]>
Commit | Line | Data |
---|---|---|
41462d93 | 1 | |
2 | /* | |
a4b8110e | 3 | * $Id: forward.cc,v 1.73 2000/05/12 00:29:07 wessels Exp $ |
41462d93 | 4 | * |
5 | * DEBUG: section 17 Request Forwarding | |
6 | * AUTHOR: Duane Wessels | |
7 | * | |
8 | * SQUID Internet Object Cache http://squid.nlanr.net/Squid/ | |
e25c139f | 9 | * ---------------------------------------------------------- |
41462d93 | 10 | * |
11 | * Squid is the result of efforts by numerous individuals from the | |
12 | * Internet community. Development is led by Duane Wessels of the | |
e25c139f | 13 | * National Laboratory for Applied Network Research and funded by the |
14 | * National Science Foundation. Squid is Copyrighted (C) 1998 by | |
efd900cb | 15 | * the Regents of the University of California. Please see the |
16 | * COPYRIGHT file for full details. Squid incorporates software | |
17 | * developed and/or copyrighted by other sources. Please see the | |
18 | * CREDITS file for full details. | |
41462d93 | 19 | * |
20 | * This program is free software; you can redistribute it and/or modify | |
21 | * it under the terms of the GNU General Public License as published by | |
22 | * the Free Software Foundation; either version 2 of the License, or | |
23 | * (at your option) any later version. | |
24 | * | |
25 | * This program is distributed in the hope that it will be useful, | |
26 | * but WITHOUT ANY WARRANTY; without even the implied warranty of | |
27 | * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the | |
28 | * GNU General Public License for more details. | |
29 | * | |
30 | * You should have received a copy of the GNU General Public License | |
31 | * along with this program; if not, write to the Free Software | |
cbdec147 | 32 | * Foundation, Inc., 59 Temple Place, Suite 330, Boston, MA 02111, USA. |
e25c139f | 33 | * |
41462d93 | 34 | */ |
35 | ||
36 | ||
37 | #include "squid.h" | |
38 | ||
db1cd23c | 39 | static PSC fwdStartComplete; |
6801f8a8 | 40 | static void fwdDispatch(FwdState *); |
ee08bdf5 | 41 | static void fwdConnectStart(void *); /* should be same as EVH */ |
910169e5 | 42 | static void fwdStateFree(FwdState * fwdState); |
43 | static PF fwdConnectTimeout; | |
44 | static PF fwdServerClosed; | |
45 | static CNCB fwdConnectDone; | |
68bd6892 | 46 | static int fwdCheckRetry(FwdState * fwdState); |
db1cd23c | 47 | static int fwdReforward(FwdState *); |
48 | static void fwdStartFail(FwdState *); | |
8ddcc35d | 49 | static void fwdLogReplyStatus(int tries, http_status status); |
50 | static OBJH fwdStats; | |
7197b20d | 51 | static STABH fwdAbort; |
8ddcc35d | 52 | |
53 | #define MAX_FWD_STATS_IDX 9 | |
9977e14b | 54 | static int FwdReplyCodes[MAX_FWD_STATS_IDX + 1][HTTP_INVALID_HEADER + 1]; |
db1cd23c | 55 | |
56 | static void | |
57 | fwdServerFree(FwdServer * fs) | |
58 | { | |
59 | if (fs->peer) | |
60 | cbdataUnlock(fs->peer); | |
61 | memFree(fs, MEM_FWD_SERVER); | |
62 | } | |
63 | ||
41462d93 | 64 | static void |
4ca83e82 | 65 | fwdStateFree(FwdState * fwdState) |
41462d93 | 66 | { |
f563eea9 | 67 | StoreEntry *e = fwdState->entry; |
6801f8a8 | 68 | int sfd; |
0bdf2621 | 69 | debug(17, 3) ("fwdStateFree: %p\n", fwdState); |
f563eea9 | 70 | assert(e->mem_obj); |
bc87dc25 | 71 | #if URL_CHECKSUM_DEBUG |
72 | assert(e->mem_obj->chksum == url_checksum(e->mem_obj->url)); | |
73 | #endif | |
1640c2df | 74 | if (e->store_status == STORE_PENDING) { |
75 | if (e->mem_obj->inmem_hi == 0) { | |
ec250dfd | 76 | assert(fwdState->err); |
77 | errorAppendEntry(e, fwdState->err); | |
2c450e4e | 78 | fwdState->err = NULL; |
b746bd8a | 79 | } else { |
8f10798d | 80 | EBIT_CLR(e->flags, ENTRY_FWD_HDR_WAIT); |
b746bd8a | 81 | storeComplete(e); |
8a4f6dd6 | 82 | storeReleaseRequest(e); |
1640c2df | 83 | } |
f563eea9 | 84 | } |
8a4f6dd6 | 85 | if (storePendingNClients(e) > 0) |
86 | assert(!EBIT_TEST(e->flags, ENTRY_FWD_HDR_WAIT)); | |
db1cd23c | 87 | fwdServersFree(&fwdState->servers); |
41462d93 | 88 | requestUnlink(fwdState->request); |
4ca83e82 | 89 | fwdState->request = NULL; |
2c450e4e | 90 | if (fwdState->err) |
91 | errorStateFree(fwdState->err); | |
f563eea9 | 92 | storeUnregisterAbort(e); |
93 | storeUnlockObject(e); | |
4ca83e82 | 94 | fwdState->entry = NULL; |
6801f8a8 | 95 | sfd = fwdState->server_fd; |
96 | if (sfd > -1) { | |
97 | comm_remove_close_handler(sfd, fwdServerClosed, fwdState); | |
98 | fwdState->server_fd = -1; | |
32b2931b | 99 | debug(17, 3) ("fwdStateFree: closing FD %d\n", sfd); |
6801f8a8 | 100 | comm_close(sfd); |
101 | } | |
41462d93 | 102 | cbdataFree(fwdState); |
103 | } | |
104 | ||
68bd6892 | 105 | static int |
106 | fwdCheckRetry(FwdState * fwdState) | |
107 | { | |
1640c2df | 108 | if (fwdState->entry->store_status != STORE_PENDING) |
109 | return 0; | |
68bd6892 | 110 | if (fwdState->entry->mem_obj->inmem_hi > 0) |
111 | return 0; | |
112 | if (fwdState->n_tries > 10) | |
113 | return 0; | |
efd900cb | 114 | if (squid_curtime - fwdState->start > Config.Timeout.connect) |
68bd6892 | 115 | return 0; |
ee08bdf5 | 116 | if (fwdState->flags.dont_retry) |
117 | return 0; | |
1f38f50a | 118 | if (fwdState->request->content_length >= 0) |
1d22e062 | 119 | if (0 == pumpRestart(fwdState->request)) |
120 | return 0; | |
68bd6892 | 121 | return 1; |
122 | } | |
123 | ||
910169e5 | 124 | static void |
125 | fwdServerClosed(int fd, void *data) | |
126 | { | |
4ca83e82 | 127 | FwdState *fwdState = data; |
ec250dfd | 128 | debug(17, 2) ("fwdServerClosed: FD %d %s\n", fd, storeUrl(fwdState->entry)); |
6801f8a8 | 129 | assert(fwdState->server_fd == fd); |
130 | fwdState->server_fd = -1; | |
68bd6892 | 131 | if (fwdCheckRetry(fwdState)) { |
32b2931b | 132 | debug(17, 3) ("fwdServerClosed: re-forwarding (%d tries, %d secs)\n", |
9dbf253d | 133 | fwdState->n_tries, |
134 | (int) (squid_curtime - fwdState->start)); | |
6b8e7481 | 135 | if (fwdState->servers->next) { |
eb406bb7 | 136 | /* use next, or cycle if origin server isn't last */ |
6b8e7481 | 137 | FwdServer *fs = fwdState->servers; |
eb406bb7 | 138 | FwdServer **T, *T2 = NULL; |
6b8e7481 | 139 | fwdState->servers = fs->next; |
a4b8110e | 140 | for (T = &fwdState->servers; *T; T2 = *T, T = &(*T)->next); |
141 | if (T2 && T2->peer) { | |
eb406bb7 | 142 | /* cycle */ |
143 | *T = fs; | |
144 | fs->next = NULL; | |
145 | } else { | |
146 | /* Use next. The last "direct" entry is retried multiple times */ | |
147 | fwdState->servers = fs->next; | |
148 | fwdServerFree(fs); | |
149 | } | |
6b8e7481 | 150 | } |
ee08bdf5 | 151 | /* use eventAdd to break potential call sequence loops */ |
f726e966 | 152 | eventAdd("fwdConnectStart", fwdConnectStart, fwdState, 0.0, 0); |
f563eea9 | 153 | } else { |
154 | fwdStateFree(fwdState); | |
155 | } | |
910169e5 | 156 | } |
157 | ||
41462d93 | 158 | static void |
159 | fwdConnectDone(int server_fd, int status, void *data) | |
160 | { | |
161 | FwdState *fwdState = data; | |
e07b2888 | 162 | static FwdState *current = NULL; |
db1cd23c | 163 | FwdServer *fs = fwdState->servers; |
41462d93 | 164 | ErrorState *err; |
db1cd23c | 165 | request_t *request = fwdState->request; |
e07b2888 | 166 | assert(current != fwdState); |
167 | current = fwdState; | |
6801f8a8 | 168 | assert(fwdState->server_fd == server_fd); |
41462d93 | 169 | if (status == COMM_ERR_DNS) { |
ee08bdf5 | 170 | fwdState->flags.dont_retry = 1; |
41462d93 | 171 | debug(17, 4) ("fwdConnectDone: Unknown host: %s\n", |
db1cd23c | 172 | request->host); |
41462d93 | 173 | err = errorCon(ERR_DNS_FAIL, HTTP_SERVICE_UNAVAILABLE); |
174 | err->dnsserver_msg = xstrdup(dns_error_message); | |
db1cd23c | 175 | err->request = requestLink(request); |
ec250dfd | 176 | fwdFail(fwdState, err); |
41462d93 | 177 | comm_close(server_fd); |
178 | } else if (status != COMM_OK) { | |
db1cd23c | 179 | assert(fs); |
41462d93 | 180 | err = errorCon(ERR_CONNECT_FAIL, HTTP_SERVICE_UNAVAILABLE); |
181 | err->xerrno = errno; | |
db1cd23c | 182 | if (fs->peer) { |
183 | err->host = xstrdup(fs->peer->host); | |
184 | err->port = fs->peer->http_port; | |
185 | } else { | |
186 | err->host = xstrdup(request->host); | |
187 | err->port = request->port; | |
188 | } | |
189 | err->request = requestLink(request); | |
ec250dfd | 190 | fwdFail(fwdState, err); |
db1cd23c | 191 | if (fs->peer) |
eb406bb7 | 192 | peerConnectFailed(fs->peer); |
41462d93 | 193 | comm_close(server_fd); |
194 | } else { | |
8a4f6dd6 | 195 | debug(17, 3) ("fwdConnectDone: FD %d: '%s'\n", server_fd, storeUrl(fwdState->entry)); |
890b0fa8 | 196 | if (fs->peer) |
197 | hierarchyNote(&fwdState->request->hier, fs->code, fs->peer->host); | |
198 | else if (Config.onoff.log_ip_on_direct) | |
199 | hierarchyNote(&fwdState->request->hier, fs->code, fd_table[server_fd].ipaddr); | |
200 | else | |
201 | hierarchyNote(&fwdState->request->hier, fs->code, request->host); | |
41462d93 | 202 | fd_note(server_fd, storeUrl(fwdState->entry)); |
203 | fd_table[server_fd].uses++; | |
eb406bb7 | 204 | if (fs->peer) |
205 | peerConnectSucceded(fs->peer); | |
6801f8a8 | 206 | fwdDispatch(fwdState); |
41462d93 | 207 | } |
e07b2888 | 208 | current = NULL; |
41462d93 | 209 | } |
210 | ||
211 | static void | |
212 | fwdConnectTimeout(int fd, void *data) | |
213 | { | |
214 | FwdState *fwdState = data; | |
215 | StoreEntry *entry = fwdState->entry; | |
216 | ErrorState *err; | |
ec250dfd | 217 | debug(17, 2) ("fwdConnectTimeout: FD %d: '%s'\n", fd, storeUrl(entry)); |
6801f8a8 | 218 | assert(fd == fwdState->server_fd); |
41462d93 | 219 | if (entry->mem_obj->inmem_hi == 0) { |
b5ea121c | 220 | err = errorCon(ERR_CONNECT_FAIL, HTTP_GATEWAY_TIMEOUT); |
41462d93 | 221 | err->request = requestLink(fwdState->request); |
ec250dfd | 222 | err->xerrno = ETIMEDOUT; |
223 | fwdFail(fwdState, err); | |
efd900cb | 224 | /* |
225 | * This marks the peer DOWN ... | |
226 | */ | |
227 | if (fwdState->servers) | |
228 | if (fwdState->servers->peer) | |
eb406bb7 | 229 | peerConnectFailed(fwdState->servers->peer); |
41462d93 | 230 | } |
231 | comm_close(fd); | |
232 | } | |
233 | ||
234 | static void | |
ee08bdf5 | 235 | fwdConnectStart(void *data) |
41462d93 | 236 | { |
8a4f6dd6 | 237 | FwdState *fwdState = data; |
41462d93 | 238 | const char *url = storeUrl(fwdState->entry); |
239 | int fd; | |
240 | ErrorState *err; | |
db1cd23c | 241 | FwdServer *fs = fwdState->servers; |
242 | const char *host; | |
243 | unsigned short port; | |
3f62decd | 244 | time_t ctimeout; |
db1cd23c | 245 | assert(fs); |
cddc721b | 246 | assert(fwdState->server_fd == -1); |
41462d93 | 247 | debug(17, 3) ("fwdConnectStart: %s\n", url); |
db1cd23c | 248 | if (fs->peer) { |
249 | host = fs->peer->host; | |
250 | port = fs->peer->http_port; | |
3f62decd | 251 | ctimeout = fs->peer->connect_timeout > 0 ? fs->peer->connect_timeout |
252 | : Config.Timeout.peer_connect; | |
13c7936a | 253 | } else if (fwdState->request->flags.accelerated && |
a4b8110e | 254 | Config.Accel.single_host && Config.Accel.host) { |
13c7936a | 255 | host = Config.Accel.host; |
256 | port = Config.Accel.port; | |
257 | ctimeout = Config.Timeout.connect; | |
db1cd23c | 258 | } else { |
259 | host = fwdState->request->host; | |
260 | port = fwdState->request->port; | |
3f62decd | 261 | ctimeout = Config.Timeout.connect; |
db1cd23c | 262 | } |
263 | if ((fd = pconnPop(host, port)) >= 0) { | |
41462d93 | 264 | debug(17, 3) ("fwdConnectStart: reusing pconn FD %d\n", fd); |
9dbf253d | 265 | fwdState->server_fd = fd; |
9977e14b | 266 | fwdState->n_tries++; |
910169e5 | 267 | comm_add_close_handler(fd, fwdServerClosed, fwdState); |
41462d93 | 268 | fwdConnectDone(fd, COMM_OK, fwdState); |
269 | return; | |
270 | } | |
bc87dc25 | 271 | #if URL_CHECKSUM_DEBUG |
272 | assert(fwdState->entry->mem_obj->chksum == url_checksum(url)); | |
273 | #endif | |
41462d93 | 274 | fd = comm_open(SOCK_STREAM, |
275 | 0, | |
276 | Config.Addrs.tcp_outgoing, | |
277 | 0, | |
278 | COMM_NONBLOCKING, | |
279 | url); | |
280 | if (fd < 0) { | |
281 | debug(50, 4) ("fwdConnectStart: %s\n", xstrerror()); | |
282 | err = errorCon(ERR_SOCKET_FAILURE, HTTP_INTERNAL_SERVER_ERROR); | |
283 | err->xerrno = errno; | |
284 | err->request = requestLink(fwdState->request); | |
ec250dfd | 285 | fwdFail(fwdState, err); |
910169e5 | 286 | fwdStateFree(fwdState); |
41462d93 | 287 | return; |
288 | } | |
6801f8a8 | 289 | fwdState->server_fd = fd; |
68bd6892 | 290 | fwdState->n_tries++; |
910169e5 | 291 | comm_add_close_handler(fd, fwdServerClosed, fwdState); |
41462d93 | 292 | commSetTimeout(fd, |
3f62decd | 293 | ctimeout, |
41462d93 | 294 | fwdConnectTimeout, |
295 | fwdState); | |
db1cd23c | 296 | commConnectStart(fd, host, port, fwdConnectDone, fwdState); |
41462d93 | 297 | } |
298 | ||
299 | static void | |
db1cd23c | 300 | fwdStartComplete(FwdServer * servers, void *data) |
41462d93 | 301 | { |
302 | FwdState *fwdState = data; | |
8a4f6dd6 | 303 | debug(17, 3) ("fwdStartComplete: %s\n", storeUrl(fwdState->entry)); |
db1cd23c | 304 | if (servers != NULL) { |
305 | fwdState->servers = servers; | |
306 | fwdConnectStart(fwdState); | |
41462d93 | 307 | } else { |
db1cd23c | 308 | fwdStartFail(fwdState); |
41462d93 | 309 | } |
41462d93 | 310 | } |
311 | ||
312 | static void | |
db1cd23c | 313 | fwdStartFail(FwdState * fwdState) |
41462d93 | 314 | { |
41462d93 | 315 | ErrorState *err; |
8a4f6dd6 | 316 | debug(17, 3) ("fwdStartFail: %s\n", storeUrl(fwdState->entry)); |
41462d93 | 317 | err = errorCon(ERR_CANNOT_FORWARD, HTTP_SERVICE_UNAVAILABLE); |
318 | err->request = requestLink(fwdState->request); | |
ec250dfd | 319 | err->xerrno = errno; |
320 | fwdFail(fwdState, err); | |
910169e5 | 321 | fwdStateFree(fwdState); |
41462d93 | 322 | } |
910169e5 | 323 | |
41462d93 | 324 | static void |
6801f8a8 | 325 | fwdDispatch(FwdState * fwdState) |
41462d93 | 326 | { |
327 | peer *p; | |
328 | request_t *request = fwdState->request; | |
329 | StoreEntry *entry = fwdState->entry; | |
1f38f50a | 330 | ErrorState *err; |
b746bd8a | 331 | debug(17, 3) ("fwdDispatch: FD %d: Fetching '%s %s'\n", |
910169e5 | 332 | fwdState->client_fd, |
41462d93 | 333 | RequestMethodStr[request->method], |
334 | storeUrl(entry)); | |
d46a87a8 | 335 | /*assert(!EBIT_TEST(entry->flags, ENTRY_DISPATCHED)); */ |
41462d93 | 336 | assert(entry->ping_status != PING_WAITING); |
4ca83e82 | 337 | assert(entry->lock_count); |
d46a87a8 | 338 | EBIT_SET(entry->flags, ENTRY_DISPATCHED); |
41462d93 | 339 | netdbPingSite(request->host); |
e0ebe27c | 340 | /* |
341 | * Assert that server_fd is set. This is to guarantee that fwdState | |
342 | * is attached to something and will be deallocated when server_fd | |
343 | * is closed. | |
344 | */ | |
345 | assert(fwdState->server_fd > -1); | |
41462d93 | 346 | if (fwdState->servers && (p = fwdState->servers->peer)) { |
347 | p->stats.fetches++; | |
1f38f50a | 348 | fwdState->request->peer_login = p->login; |
db1cd23c | 349 | httpStart(fwdState); |
41462d93 | 350 | } else { |
351 | switch (request->protocol) { | |
352 | case PROTO_HTTP: | |
db1cd23c | 353 | httpStart(fwdState); |
41462d93 | 354 | break; |
355 | case PROTO_GOPHER: | |
db1cd23c | 356 | gopherStart(fwdState); |
41462d93 | 357 | break; |
358 | case PROTO_FTP: | |
db1cd23c | 359 | ftpStart(fwdState); |
41462d93 | 360 | break; |
361 | case PROTO_WAIS: | |
db1cd23c | 362 | waisStart(fwdState); |
41462d93 | 363 | break; |
364 | case PROTO_CACHEOBJ: | |
e0ebe27c | 365 | case PROTO_INTERNAL: |
41462d93 | 366 | case PROTO_URN: |
ae0b4725 | 367 | fatal_dump("Should never get here"); |
41462d93 | 368 | break; |
369 | case PROTO_WHOIS: | |
db1cd23c | 370 | whoisStart(fwdState); |
41462d93 | 371 | break; |
41462d93 | 372 | default: |
ce45d320 | 373 | debug(17, 1) ("fwdDispatch: Cannot retrieve '%s'\n", |
374 | storeUrl(entry)); | |
1f38f50a | 375 | err = errorCon(ERR_UNSUP_REQ, HTTP_BAD_REQUEST); |
376 | err->request = requestLink(request); | |
377 | fwdFail(fwdState, err); | |
378 | /* | |
379 | * Force a persistent connection to be closed because | |
380 | * some Netscape browsers have a bug that sends CONNECT | |
381 | * requests as GET's over persistent connections. | |
382 | */ | |
383 | request->flags.proxy_keepalive = 0; | |
384 | /* | |
385 | * Set the dont_retry flag becuase this is not a | |
386 | * transient (network) error; its a bug. | |
387 | */ | |
388 | fwdState->flags.dont_retry = 1; | |
c68e9c6b | 389 | comm_close(fwdState->server_fd); |
ce45d320 | 390 | break; |
41462d93 | 391 | } |
392 | } | |
393 | } | |
394 | ||
db1cd23c | 395 | static int |
396 | fwdReforward(FwdState * fwdState) | |
397 | { | |
398 | StoreEntry *e = fwdState->entry; | |
399 | FwdServer *fs = fwdState->servers; | |
400 | http_status s; | |
401 | assert(e->store_status == STORE_PENDING); | |
402 | assert(e->mem_obj); | |
bc87dc25 | 403 | #if URL_CHECKSUM_DEBUG |
404 | assert(e->mem_obj->chksum == url_checksum(e->mem_obj->url)); | |
405 | #endif | |
b746bd8a | 406 | debug(17, 3) ("fwdReforward: %s?\n", storeUrl(e)); |
d6eb18d6 | 407 | if (!EBIT_TEST(e->flags, ENTRY_FWD_HDR_WAIT)) { |
408 | debug(17, 3) ("fwdReforward: No, ENTRY_FWD_HDR_WAIT isn't set\n"); | |
409 | return 0; | |
410 | } | |
db1cd23c | 411 | if (fwdState->n_tries > 9) |
412 | return 0; | |
1f38f50a | 413 | if (fwdState->request->content_length >= 0) |
d2946396 | 414 | if (0 == pumpRestart(fwdState->request)) |
415 | return 0; | |
db1cd23c | 416 | assert(fs); |
417 | fwdState->servers = fs->next; | |
418 | fwdServerFree(fs); | |
419 | if (fwdState->servers == NULL) { | |
420 | debug(17, 3) ("fwdReforward: No forward-servers left\n"); | |
421 | return 0; | |
422 | } | |
423 | s = e->mem_obj->reply->sline.status; | |
424 | debug(17, 3) ("fwdReforward: status %d\n", (int) s); | |
b6a2f15e | 425 | return fwdReforwardableStatus(s); |
db1cd23c | 426 | } |
427 | ||
41462d93 | 428 | /* PUBLIC FUNCTIONS */ |
429 | ||
64d8034e | 430 | void |
431 | fwdServersFree(FwdServer ** FS) | |
432 | { | |
433 | FwdServer *fs; | |
434 | while ((fs = *FS)) { | |
435 | *FS = fs->next; | |
436 | fwdServerFree(fs); | |
437 | } | |
438 | } | |
439 | ||
41462d93 | 440 | void |
7e3ce7b9 | 441 | fwdStart(int fd, StoreEntry * e, request_t * r) |
41462d93 | 442 | { |
443 | FwdState *fwdState; | |
d1061d2b | 444 | aclCheck_t ch; |
445 | int answer; | |
446 | ErrorState *err; | |
5843eb62 | 447 | /* |
db1cd23c | 448 | * client_addr == no_addr indicates this is an "internal" request |
5843eb62 | 449 | * from peer_digest.c, asn.c, netdb.c, etc and should always |
450 | * be allowed. yuck, I know. | |
d1061d2b | 451 | */ |
7e3ce7b9 | 452 | if (r->client_addr.s_addr != no_addr.s_addr) { |
5843eb62 | 453 | /* |
454 | * Check if this host is allowed to fetch MISSES from us (miss_access) | |
455 | */ | |
456 | memset(&ch, '\0', sizeof(aclCheck_t)); | |
7e3ce7b9 | 457 | ch.src_addr = r->client_addr; |
458 | ch.my_addr = r->my_addr; | |
459 | ch.my_port = r->my_port; | |
5843eb62 | 460 | ch.request = r; |
461 | answer = aclCheckFast(Config.accessList.miss, &ch); | |
462 | if (answer == 0) { | |
463 | err = errorCon(ERR_FORWARDING_DENIED, HTTP_FORBIDDEN); | |
464 | err->request = requestLink(r); | |
7e3ce7b9 | 465 | err->src_addr = r->client_addr; |
5843eb62 | 466 | errorAppendEntry(e, err); |
467 | return; | |
468 | } | |
d1061d2b | 469 | } |
7197b20d | 470 | debug(17, 3) ("fwdStart: '%s'\n", storeUrl(e)); |
471 | e->mem_obj->request = requestLink(r); | |
472 | e->mem_obj->fd = fd; | |
bc87dc25 | 473 | #if URL_CHECKSUM_DEBUG |
474 | assert(e->mem_obj->chksum == url_checksum(e->mem_obj->url)); | |
475 | #endif | |
05b744f3 | 476 | if (shutting_down) { |
477 | /* more yuck */ | |
478 | err = errorCon(ERR_SHUTTING_DOWN, HTTP_SERVICE_UNAVAILABLE); | |
479 | err->request = requestLink(r); | |
480 | errorAppendEntry(e, err); | |
481 | return; | |
482 | } | |
d1061d2b | 483 | switch (r->protocol) { |
0cdcddb9 | 484 | /* |
485 | * Note, don't create fwdState for these requests | |
486 | */ | |
e0ebe27c | 487 | case PROTO_INTERNAL: |
d1061d2b | 488 | internalStart(r, e); |
e0ebe27c | 489 | return; |
490 | case PROTO_CACHEOBJ: | |
d1061d2b | 491 | cachemgrStart(fd, r, e); |
e0ebe27c | 492 | return; |
ae0b4725 | 493 | case PROTO_URN: |
494 | urnStart(r, e); | |
495 | return; | |
e0ebe27c | 496 | default: |
497 | break; | |
498 | } | |
798b0889 | 499 | fwdState = memAllocate(MEM_FWD_STATE); |
db1cd23c | 500 | cbdataAdd(fwdState, memFree, MEM_FWD_STATE); |
d1061d2b | 501 | fwdState->entry = e; |
910169e5 | 502 | fwdState->client_fd = fd; |
6801f8a8 | 503 | fwdState->server_fd = -1; |
d1061d2b | 504 | fwdState->request = requestLink(r); |
f563eea9 | 505 | fwdState->start = squid_curtime; |
d1061d2b | 506 | storeLockObject(e); |
ec250dfd | 507 | EBIT_SET(e->flags, ENTRY_FWD_HDR_WAIT); |
7197b20d | 508 | storeRegisterAbort(e, fwdAbort, fwdState); |
db1cd23c | 509 | peerSelect(r, e, fwdStartComplete, fwdState); |
41462d93 | 510 | } |
511 | ||
41462d93 | 512 | int |
59715b38 | 513 | fwdCheckDeferRead(int fd, void *data) |
41462d93 | 514 | { |
515 | StoreEntry *e = data; | |
516 | MemObject *mem = e->mem_obj; | |
7e3ce7b9 | 517 | int rc = 0; |
41462d93 | 518 | if (mem == NULL) |
519 | return 0; | |
bc87dc25 | 520 | #if URL_CHECKSUM_DEBUG |
521 | assert(e->mem_obj->chksum == url_checksum(e->mem_obj->url)); | |
522 | #endif | |
447e176b | 523 | #if DELAY_POOLS |
1ecaa0a0 | 524 | if (fd < 0) |
525 | (void) 0; | |
526 | else if (delayIsNoDelay(fd)) | |
527 | (void) 0; | |
7e3ce7b9 | 528 | else { |
529 | int i = delayMostBytesWanted(mem, INT_MAX); | |
530 | if (0 == i) | |
531 | return 1; | |
532 | /* was: rc = -(rc != INT_MAX); */ | |
533 | else if (INT_MAX == i) | |
534 | rc = 0; | |
535 | else | |
536 | rc = -1; | |
537 | } | |
447e176b | 538 | #endif |
b6a2f15e | 539 | if (EBIT_TEST(e->flags, ENTRY_FWD_HDR_WAIT)) |
7e3ce7b9 | 540 | return rc; |
41462d93 | 541 | if (mem->inmem_hi - storeLowestMemReaderOffset(e) < READ_AHEAD_GAP) |
7e3ce7b9 | 542 | return rc; |
41462d93 | 543 | return 1; |
544 | } | |
910169e5 | 545 | |
546 | void | |
b8890359 | 547 | fwdFail(FwdState * fwdState, ErrorState * errorState) |
910169e5 | 548 | { |
d46a87a8 | 549 | assert(EBIT_TEST(fwdState->entry->flags, ENTRY_FWD_HDR_WAIT)); |
32b2931b | 550 | debug(17, 3) ("fwdFail: %s \"%s\"\n\t%s\n", |
ec250dfd | 551 | err_type_str[errorState->type], |
552 | httpStatusString(errorState->http_status), | |
4ca83e82 | 553 | storeUrl(fwdState->entry)); |
ec250dfd | 554 | if (fwdState->err) |
555 | errorStateFree(fwdState->err); | |
556 | fwdState->err = errorState; | |
910169e5 | 557 | } |
6801f8a8 | 558 | |
7197b20d | 559 | /* |
560 | * Called when someone else calls StoreAbort() on this entry | |
561 | */ | |
9bc73deb | 562 | static void |
7197b20d | 563 | fwdAbort(void *data) |
564 | { | |
565 | FwdState *fwdState = data; | |
ec250dfd | 566 | debug(17, 2) ("fwdAbort: %s\n", storeUrl(fwdState->entry)); |
7197b20d | 567 | fwdStateFree(fwdState); |
568 | } | |
569 | ||
0b49cd31 | 570 | /* |
571 | * Frees fwdState without closing FD or generating an abort | |
572 | */ | |
573 | void | |
9dbf253d | 574 | fwdUnregister(int fd, FwdState * fwdState) |
0b49cd31 | 575 | { |
9dbf253d | 576 | debug(17, 3) ("fwdUnregister: %s\n", storeUrl(fwdState->entry)); |
577 | assert(fd = fwdState->server_fd); | |
b7fe0ab0 | 578 | assert(fd > -1); |
9dbf253d | 579 | comm_remove_close_handler(fd, fwdServerClosed, fwdState); |
580 | fwdState->server_fd = -1; | |
0b49cd31 | 581 | } |
db1cd23c | 582 | |
583 | /* | |
584 | * server-side modules call fwdComplete() when they are done | |
585 | * downloading an object. Then, we either 1) re-forward the | |
586 | * request somewhere else if needed, or 2) call storeComplete() | |
587 | * to finish it off | |
588 | */ | |
589 | void | |
590 | fwdComplete(FwdState * fwdState) | |
591 | { | |
592 | StoreEntry *e = fwdState->entry; | |
593 | assert(e->store_status == STORE_PENDING); | |
8a28f65f | 594 | debug(17, 3) ("fwdComplete: %s\n\tstatus %d\n", storeUrl(e), |
db1cd23c | 595 | e->mem_obj->reply->sline.status); |
bc87dc25 | 596 | #if URL_CHECKSUM_DEBUG |
597 | assert(e->mem_obj->chksum == url_checksum(e->mem_obj->url)); | |
598 | #endif | |
9977e14b | 599 | fwdLogReplyStatus(fwdState->n_tries, e->mem_obj->reply->sline.status); |
d6eb18d6 | 600 | if (fwdReforward(fwdState)) { |
77b32a34 | 601 | debug(17, 3) ("fwdComplete: re-forwarding %d %s\n", |
0bdf2621 | 602 | e->mem_obj->reply->sline.status, |
603 | storeUrl(e)); | |
8a28f65f | 604 | if (fwdState->server_fd > -1) |
0bdf2621 | 605 | fwdUnregister(fwdState->server_fd, fwdState); |
db1cd23c | 606 | storeEntryReset(e); |
607 | fwdStartComplete(fwdState->servers, fwdState); | |
608 | } else { | |
d6eb18d6 | 609 | debug(17, 3) ("fwdComplete: not re-forwarding status %d\n", |
610 | e->mem_obj->reply->sline.status); | |
db1cd23c | 611 | EBIT_CLR(e->flags, ENTRY_FWD_HDR_WAIT); |
612 | storeComplete(e); | |
d6eb18d6 | 613 | /* |
614 | * If fwdState isn't associated with a server FD, it | |
615 | * won't get freed unless we do it here. | |
616 | */ | |
617 | if (fwdState->server_fd < 0) | |
618 | fwdStateFree(fwdState); | |
db1cd23c | 619 | } |
620 | } | |
8ddcc35d | 621 | |
622 | void | |
623 | fwdInit(void) | |
624 | { | |
9977e14b | 625 | cachemgrRegister("forward", |
626 | "Request Forwarding Statistics", | |
627 | fwdStats, 0, 1); | |
8ddcc35d | 628 | } |
629 | ||
630 | static void | |
631 | fwdLogReplyStatus(int tries, http_status status) | |
632 | { | |
633 | if (status > HTTP_INVALID_HEADER) | |
634 | return; | |
635 | assert(tries); | |
636 | tries--; | |
637 | if (tries > MAX_FWD_STATS_IDX) | |
638 | tries = MAX_FWD_STATS_IDX; | |
639 | FwdReplyCodes[tries][status]++; | |
640 | } | |
641 | ||
642 | static void | |
9977e14b | 643 | fwdStats(StoreEntry * s) |
8ddcc35d | 644 | { |
9977e14b | 645 | int i; |
646 | int j; | |
647 | storeAppendPrintf(s, "Status"); | |
648 | for (j = 0; j <= MAX_FWD_STATS_IDX; j++) { | |
649 | storeAppendPrintf(s, "\ttry#%d", j + 1); | |
650 | } | |
651 | storeAppendPrintf(s, "\n"); | |
652 | for (i = 0; i <= (int) HTTP_INVALID_HEADER; i++) { | |
653 | if (FwdReplyCodes[0][i] == 0) | |
654 | continue; | |
655 | storeAppendPrintf(s, "%3d", i); | |
656 | for (j = 0; j <= MAX_FWD_STATS_IDX; j++) { | |
657 | storeAppendPrintf(s, "\t%d", FwdReplyCodes[j][i]); | |
8ddcc35d | 658 | } |
9977e14b | 659 | storeAppendPrintf(s, "\n"); |
660 | } | |
8ddcc35d | 661 | } |
b6a2f15e | 662 | |
663 | int | |
664 | fwdReforwardableStatus(http_status s) | |
665 | { | |
666 | switch (s) { | |
667 | case HTTP_FORBIDDEN: | |
668 | case HTTP_INTERNAL_SERVER_ERROR: | |
669 | case HTTP_NOT_IMPLEMENTED: | |
670 | case HTTP_BAD_GATEWAY: | |
671 | case HTTP_SERVICE_UNAVAILABLE: | |
672 | case HTTP_GATEWAY_TIMEOUT: | |
673 | return 1; | |
674 | default: | |
675 | return 0; | |
676 | } | |
677 | /* NOTREACHED */ | |
678 | } |