if (conn->last_ioloop != NULL && conn->last_ioloop != current_ioloop) {
conn->last_ioloop = current_ioloop;
- /* Active ioloop is different from what we saw earlier;
- we may have missed a disconnection event on this connection.
- Verify status by reading from connection. */
+ /* Active ioloop is different from what we saw earlier; we may
+ have missed a disconnection event on this connection. Verify
+ status by reading from connection. */
if (i_stream_read(conn->conn.input) == -1) {
int stream_errno = conn->conn.input->stream_errno;
i_assert(conn->conn.input->stream_errno != 0 ||
conn->conn.input->eof);
- http_client_connection_lost(&conn,
- t_strdup_printf("read(%s) failed: %s",
- i_stream_get_name(conn->conn.input),
- stream_errno != 0 ?
- i_stream_get_error(conn->conn.input) :
- "EOF"));
+ http_client_connection_lost(
+ &conn,
+ t_strdup_printf(
+ "read(%s) failed: %s",
+ i_stream_get_name(conn->conn.input),
+ (stream_errno != 0 ?
+ i_stream_get_error(conn->conn.input) :
+ "EOF")));
return -1;
}
case CONNECTION_DISCONNECT_CONN_CLOSED:
if (conn->connect_failed) {
i_assert(!array_is_created(&conn->request_wait_list) ||
- array_count(&conn->request_wait_list) == 0);
+ array_count(&conn->request_wait_list) == 0);
break;
}
http_client_connection_lost(
if (retrying) {
/* Retrying, don't destroy the request */
if (response->payload != NULL) {
- i_stream_remove_destroy_callback(conn->incoming_payload,
- http_client_payload_destroyed);
+ i_stream_remove_destroy_callback(
+ conn->incoming_payload,
+ http_client_payload_destroyed);
i_stream_unref(&conn->incoming_payload);
connection_input_resume(&conn->conn);
}
string_t *str = t_str_new(128);
for (unsigned int i = 0; req->event_headers[i] != NULL; i++) {
const char *hdr_name = req->event_headers[i];
- const char *value = http_response_header_get(response, hdr_name);
+ const char *value =
+ http_response_header_get(response, hdr_name);
if (value == NULL)
continue;
_conn->last_input = ioloop_time;
if (conn->ssl_iostream != NULL &&
- !ssl_iostream_is_handshaked(conn->ssl_iostream)) {
+ !ssl_iostream_is_handshaked(conn->ssl_iostream)) {
/* Finish SSL negotiation by reading from input stream */
while ((ret = i_stream_read(conn->conn.input)) > 0 ||
ret == -2) {
http_response_parser_get_last_offset(conn->http_parser);
i_assert(req->response_offset != UOFF_T_MAX);
i_assert(req->response_offset < conn->conn.input->v_offset);
- req->bytes_in = conn->conn.input->v_offset - req->response_offset;
+ req->bytes_in = conn->conn.input->v_offset -
+ req->response_offset;
/* Got some response; cancel response timeout */
timeout_remove(&conn->to_response);
if (ret <= 0 &&
(conn->conn.input->eof || conn->conn.input->stream_errno != 0)) {
int stream_errno = conn->conn.input->stream_errno;
+
http_client_connection_lost(
&conn,
t_strdup_printf("read(%s) failed: %s",
/* Start protocol I/O */
conn->http_parser = http_response_parser_init(
- conn->conn.input, &set->response_hdr_limits, 0);
+ conn->conn.input, &set->response_hdr_limits, 0);
o_stream_set_finish_via_child(conn->conn.output, FALSE);
o_stream_set_flush_callback(conn->conn.output,
http_client_connection_output, conn);
i_assert(ssl_ctx != NULL);
ssl_set = *set->ssl;
- if (!set->ssl->allow_invalid_cert) {
+ if (!set->ssl->allow_invalid_cert)
ssl_set.verbose_invalid_cert = TRUE;
- }
e_debug(conn->event, "Starting SSL handshake");