request to simplify |
1318 | // the code further below | |
1319 | adapted_request_ = virgin_request_; | |
1320 | adapted_reply_ = dynamic_cast<HttpReply*>(adapted.header); | |
3ff65596 AR |
1321 | } |
1322 | ||
a2958f2f | 1323 | Adaptation::Icap::History::Pointer h = virgin_request_->icapHistory(); |
e1381638 AJ |
1324 | Must(h != NULL); // ICAPXaction::maybeLog calls only if there is a log |
1325 | al.icp.opcode = ICP_INVALID; | |
1326 | al.url = h->log_uri.termedBuf(); | |
1327 | const Adaptation::Icap::ServiceRep &s = service(); | |
1328 | al.icap.reqMethod = s.cfg().method; | |
3ff65596 | 1329 | |
bd59d61c | 1330 | al.cache.caddr = virgin_request_->client_addr; |
3ff65596 | 1331 | |
bd59d61c | 1332 | al.request = virgin_request_; |
b248c2a3 | 1333 | HTTPMSGLOCK(al.request); |
3ecb654f CT |
1334 | al.adapted_request = adapted_request_; |
1335 | HTTPMSGLOCK(al.adapted_request); | |
1336 | ||
bd59d61c EB |
1337 | if (adapted_reply_) { |
1338 | al.reply = adapted_reply_; | |
b248c2a3 AJ |
1339 | HTTPMSGLOCK(al.reply); |
1340 | } else | |
e1381638 | 1341 | al.reply = NULL; |
3ff65596 | 1342 | |
e1381638 AJ |
1343 | if (h->rfc931.size()) |
1344 | al.cache.rfc931 = h->rfc931.termedBuf(); | |
3ff65596 | 1345 | |
cb4f4424 | 1346 | #if USE_OPENSSL |
e1381638 AJ |
1347 | if (h->ssluser.size()) |
1348 | al.cache.ssluser = h->ssluser.termedBuf(); | |
3ff65596 | 1349 | #endif |
e1381638 | 1350 | al.cache.code = h->logType; |
bd59d61c | 1351 | |
63df1d28 | 1352 | const Http::Message *virgin_msg = dynamic_cast<HttpReply*>(virgin.header); |
bd59d61c EB |
1353 | if (!virgin_msg) |
1354 | virgin_msg = virgin_request_; | |
1355 | assert(virgin_msg != virgin.cause); | |
1356 | al.http.clientRequestSz.header = virgin_msg->hdr_sz; | |
7171d5fb CT |
1357 | if (virgin_msg->body_pipe != NULL) |
1358 | al.http.clientRequestSz.payloadData = virgin_msg->body_pipe->producedSize(); | |
bae917ac CT |
1359 | |
1360 | // leave al.icap.bodyBytesRead negative if no body | |
1361 | if (replyHttpHeaderSize >= 0 || replyHttpBodySize >= 0) { | |
1362 | const int64_t zero = 0; // to make max() argument types the same | |
bd59d61c EB |
1363 | const uint64_t headerSize = max(zero, replyHttpHeaderSize); |
1364 | const uint64_t bodySize = max(zero, replyHttpBodySize); | |
1365 | al.icap.bodyBytesRead = headerSize + bodySize; | |
1366 | al.http.clientReplySz.header = headerSize; | |
1367 | al.http.clientReplySz.payloadData = bodySize; | |
bae917ac CT |
1368 | } |
1369 | ||
bd59d61c EB |
1370 | if (adapted_reply_) { |
1371 | al.http.code = adapted_reply_->sline.status(); | |
1372 | al.http.content_type = adapted_reply_->content_type.termedBuf(); | |
1373 | if (replyHttpBodySize >= 0) | |
bae917ac | 1374 | al.cache.highOffset = replyHttpBodySize; |
e1381638 AJ |
1375 | //don't set al.cache.objectSize because it hasn't exist yet |
1376 | ||
e1381638 | 1377 | MemBuf mb; |
e1381638 | 1378 | mb.init(); |
bd59d61c | 1379 | adapted_reply_->header.packInto(&mb); |
e1381638 | 1380 | al.headers.reply = xstrdup(mb.buf); |
e1381638 AJ |
1381 | mb.clean(); |
1382 | } | |
3ecb654f | 1383 | prepareLogWithRequestDetails(adapted_request_, alep); |
e1381638 | 1384 | Xaction::finalizeLogInfo(); |
3ff65596 AR |
1385 | } |
1386 | ||
26cc52cb | 1387 | void Adaptation::Icap::ModXact::makeRequestHeaders(MemBuf &buf) |
774c051c | 1388 | { |
cc192b50 | 1389 | char ntoabuf[MAX_IPSTRLEN]; |
12b91c99 | 1390 | /* |
1391 | * XXX These should use HttpHdr interfaces instead of Printfs | |
1392 | */ | |
0bef8dd7 | 1393 | const Adaptation::ServiceConfig &s = service().cfg(); |
4391cd15 AJ |
1394 | buf.appendf("%s " SQUIDSTRINGPH " ICAP/1.0\r\n", s.methodStr(), SQUIDSTRINGPRINT(s.uri)); |
1395 | buf.appendf("Host: " SQUIDSTRINGPH ":%d\r\n", SQUIDSTRINGPRINT(s.host), s.port); | |
1396 | buf.appendf("Date: %s\r\n", mkrfc1123(squid_curtime)); | |
12b91c99 | 1397 | |
26cc52cb | 1398 | if (!TheConfig.reuse_connections) |
4391cd15 | 1399 | buf.appendf("Connection: close\r\n"); |
12b91c99 | 1400 | |
cb72cd25 CT |
1401 | const HttpRequest *request = &virginRequest(); |
1402 | ||
2cdeea82 | 1403 | // we must forward "Proxy-Authenticate" and "Proxy-Authorization" |
1404 | // as ICAP headers. | |
789217a2 | 1405 | if (virgin.header->header.has(Http::HdrType::PROXY_AUTHENTICATE)) { |
81ab22b6 | 1406 | String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHENTICATE); |
4391cd15 | 1407 | buf.appendf("Proxy-Authenticate: " SQUIDSTRINGPH "\r\n",SQUIDSTRINGPRINT(vh)); |
4232c626 | 1408 | } |
9e008dda | 1409 | |
789217a2 | 1410 | if (virgin.header->header.has(Http::HdrType::PROXY_AUTHORIZATION)) { |
81ab22b6 | 1411 | String vh=virgin.header->header.getById(Http::HdrType::PROXY_AUTHORIZATION); |
4391cd15 | 1412 | buf.appendf("Proxy-Authorization: " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(vh)); |
b38b26cb | 1413 | } else if (request->extacl_user.size() > 0 && request->extacl_passwd.size() > 0) { |
aadbbd7d AJ |
1414 | struct base64_encode_ctx ctx; |
1415 | base64_encode_init(&ctx); | |
1d11e9b3 | 1416 | char base64buf[base64_encode_len(MAX_LOGIN_SZ)]; |
aadbbd7d AJ |
1417 | size_t resultLen = base64_encode_update(&ctx, base64buf, request->extacl_user.size(), reinterpret_cast<const uint8_t*>(request->extacl_user.rawBuf())); |
1418 | resultLen += base64_encode_update(&ctx, base64buf+resultLen, 1, reinterpret_cast<const uint8_t*>(":")); | |
1419 | resultLen += base64_encode_update(&ctx, base64buf+resultLen, request->extacl_passwd.size(), reinterpret_cast<const uint8_t*>(request->extacl_passwd.rawBuf())); | |
1420 | resultLen += base64_encode_final(&ctx, base64buf+resultLen); | |
4391cd15 | 1421 | buf.appendf("Proxy-Authorization: Basic %.*s\r\n", (int)resultLen, base64buf); |
4232c626 | 1422 | } |
2cdeea82 | 1423 | |
3ff65596 AR |
1424 | // share the cross-transactional database records if needed |
1425 | if (Adaptation::Config::masterx_shared_name) { | |
ba8a478d | 1426 | Adaptation::History::Pointer ah = request->adaptHistory(false); |
3ff65596 AR |
1427 | if (ah != NULL) { |
1428 | String name, value; | |
1429 | if (ah->getXxRecord(name, value)) { | |
4391cd15 | 1430 | buf.appendf(SQUIDSTRINGPH ": " SQUIDSTRINGPH "\r\n", SQUIDSTRINGPRINT(name), SQUIDSTRINGPRINT(value)); |
3ff65596 AR |
1431 | } |
1432 | } | |
1433 | } | |
e1381638 | 1434 | |
4391cd15 | 1435 | buf.append("Encapsulated: ", 14); |
774c051c | 1436 | |
1437 | MemBuf httpBuf; | |
12b91c99 | 1438 | |
774c051c | 1439 | httpBuf.init(); |
1440 | ||
1441 | // build HTTP request header, if any | |
1442 | ICAP::Method m = s.method; | |
1443 | ||
5f8252d2 | 1444 | // to simplify, we could assume that request is always available |
c99de607 | 1445 | |
c99de607 | 1446 | if (request) { |
c99de607 | 1447 | if (ICAP::methodRespmod == m) |
1448 | encapsulateHead(buf, "req-hdr", httpBuf, request); | |
e1381638 AJ |
1449 | else if (ICAP::methodReqmod == m) |
1450 | encapsulateHead(buf, "req-hdr", httpBuf, virgin.header); | |
c99de607 | 1451 | } |
774c051c | 1452 | |
1453 | if (ICAP::methodRespmod == m) | |
63df1d28 | 1454 | if (const Http::Message *prime = virgin.header) |
774c051c | 1455 | encapsulateHead(buf, "res-hdr", httpBuf, prime); |
1456 | ||
1457 | if (!virginBody.expected()) | |
4391cd15 | 1458 | buf.appendf("null-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1459 | else if (ICAP::methodReqmod == m) |
4391cd15 | 1460 | buf.appendf("req-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1461 | else |
4391cd15 | 1462 | buf.appendf("res-body=%d", (int) httpBuf.contentSize()); |
774c051c | 1463 | |
1464 | buf.append(ICAP::crlf, 2); // terminate Encapsulated line | |
1465 | ||
c824c43b | 1466 | if (preview.enabled()) { |
4391cd15 | 1467 | buf.appendf("Preview: %d\r\n", (int)preview.ad()); |
83c51da9 | 1468 | if (!virginBody.expected()) // there is no body to preview |
5f8252d2 | 1469 | finishNullOrEmptyBodyPreview(httpBuf); |
774c051c | 1470 | } |
1471 | ||
83c51da9 | 1472 | makeAllowHeader(buf); |
774c051c | 1473 | |
a9044668 | 1474 | if (TheConfig.send_client_ip && request) { |
b7ac5457 | 1475 | Ip::Address client_addr; |
57d76dd4 | 1476 | #if FOLLOW_X_FORWARDED_FOR |
22fff3bf | 1477 | if (TheConfig.use_indirect_client) { |
a9044668 A |
1478 | client_addr = request->indirect_client_addr; |
1479 | } else | |
57d76dd4 | 1480 | #endif |
a9044668 | 1481 | client_addr = request->client_addr; |
4dd643d5 | 1482 | if (!client_addr.isAnyAddr() && !client_addr.isNoAddr()) |
4391cd15 | 1483 | buf.appendf("X-Client-IP: %s\r\n", client_addr.toStr(ntoabuf,MAX_IPSTRLEN)); |
57d76dd4 | 1484 | } |
a97e82a8 | 1485 | |
22fff3bf | 1486 | if (TheConfig.send_username && request) |
5f8252d2 | 1487 | makeUsernameHeader(request, buf); |
a97e82a8 | 1488 | |
71be37e0 | 1489 | // Adaptation::Config::metaHeaders |
75d47340 | 1490 | for (auto h: Adaptation::Config::metaHeaders) { |
71be37e0 | 1491 | HttpRequest *r = virgin.cause ? |
71ee0835 | 1492 | virgin.cause : dynamic_cast<HttpRequest*>(virgin.header); |
71be37e0 CT |
1493 | Must(r); |
1494 | ||
1495 | HttpReply *reply = dynamic_cast<HttpReply*>(virgin.header); | |
1496 | ||
75d47340 CT |
1497 | SBuf matched; |
1498 | if (h->match(r, reply, alMaster, matched)) { | |
1499 | buf.append(h->key().rawContent(), h->key().length()); | |
1500 | buf.append(": ", 2); | |
1501 | buf.append(matched.rawContent(), matched.length()); | |
1502 | buf.append("\r\n", 2); | |
d7f4a0b7 | 1503 | Adaptation::History::Pointer ah = request->adaptHistory(false); |
cf9f0261 CT |
1504 | if (ah != NULL) { |
1505 | if (ah->metaHeaders == NULL) | |
1506 | ah->metaHeaders = new NotePairs; | |
75d47340 CT |
1507 | if (!ah->metaHeaders->hasPair(h->key(), matched)) |
1508 | ah->metaHeaders->add(h->key(), matched); | |
cf9f0261 | 1509 | } |
d7f4a0b7 | 1510 | } |
71be37e0 CT |
1511 | } |
1512 | ||
bb790702 | 1513 | // fprintf(stderr, "%s\n", buf.content()); |
a97e82a8 | 1514 | |
774c051c | 1515 | buf.append(ICAP::crlf, 2); // terminate ICAP header |
1516 | ||
a22e6cd3 AR |
1517 | // fill icapRequest for logging |
1518 | Must(icapRequest->parseCharBuf(buf.content(), buf.contentSize())); | |
1519 | ||
774c051c | 1520 | // start ICAP request body with encapsulated HTTP headers |
1521 | buf.append(httpBuf.content(), httpBuf.contentSize()); | |
1522 | ||
1523 | httpBuf.clean(); | |
1524 | } | |
1525 | ||
83c51da9 CT |
1526 | // decides which Allow values to write and updates the request buffer |
1527 | void Adaptation::Icap::ModXact::makeAllowHeader(MemBuf &buf) | |
1528 | { | |
1529 | const bool allow204in = preview.enabled(); // TODO: add shouldAllow204in() | |
1530 | const bool allow204out = state.allowedPostview204 = shouldAllow204(); | |
1531 | const bool allow206in = state.allowedPreview206 = shouldAllow206in(); | |
1532 | const bool allow206out = state.allowedPostview206 = shouldAllow206out(); | |
69c698a3 | 1533 | const bool allowTrailers = true; // TODO: make configurable |
83c51da9 | 1534 | |
6fbd6ef2 | 1535 | debugs(93, 9, "Allows: " << allow204in << allow204out << |
69c698a3 | 1536 | allow206in << allow206out << allowTrailers); |
83c51da9 CT |
1537 | |
1538 | const bool allow204 = allow204in || allow204out; | |
1539 | const bool allow206 = allow206in || allow206out; | |
1540 | ||
6fbd6ef2 | 1541 | if (!allow204 && !allow206 && !allowTrailers) |
83c51da9 CT |
1542 | return; // nothing to do |
1543 | ||
1544 | if (virginBody.expected()) // if there is a virgin body, plan to send it | |
1545 | virginBodySending.plan(); | |
1546 | ||
1547 | // writing Preview:... means we will honor 204 inside preview | |
1548 | // writing Allow/204 means we will honor 204 outside preview | |
1549 | // writing Allow:206 means we will honor 206 inside preview | |
1550 | // writing Allow:204,206 means we will honor 206 outside preview | |
69c698a3 EB |
1551 | if (allow204 || allow206 || allowTrailers) { |
1552 | buf.appendf("Allow: "); | |
1553 | if (allow204out) | |
1554 | buf.appendf("204, "); | |
1555 | if (allow206) | |
1556 | buf.appendf("206, "); | |
1557 | if (allowTrailers) | |
1558 | buf.appendf("trailers"); | |
1559 | buf.appendf("\r\n"); | |
83c51da9 CT |
1560 | } |
1561 | } | |
1562 | ||
26cc52cb | 1563 | void Adaptation::Icap::ModXact::makeUsernameHeader(const HttpRequest *request, MemBuf &buf) |
9e008dda | 1564 | { |
74f6c040 | 1565 | #if USE_AUTH |
aadbbd7d AJ |
1566 | struct base64_encode_ctx ctx; |
1567 | base64_encode_init(&ctx); | |
1568 | ||
1569 | const char *value = NULL; | |
a33a428a | 1570 | if (request->auth_user_request != NULL) { |
aadbbd7d | 1571 | value = request->auth_user_request->username(); |
b38b26cb | 1572 | } else if (request->extacl_user.size() > 0) { |
aadbbd7d AJ |
1573 | value = request->extacl_user.termedBuf(); |
1574 | } | |
1575 | ||
1576 | if (value) { | |
1577 | if (TheConfig.client_username_encode) { | |
1d11e9b3 | 1578 | char base64buf[base64_encode_len(MAX_LOGIN_SZ)]; |
aadbbd7d AJ |
1579 | size_t resultLen = base64_encode_update(&ctx, base64buf, strlen(value), reinterpret_cast<const uint8_t*>(value)); |
1580 | resultLen += base64_encode_final(&ctx, base64buf+resultLen); | |
4391cd15 | 1581 | buf.appendf("%s: %.*s\r\n", TheConfig.client_username_header, (int)resultLen, base64buf); |
aadbbd7d | 1582 | } else |
4391cd15 | 1583 | buf.appendf("%s: %s\r\n", TheConfig.client_username_header, value); |
5f8252d2 | 1584 | } |
74f6c040 | 1585 | #endif |
5f8252d2 | 1586 | } |
1587 | ||
63df1d28 AJ |
1588 | void |
1589 | Adaptation::Icap::ModXact::encapsulateHead(MemBuf &icapBuf, const char *section, MemBuf &httpBuf, const Http::Message *head) | |
774c051c | 1590 | { |
1591 | // update ICAP header | |
4391cd15 | 1592 | icapBuf.appendf("%s=%d, ", section, (int) httpBuf.contentSize()); |
774c051c | 1593 | |
2cdeea82 | 1594 | // begin cloning |
63df1d28 | 1595 | Http::MessagePointer headClone; |
9e008dda | 1596 | |
2cdeea82 | 1597 | if (const HttpRequest* old_request = dynamic_cast<const HttpRequest*>(head)) { |
5ceaee75 | 1598 | HttpRequest::Pointer new_request(new HttpRequest(old_request->masterXaction)); |
63df1d28 | 1599 | // copy the request-line details |
851feda6 AJ |
1600 | new_request->method = old_request->method; |
1601 | new_request->url = old_request->url; | |
2cdeea82 | 1602 | new_request->http_ver = old_request->http_ver; |
b248c2a3 | 1603 | headClone = new_request.getRaw(); |
9e008dda | 1604 | } else if (const HttpReply *old_reply = dynamic_cast<const HttpReply*>(head)) { |
c7d51c86 | 1605 | HttpReply::Pointer new_reply(new HttpReply); |
2cdeea82 | 1606 | new_reply->sline = old_reply->sline; |
b248c2a3 | 1607 | headClone = new_reply.getRaw(); |
2cdeea82 | 1608 | } |
02dd0839 | 1609 | Must(headClone); |
d67acb4e | 1610 | headClone->inheritProperties(head); |
9e008dda | 1611 | |
2cdeea82 | 1612 | HttpHeaderPos pos = HttpHeaderInitPos; |
02dd0839 | 1613 | while (HttpHeaderEntry* p_head_entry = head->header.getEntry(&pos)) |
2cdeea82 | 1614 | headClone->header.addEntry(p_head_entry->clone()); |
1615 | ||
1616 | // end cloning | |
9e008dda | 1617 | |
2cdeea82 | 1618 | // remove all hop-by-hop headers from the clone |
789217a2 | 1619 | headClone->header.delById(Http::HdrType::PROXY_AUTHENTICATE); |
2cdeea82 | 1620 | headClone->header.removeHopByHopEntries(); |
1621 | ||
1622 | // pack polished HTTP header | |
b248c2a3 | 1623 | packHead(httpBuf, headClone.getRaw()); |
2cdeea82 | 1624 | |
c7d51c86 | 1625 | // headClone unlocks and, hence, deletes the message we packed |
774c051c | 1626 | } |
1627 | ||
63df1d28 AJ |
1628 | void |
1629 | Adaptation::Icap::ModXact::packHead(MemBuf &httpBuf, const Http::Message *head) | |
774c051c | 1630 | { |
10201568 | 1631 | head->packInto(&httpBuf, true); |
774c051c | 1632 | } |
1633 | ||
1634 | // decides whether to offer a preview and calculates its size | |
26cc52cb | 1635 | void Adaptation::Icap::ModXact::decideOnPreview() |
774c051c | 1636 | { |
26cc52cb | 1637 | if (!TheConfig.preview_enable) { |
7cdbbd47 | 1638 | debugs(93, 5, HERE << "preview disabled by squid.conf"); |
c824c43b | 1639 | return; |
7cdbbd47 | 1640 | } |
1641 | ||
51b5dcf5 | 1642 | const SBuf urlPath(virginRequest().url.path()); |
5f8252d2 | 1643 | size_t wantedSize; |
c99de607 | 1644 | if (!service().wantsPreview(urlPath, wantedSize)) { |
51b5dcf5 | 1645 | debugs(93, 5, "should not offer preview for " << urlPath); |
c824c43b | 1646 | return; |
774c051c | 1647 | } |
1648 | ||
c824c43b | 1649 | // we decided to do preview, now compute its size |
1650 | ||
774c051c | 1651 | // cannot preview more than we can backup |
d85c3078 | 1652 | size_t ad = min(wantedSize, TheBackupLimit); |
774c051c | 1653 | |
5f8252d2 | 1654 | if (!virginBody.expected()) |
1655 | ad = 0; | |
e1381638 AJ |
1656 | else if (virginBody.knownSize()) |
1657 | ad = min(static_cast<uint64_t>(ad), virginBody.size()); // not more than we have | |
774c051c | 1658 | |
192378eb | 1659 | debugs(93, 5, HERE << "should offer " << ad << "-byte preview " << |
774c051c | 1660 | "(service wanted " << wantedSize << ")"); |
1661 | ||
1662 | preview.enable(ad); | |
5f8252d2 | 1663 | Must(preview.enabled()); |
774c051c | 1664 | } |
1665 | ||
1666 | // decides whether to allow 204 responses | |
26cc52cb | 1667 | bool Adaptation::Icap::ModXact::shouldAllow204() |
774c051c | 1668 | { |
1669 | if (!service().allows204()) | |
1670 | return false; | |
1671 | ||
c824c43b | 1672 | return canBackupEverything(); |
1673 | } | |
1674 | ||
83c51da9 CT |
1675 | // decides whether to allow 206 responses in some mode |
1676 | bool Adaptation::Icap::ModXact::shouldAllow206any() | |
1677 | { | |
1678 | return TheConfig.allow206_enable && service().allows206() && | |
7ddcfbab | 1679 | virginBody.expected(); // no need for 206 without a body |
83c51da9 CT |
1680 | } |
1681 | ||
1682 | // decides whether to allow 206 responses in preview mode | |
1683 | bool Adaptation::Icap::ModXact::shouldAllow206in() | |
1684 | { | |
1685 | return shouldAllow206any() && preview.enabled(); | |
1686 | } | |
1687 | ||
1688 | // decides whether to allow 206 responses outside of preview | |
1689 | bool Adaptation::Icap::ModXact::shouldAllow206out() | |
1690 | { | |
1691 | return shouldAllow206any() && canBackupEverything(); | |
1692 | } | |
1693 | ||
c824c43b | 1694 | // used by shouldAllow204 and decideOnRetries |
26cc52cb | 1695 | bool Adaptation::Icap::ModXact::canBackupEverything() const |
c824c43b | 1696 | { |
774c051c | 1697 | if (!virginBody.expected()) |
c824c43b | 1698 | return true; // no body means no problems with backup |
774c051c | 1699 | |
c824c43b | 1700 | // if there is a body, check whether we can backup it all |
774c051c | 1701 | |
1702 | if (!virginBody.knownSize()) | |
1703 | return false; | |
1704 | ||
1705 | // or should we have a different backup limit? | |
1706 | // note that '<' allows for 0-termination of the "full" backup buffer | |
1707 | return virginBody.size() < TheBackupLimit; | |
1708 | } | |
1709 | ||
c824c43b | 1710 | // Decide whether this transaction can be retried if pconn fails |
1711 | // Must be called after decideOnPreview and before openConnection() | |
26cc52cb | 1712 | void Adaptation::Icap::ModXact::decideOnRetries() |
c824c43b | 1713 | { |
1714 | if (!isRetriable) | |
1715 | return; // no, already decided | |
1716 | ||
1717 | if (preview.enabled()) | |
1718 | return; // yes, because preview provides enough guarantees | |
1719 | ||
1720 | if (canBackupEverything()) | |
1721 | return; // yes, because we can back everything up | |
1722 | ||
1723 | disableRetries(); // no, because we cannot back everything up | |
1724 | } | |
1725 | ||
5f8252d2 | 1726 | // Normally, the body-writing code handles preview body. It can deal with |
1727 | // bodies of unexpected size, including those that turn out to be empty. | |
1728 | // However, that code assumes that the body was expected and body control | |
1729 | // structures were initialized. This is not the case when there is no body | |
1730 | // or the body is known to be empty, because the virgin message will lack a | |
1731 | // body_pipe. So we handle preview of null-body and zero-size bodies here. | |
ced8def3 | 1732 | void Adaptation::Icap::ModXact::finishNullOrEmptyBodyPreview(MemBuf &) |
5f8252d2 | 1733 | { |
1734 | Must(!virginBodyWriting.active()); // one reason we handle it here | |
1735 | Must(!virgin.body_pipe); // another reason we handle it here | |
1736 | Must(!preview.ad()); | |
1737 | ||
1738 | // do not add last-chunk because our Encapsulated header says null-body | |
bb790702 | 1739 | // addLastRequestChunk(buf); |
5f8252d2 | 1740 | preview.wrote(0, true); |
1741 | ||
1742 | Must(preview.done()); | |
1743 | Must(preview.ieof()); | |
1744 | } | |
1745 | ||
26cc52cb | 1746 | void Adaptation::Icap::ModXact::fillPendingStatus(MemBuf &buf) const |
774c051c | 1747 | { |
26cc52cb | 1748 | Adaptation::Icap::Xaction::fillPendingStatus(buf); |
c99de607 | 1749 | |
774c051c | 1750 | if (state.serviceWaiting) |
1751 | buf.append("U", 1); | |
1752 | ||
5f8252d2 | 1753 | if (virgin.body_pipe != NULL) |
c99de607 | 1754 | buf.append("R", 1); |
1755 | ||
aed188fd | 1756 | if (haveConnection() && !doneReading()) |
c99de607 | 1757 | buf.append("r", 1); |
1758 | ||
774c051c | 1759 | if (!state.doneWriting() && state.writing != State::writingInit) |
4391cd15 | 1760 | buf.appendf("w(%d)", state.writing); |
774c051c | 1761 | |
1762 | if (preview.enabled()) { | |
1763 | if (!preview.done()) | |
4391cd15 | 1764 | buf.appendf("P(%d)", (int) preview.debt()); |
774c051c | 1765 | } |
1766 | ||
5f8252d2 | 1767 | if (virginBodySending.active()) |
774c051c | 1768 | buf.append("B", 1); |
1769 | ||
1770 | if (!state.doneParsing() && state.parsing != State::psIcapHeader) | |
4391cd15 | 1771 | buf.appendf("p(%d)", state.parsing); |
774c051c | 1772 | |
1773 | if (!doneSending() && state.sending != State::sendingUndecided) | |
4391cd15 | 1774 | buf.appendf("S(%d)", state.sending); |
478cfe99 | 1775 | |
83c51da9 CT |
1776 | if (state.readyForUob) |
1777 | buf.append("6", 1); | |
1778 | ||
478cfe99 | 1779 | if (canStartBypass) |
9e008dda | 1780 | buf.append("Y", 1); |
a22e6cd3 AR |
1781 | |
1782 | if (protectGroupBypass) | |
1783 | buf.append("G", 1); | |
774c051c | 1784 | } |
1785 | ||
26cc52cb | 1786 | void Adaptation::Icap::ModXact::fillDoneStatus(MemBuf &buf) const |
774c051c | 1787 | { |
26cc52cb | 1788 | Adaptation::Icap::Xaction::fillDoneStatus(buf); |
c99de607 | 1789 | |
5f8252d2 | 1790 | if (!virgin.body_pipe) |
774c051c | 1791 | buf.append("R", 1); |
1792 | ||
1793 | if (state.doneWriting()) | |
1794 | buf.append("w", 1); | |
1795 | ||
1796 | if (preview.enabled()) { | |
1797 | if (preview.done()) | |
4391cd15 | 1798 | buf.appendf("P%s", preview.ieof() ? "(ieof)" : ""); |
774c051c | 1799 | } |
1800 | ||
1801 | if (doneReading()) | |
1802 | buf.append("r", 1); | |
1803 | ||
1804 | if (state.doneParsing()) | |
1805 | buf.append("p", 1); | |
1806 | ||
1807 | if (doneSending()) | |
1808 | buf.append("S", 1); | |
1809 | } | |
1810 | ||
26cc52cb | 1811 | bool Adaptation::Icap::ModXact::gotEncapsulated(const char *section) const |
774c051c | 1812 | { |
36c774f7 EB |
1813 | return !icapReply->header.getByNameListMember("Encapsulated", |
1814 | section, ',').isEmpty(); | |
774c051c | 1815 | } |
1816 | ||
1817 | // calculate whether there is a virgin HTTP body and | |
1818 | // whether its expected size is known | |
5f8252d2 | 1819 | // TODO: rename because we do not just estimate |
26cc52cb | 1820 | void Adaptation::Icap::ModXact::estimateVirginBody() |
774c051c | 1821 | { |
5f8252d2 | 1822 | // note: lack of size info may disable previews and 204s |
774c051c | 1823 | |
63df1d28 | 1824 | Http::Message *msg = virgin.header; |
5f8252d2 | 1825 | Must(msg); |
774c051c | 1826 | |
60745f24 | 1827 | HttpRequestMethod method; |
774c051c | 1828 | |
5f8252d2 | 1829 | if (virgin.cause) |
1830 | method = virgin.cause->method; | |
e1381638 AJ |
1831 | else if (HttpRequest *req = dynamic_cast<HttpRequest*>(msg)) |
1832 | method = req->method; | |
774c051c | 1833 | else |
c2a7cefd | 1834 | method = Http::METHOD_NONE; |
774c051c | 1835 | |
47f6e231 | 1836 | int64_t size; |
5f8252d2 | 1837 | // expectingBody returns true for zero-sized bodies, but we will not |
1838 | // get a pipe for that body, so we treat the message as bodyless | |
c2a7cefd | 1839 | if (method != Http::METHOD_NONE && msg->expectingBody(method, size) && size) { |
192378eb | 1840 | debugs(93, 6, HERE << "expects virgin body from " << |
9e008dda | 1841 | virgin.body_pipe << "; size: " << size); |
5f8252d2 | 1842 | |
1843 | virginBody.expect(size); | |
1844 | virginBodyWriting.plan(); | |
1845 | ||
1846 | // sign up as a body consumer | |
1847 | Must(msg->body_pipe != NULL); | |
1848 | Must(msg->body_pipe == virgin.body_pipe); | |
1849 | Must(virgin.body_pipe->setConsumerIfNotLate(this)); | |
1850 | ||
1851 | // make sure TheBackupLimit is in-sync with the buffer size | |
9c175897 | 1852 | Must(TheBackupLimit <= static_cast<size_t>(msg->body_pipe->buf().max_capacity)); |
774c051c | 1853 | } else { |
192378eb | 1854 | debugs(93, 6, HERE << "does not expect virgin body"); |
5f8252d2 | 1855 | Must(msg->body_pipe == NULL); |
1856 | checkConsuming(); | |
774c051c | 1857 | } |
1858 | } | |
1859 | ||
26cc52cb | 1860 | void Adaptation::Icap::ModXact::makeAdaptedBodyPipe(const char *what) |
9e008dda | 1861 | { |
5f8252d2 | 1862 | Must(!adapted.body_pipe); |
1863 | Must(!adapted.header->body_pipe); | |
1864 | adapted.header->body_pipe = new BodyPipe(this); | |
1865 | adapted.body_pipe = adapted.header->body_pipe; | |
1866 | debugs(93, 7, HERE << "will supply " << what << " via " << | |
9e008dda | 1867 | adapted.body_pipe << " pipe"); |
5f8252d2 | 1868 | } |
1869 | ||
26cc52cb | 1870 | // TODO: Move SizedEstimate and Preview elsewhere |
774c051c | 1871 | |
26cc52cb | 1872 | Adaptation::Icap::SizedEstimate::SizedEstimate() |
f53969cc | 1873 | : theData(dtUnexpected) |
774c051c | 1874 | {} |
1875 | ||
26cc52cb | 1876 | void Adaptation::Icap::SizedEstimate::expect(int64_t aSize) |
774c051c | 1877 | { |
47f6e231 | 1878 | theData = (aSize >= 0) ? aSize : (int64_t)dtUnknown; |
774c051c | 1879 | } |
1880 | ||
26cc52cb | 1881 | bool Adaptation::Icap::SizedEstimate::expected() const |
774c051c | 1882 | { |
1883 | return theData != dtUnexpected; | |
1884 | } | |
1885 | ||
26cc52cb | 1886 | bool Adaptation::Icap::SizedEstimate::knownSize() const |
774c051c | 1887 | { |
1888 | Must(expected()); | |
1889 | return theData != dtUnknown; | |
1890 | } | |
1891 | ||
26cc52cb | 1892 | uint64_t Adaptation::Icap::SizedEstimate::size() const |
774c051c | 1893 | { |
1894 | Must(knownSize()); | |
47f6e231 | 1895 | return static_cast<uint64_t>(theData); |
774c051c | 1896 | } |
1897 | ||
26cc52cb | 1898 | Adaptation::Icap::VirginBodyAct::VirginBodyAct(): theStart(0), theState(stUndecided) |
774c051c | 1899 | {} |
1900 | ||
26cc52cb | 1901 | void Adaptation::Icap::VirginBodyAct::plan() |
774c051c | 1902 | { |
478cfe99 | 1903 | Must(!disabled()); |
1904 | Must(!theStart); // not started | |
1905 | theState = stActive; | |
774c051c | 1906 | } |
1907 | ||
26cc52cb | 1908 | void Adaptation::Icap::VirginBodyAct::disable() |
774c051c | 1909 | { |
478cfe99 | 1910 | theState = stDisabled; |
774c051c | 1911 | } |
1912 | ||
26cc52cb | 1913 | void Adaptation::Icap::VirginBodyAct::progress(size_t size) |
774c051c | 1914 | { |
1915 | Must(active()); | |
46e172d9 FC |
1916 | #if SIZEOF_SIZE_T > 4 |
1917 | /* always true for smaller size_t's */ | |
d897ae49 | 1918 | Must(static_cast<int64_t>(size) >= 0); |
46e172d9 | 1919 | #endif |
47f6e231 | 1920 | theStart += static_cast<int64_t>(size); |
774c051c | 1921 | } |
1922 | ||
26cc52cb | 1923 | uint64_t Adaptation::Icap::VirginBodyAct::offset() const |
774c051c | 1924 | { |
1925 | Must(active()); | |
47f6e231 | 1926 | return static_cast<uint64_t>(theStart); |
774c051c | 1927 | } |
1928 | ||
26cc52cb | 1929 | Adaptation::Icap::Preview::Preview(): theWritten(0), theAd(0), theState(stDisabled) |
774c051c | 1930 | {} |
1931 | ||
26cc52cb | 1932 | void Adaptation::Icap::Preview::enable(size_t anAd) |
774c051c | 1933 | { |
1934 | // TODO: check for anAd not exceeding preview size limit | |
774c051c | 1935 | Must(!enabled()); |
1936 | theAd = anAd; | |
1937 | theState = stWriting; | |
1938 | } | |
1939 | ||
26cc52cb | 1940 | bool Adaptation::Icap::Preview::enabled() const |
774c051c | 1941 | { |
1942 | return theState != stDisabled; | |
1943 | } | |
1944 | ||
26cc52cb | 1945 | size_t Adaptation::Icap::Preview::ad() const |
774c051c | 1946 | { |
1947 | Must(enabled()); | |
1948 | return theAd; | |
1949 | } | |
1950 | ||
26cc52cb | 1951 | bool Adaptation::Icap::Preview::done() const |
774c051c | 1952 | { |
1953 | Must(enabled()); | |
1954 | return theState >= stIeof; | |
1955 | } | |
1956 | ||
26cc52cb | 1957 | bool Adaptation::Icap::Preview::ieof() const |
774c051c | 1958 | { |
1959 | Must(enabled()); | |
1960 | return theState == stIeof; | |
1961 | } | |
1962 | ||
26cc52cb | 1963 | size_t Adaptation::Icap::Preview::debt() const |
774c051c | 1964 | { |
1965 | Must(enabled()); | |
1966 | return done() ? 0 : (theAd - theWritten); | |
1967 | } | |
1968 | ||
26cc52cb | 1969 | void Adaptation::Icap::Preview::wrote(size_t size, bool wroteEof) |
774c051c | 1970 | { |
1971 | Must(enabled()); | |
5f8252d2 | 1972 | |
774c051c | 1973 | theWritten += size; |
1974 | ||
9e008dda | 1975 | Must(theWritten <= theAd); |
5f8252d2 | 1976 | |
9e008dda AJ |
1977 | if (wroteEof) |
1978 | theState = stIeof; // written size is irrelevant | |
e1381638 AJ |
1979 | else if (theWritten >= theAd) |
1980 | theState = stDone; | |
774c051c | 1981 | } |
1982 | ||
26cc52cb | 1983 | bool Adaptation::Icap::ModXact::fillVirginHttpHeader(MemBuf &mb) const |
3cfc19b3 | 1984 | { |
5f8252d2 | 1985 | if (virgin.header == NULL) |
3cfc19b3 | 1986 | return false; |
1987 | ||
5f8252d2 | 1988 | virgin.header->firstLineBuf(mb); |
3cfc19b3 | 1989 | |
1990 | return true; | |
1991 | } | |
c824c43b | 1992 | |
64b66b76 CT |
1993 | void Adaptation::Icap::ModXact::detailError(int errDetail) |
1994 | { | |
e9fa5493 AR |
1995 | HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
1996 | // if no adapted request, update virgin (and inherit its properties later) | |
1997 | // TODO: make this and HttpRequest::detailError constant, like adaptHistory | |
1998 | if (!request) | |
1999 | request = const_cast<HttpRequest*>(&virginRequest()); | |
2000 | ||
2001 | if (request) | |
64b66b76 | 2002 | request->detailError(ERR_ICAP_FAILURE, errDetail); |
64b66b76 | 2003 | } |
c824c43b | 2004 | |
129fe2a1 CT |
2005 | void Adaptation::Icap::ModXact::clearError() |
2006 | { | |
87f237a9 | 2007 | HttpRequest *request = dynamic_cast<HttpRequest*>(adapted.header); |
129fe2a1 CT |
2008 | // if no adapted request, update virgin (and inherit its properties later) |
2009 | if (!request) | |
2010 | request = const_cast<HttpRequest*>(&virginRequest()); | |
2011 | ||
2012 | if (request) | |
2013 | request->clearError(); | |
2014 | } | |
2015 | ||
88df846b CT |
2016 | void Adaptation::Icap::ModXact::updateSources() |
2017 | { | |
2018 | Must(adapted.header); | |
63df1d28 | 2019 | adapted.header->sources |= (service().cfg().connectionEncryption ? Http::Message::srcIcaps : Http::Message::srcIcap); |
88df846b CT |
2020 | } |
2021 | ||
26cc52cb | 2022 | /* Adaptation::Icap::ModXactLauncher */ |
c824c43b | 2023 | |
63df1d28 | 2024 | Adaptation::Icap::ModXactLauncher::ModXactLauncher(Http::Message *virginHeader, HttpRequest *virginCause, AccessLogEntry::Pointer &alp, Adaptation::ServicePointer aService): |
f53969cc SM |
2025 | AsyncJob("Adaptation::Icap::ModXactLauncher"), |
2026 | Adaptation::Icap::Launcher("Adaptation::Icap::ModXactLauncher", aService), | |
2027 | al(alp) | |
c824c43b | 2028 | { |
2029 | virgin.setHeader(virginHeader); | |
2030 | virgin.setCause(virginCause); | |
3ff65596 | 2031 | updateHistory(true); |
c824c43b | 2032 | } |
2033 | ||
26cc52cb | 2034 | Adaptation::Icap::Xaction *Adaptation::Icap::ModXactLauncher::createXaction() |
c824c43b | 2035 | { |
26cc52cb AR |
2036 | Adaptation::Icap::ServiceRep::Pointer s = |
2037 | dynamic_cast<Adaptation::Icap::ServiceRep*>(theService.getRaw()); | |
0bef8dd7 | 2038 | Must(s != NULL); |
af0ded40 | 2039 | return new Adaptation::Icap::ModXact(virgin.header, virgin.cause, al, s); |
c824c43b | 2040 | } |
3ff65596 | 2041 | |
e1381638 AJ |
2042 | void Adaptation::Icap::ModXactLauncher::swanSong() |
2043 | { | |
3ff65596 AR |
2044 | debugs(93, 5, HERE << "swan sings"); |
2045 | updateHistory(false); | |
2046 | Adaptation::Icap::Launcher::swanSong(); | |
2047 | } | |
2048 | ||
b0365bd9 | 2049 | void Adaptation::Icap::ModXactLauncher::updateHistory(bool doStart) |
e1381638 AJ |
2050 | { |
2051 | HttpRequest *r = virgin.cause ? | |
2052 | virgin.cause : dynamic_cast<HttpRequest*>(virgin.header); | |
2053 | ||
2054 | // r should never be NULL but we play safe; TODO: add Should() | |
2055 | if (r) { | |
2056 | Adaptation::Icap::History::Pointer h = r->icapHistory(); | |
2057 | if (h != NULL) { | |
b0365bd9 | 2058 | if (doStart) |
e1381638 AJ |
2059 | h->start("ICAPModXactLauncher"); |
2060 | else | |
2061 | h->stop("ICAPModXactLauncher"); | |
2062 | } | |
2063 | } | |
3ff65596 | 2064 | } |
f53969cc | 2065 | |
69c698a3 | 2066 | bool Adaptation::Icap::TrailerParser::parse(const char *buf, int len, int atEnd, Http::StatusCode *error) { |
4f1c93a7 EB |
2067 | Http::ContentLengthInterpreter clen; |
2068 | // RFC 7230 section 4.1.2: MUST NOT generate a trailer that contains | |
2069 | // a field necessary for message framing (e.g., Transfer-Encoding and Content-Length) | |
2070 | clen.applyTrailerRules(); | |
2071 | const int parsed = trailer.parse(buf, len, atEnd, hdr_sz, clen); | |
69c698a3 EB |
2072 | if (parsed < 0) |
2073 | *error = Http::scInvalidHeader; // TODO: should we add a new Http::scInvalidTrailer? | |
2074 | return parsed > 0; | |
2075 | } | |
2076 |