fixed a bug of not parsing a chunked content in qse_htrd_t.

improved proxy handling
This commit is contained in:
hyung-hwan 2012-04-04 08:18:45 +00:00
parent 5a04c1beb9
commit 77721b0c94
9 changed files with 183 additions and 63 deletions

View File

@ -4,6 +4,7 @@ AUTOMAKE_OPTIONS = no-dependencies
EXTRA_DIST = \ EXTRA_DIST = \
main.doc \ main.doc \
mem.doc \ mem.doc \
cenc.doc \
io.doc \ io.doc \
awk.doc \ awk.doc \
sed.doc sed.doc

View File

@ -202,6 +202,7 @@ AUTOMAKE_OPTIONS = no-dependencies
EXTRA_DIST = \ EXTRA_DIST = \
main.doc \ main.doc \
mem.doc \ mem.doc \
cenc.doc \
io.doc \ io.doc \
awk.doc \ awk.doc \
sed.doc sed.doc

13
qse/doc/page/cenc.doc Normal file
View File

@ -0,0 +1,13 @@
/** @page cenc Character Encoding
@section cenc_overview Overview
The library contains functions and data types for handling different character
encodings. It uses the current system locale by default.
@section cenc_cmgr qse_cmgr_t
The #qse_cmgr_t type defines a simple callback interface for conversion between
a multi-byte character and a wide character.
*/

View File

@ -24,6 +24,7 @@ Chung, Hyung-Hwan <hyunghwan.chung@gmail.com>
See the subpages for various modules available in this library. See the subpages for various modules available in this library.
- @subpage mem "Memory Management" - @subpage mem "Memory Management"
- @subpage cenc "Character Encoding"
- @subpage io "I/O Handling" - @subpage io "I/O Handling"
- @subpage awk "AWK Interpreter" - @subpage awk "AWK Interpreter"
- @subpage cut "CUT Text Cutter" - @subpage cut "CUT Text Cutter"

View File

@ -185,9 +185,9 @@ qse_size_t qse_canonpath (const qse_char_t* path, qse_char_t* canon, int flags)
/* /*
* Eat up the previous segment if it exists. * Eat up the previous segment if it exists.
* *
* If it doesn't exist, tmp == dst so dst = tmp keeps dst * If it doesn't exist, tmp == dst so dst = tmp
* unchanged. If it exists, tmp != dst. so dst = tmp * keeps dst unchanged. If it exists,
* changes dst. * tmp != dst. so dst = tmp changes dst.
* *
* path /abc/def/.. * path /abc/def/..
* ^ ^ * ^ ^
@ -252,11 +252,12 @@ qse_size_t qse_canonpath (const qse_char_t* path, qse_char_t* canon, int flags)
* also delete it if QSE_CANONPATH_DROPTRAILINGSEP is set. * also delete it if QSE_CANONPATH_DROPTRAILINGSEP is set.
* *
* dst > non_root_start: * dst > non_root_start:
* there is at least 1 character after the root directory part. * there is at least 1 character after the root directory
* part.
* ISSEP(dst[-1]): * ISSEP(dst[-1]):
* the canonical path ends with a separator. * the canonical path ends with a separator.
* ISSEP(ptr[-1]): * ISSEP(ptr[-1]):
* the origial path ends with a separator * the origial path ends with a separator.
*/ */
dst[-1] = QSE_T('\0'); dst[-1] = QSE_T('\0');
canon_len = dst - canon - 1; canon_len = dst - canon - 1;
@ -297,7 +298,7 @@ qse_size_t qse_canonpath (const qse_char_t* path, qse_char_t* canon, int flags)
if (canon_len == adj_base_len) if (canon_len == adj_base_len)
{ {
/* i don't have to retains a trailing separator /* i don't have to retain a trailing separator
* if the last segment is double slashes because * if the last segment is double slashes because
* the double slahses indicate a directory obviously */ * the double slahses indicate a directory obviously */
if (canon[canon_len-3] == QSE_T('.') && if (canon[canon_len-3] == QSE_T('.') &&
@ -309,7 +310,6 @@ qse_size_t qse_canonpath (const qse_char_t* path, qse_char_t* canon, int flags)
} }
else if (canon_len > adj_base_len) else if (canon_len > adj_base_len)
{ {
if (ISSEP(canon[canon_len-4]) && if (ISSEP(canon[canon_len-4]) &&
canon[canon_len-3] == QSE_T('.') && canon[canon_len-3] == QSE_T('.') &&
canon[canon_len-2] == QSE_T('.') && canon[canon_len-2] == QSE_T('.') &&

View File

@ -879,7 +879,7 @@ static const qse_mchar_t* getchunklen (qse_htrd_t* htrd, const qse_mchar_t* ptr,
/* this function must be called in the GET_CHUNK_LEN context */ /* this function must be called in the GET_CHUNK_LEN context */
QSE_ASSERT (htrd->fed.s.chunk.phase == GET_CHUNK_LEN); QSE_ASSERT (htrd->fed.s.chunk.phase == GET_CHUNK_LEN);
/*qse_printf (QSE_T("CALLING getchunklen [%d]\n"), *ptr);*/ /*qse_printf (QSE_T("CALLING getchunklen [%hs]\n"), ptr);*/
if (htrd->fed.s.chunk.count <= 0) if (htrd->fed.s.chunk.count <= 0)
{ {
/* skip leading spaces if the first character of /* skip leading spaces if the first character of
@ -948,7 +948,7 @@ static const qse_mchar_t* get_trailing_headers (
while (ptr < end) while (ptr < end)
{ {
register qse_mchar_t b = *ptr++; register qse_mchar_t b = *ptr++;
/*qse_printf (QSE_T("[%hc], %d\n"), b, htrd->fed.s.crlf);*/
switch (b) switch (b)
{ {
case '\0': case '\0':
@ -1005,6 +1005,7 @@ static const qse_mchar_t* get_trailing_headers (
default: default:
/* mark that neither CR nor LF was seen */ /* mark that neither CR nor LF was seen */
htrd->fed.s.crlf = 0; htrd->fed.s.crlf = 0;
break;
} }
} }
@ -1159,6 +1160,14 @@ int qse_htrd_feed (qse_htrd_t* htrd, const qse_mchar_t* req, qse_size_t len)
} }
else if (htrd->fed.s.chunk.phase == GET_CHUNK_TRAILERS) else if (htrd->fed.s.chunk.phase == GET_CHUNK_TRAILERS)
{ {
/* this state is reached after the
* last chunk length 0 is read. The next
* empty line immediately completes
* a content body. so i need to adjust
* this crlf status to 2 as if a trailing
* header line has been read. */
htrd->fed.s.crlf = 2;
dechunk_get_trailers: dechunk_get_trailers:
ptr = get_trailing_headers (htrd, ptr, end); ptr = get_trailing_headers (htrd, ptr, end);
if (ptr == QSE_NULL) return -1; if (ptr == QSE_NULL) return -1;

View File

@ -1261,6 +1261,7 @@ struct task_cgi_t
int disconnect; int disconnect;
/* if true, the content of response is chunked */ /* if true, the content of response is chunked */
int chunk_res; int chunk_res;
/* if true, content_length is set. */ /* if true, content_length is set. */
int content_length_set; int content_length_set;
/* content-length that CGI returned */ /* content-length that CGI returned */
@ -1407,10 +1408,10 @@ static int cgi_htrd_peek_request (qse_htrd_t* htrd, qse_htre_t* req)
} }
else else
{ {
/* If CGI doesn't specify Content-Length, i can't /* If CGI doesn't specify Content-Length,
* honor cgi->keepalive in HTTP/1.0 or earlier. * i can't honor cgi->keepalive in HTTP/1.0
* Closing the connection is the only way to * or earlier. Closing the connection is the
* specify how long the content is */ * only way to specify the content length */
cgi->disconnect = 1; cgi->disconnect = 1;
} }
} }
@ -2101,6 +2102,8 @@ qse_printf (QSE_T("[cgi-3 send failure....\n"));
if (cgi->res_left <= 0) if (cgi->res_left <= 0)
{ {
qse_mbs_clear (cgi->res);
if (cgi->content_length_set && if (cgi->content_length_set &&
cgi->content_received >= cgi->content_length) cgi->content_received >= cgi->content_length)
{ {
@ -2438,10 +2441,11 @@ struct task_proxy_t
int expect_100; int expect_100;
/* if true, close connection after response is sent out */ #define PROXY_RES_DISCONNECT (1 << 0)
int disconnect; #define PROXY_RES_CHUNK (1 << 1)
/* if true, the content of response is chunked */ #define PROXY_RES_CHUNK_GOTALL (1 << 2)
int chunk_res; int res_status;
/* if true, content_length is set. */ /* if true, content_length is set. */
int content_length_set; int content_length_set;
/* content-length that CGI returned */ /* content-length that CGI returned */
@ -2457,9 +2461,10 @@ typedef struct proxy_htrd_xtn_t proxy_htrd_xtn_t;
struct proxy_htrd_xtn_t struct proxy_htrd_xtn_t
{ {
task_proxy_t* proxy; task_proxy_t* proxy;
qse_httpd_task_t* task;
}; };
static int proxy_snatch_content ( static int proxy_snatch_client_content (
qse_htre_t* req, const qse_mchar_t* ptr, qse_size_t len, void* ctx) qse_htre_t* req, const qse_mchar_t* ptr, qse_size_t len, void* ctx)
{ {
qse_httpd_task_t* task; qse_httpd_task_t* task;
@ -2516,6 +2521,71 @@ qse_printf (QSE_T("!!!PROXY SNATCHED [%.*hs]\n"), len, ptr);
return 0; return 0;
} }
static int proxy_snatch_peer_content (
qse_htre_t* req, const qse_mchar_t* ptr, qse_size_t len, void* ctx)
{
/* this is a content callback function called by the peer
* response reader (proxy->htrd). */
qse_httpd_task_t* task;
task_proxy_t* proxy;
task = (qse_httpd_task_t*)ctx;
proxy = (task_proxy_t*)task->ctx;
QSE_ASSERT (proxy->res_status & PROXY_RES_CHUNK);
if (ptr == QSE_NULL)
{
/* content completed */
qse_printf (QSE_T("PROXY GOT ALL RESPONSE>>>>>>>\n"));
if (proxy->res_status & PROXY_RES_CHUNK) /*TODO: remove this check */
{
qse_printf (QSE_T("ADDING CHUNK END>>>>>>>\n"));
if (qse_mbs_cat (proxy->res, QSE_MT("0\r\n\r\n")) == (qse_size_t)-1)
{
proxy->httpd->errnum = QSE_HTTPD_ENOMEM;
return -1;
}
}
proxy->res_status |= PROXY_RES_CHUNK_GOTALL;
}
else
{
/* append the peer response content to the response buffer */
if (proxy->res_status & PROXY_RES_CHUNK)
{
qse_mchar_t buf[64];
snprintf (buf, QSE_COUNTOF(buf), QSE_MT("%lX\r\n"), (unsigned long)len);
if (qse_mbs_cat (proxy->res, buf) == (qse_size_t)-1)
{
proxy->httpd->errnum = QSE_HTTPD_ENOMEM;
return -1;
}
}
if (qse_mbs_ncat (proxy->res, ptr, len) == (qse_size_t)-1)
{
proxy->httpd->errnum = QSE_HTTPD_ENOMEM;
return -1;
}
if (proxy->res_status & PROXY_RES_CHUNK)
{
if (qse_mbs_cat (proxy->res, QSE_MT("\r\n")) == (qse_size_t)-1)
{
proxy->httpd->errnum = QSE_HTTPD_ENOMEM;
return -1;
}
}
}
proxy->res_pending = QSE_MBS_LEN(proxy->res) - proxy->res_consumed;
return 0;
}
static int add_header_to_proxy_resbuf (qse_htre_t* req, const qse_mchar_t* key, const qse_mchar_t* val, void* ctx) static int add_header_to_proxy_resbuf (qse_htre_t* req, const qse_mchar_t* key, const qse_mchar_t* val, void* ctx)
{ {
task_proxy_t* proxy = (task_proxy_t*)ctx; task_proxy_t* proxy = (task_proxy_t*)ctx;
@ -2572,25 +2642,23 @@ qse_printf (QSE_T("NORMAL REPLY 222222222222222222222 NORMAL REPLY\n"));
} }
else else
{ {
/* TODO: how to handle chunked response??? XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXxxx */ /* no Content-Length returned by the peer. */
/* no Content-Length returned by CGI. */ if (qse_comparehttpversions (&proxy->version, &http_v11) >= 0)
if (qse_comparehttpversions (&proxy->version, &http_v11) >= 0 &&
req->attr.chunked)
{ {
proxy->chunk_res = 1; proxy->res_status |= PROXY_RES_CHUNK;
} }
else else
{ {
/* If CGI doesn't specify Content-Length, i can't /* If the peer doesn't specify Content-Length,
* honor cgi->keepalive in HTTP/1.0 or earlier. * i can't honor proxy->keepalive in HTTP/1.0
* Closing the connection is the only way to * or earlier. Closing the connection is the
* specify how long the content is */ * only way to specify the content length */
proxy->disconnect = 1; proxy->res_status |= PROXY_RES_DISCONNECT;
} }
} }
/* begin headers */ /* begin headers */
if (proxy->chunk_res && if (proxy->res_status & PROXY_RES_CHUNK &&
qse_mbs_cat (proxy->res, QSE_MT("Transfer-Encoding: chunked\r\n")) == (qse_size_t)-1) qse_mbs_cat (proxy->res, QSE_MT("Transfer-Encoding: chunked\r\n")) == (qse_size_t)-1)
{ {
proxy->httpd->errnum = QSE_HTTPD_ENOMEM; proxy->httpd->errnum = QSE_HTTPD_ENOMEM;
@ -2617,7 +2685,7 @@ qse_printf (QSE_T("PROXY SCRIPT FUCKED - RETURNING TOO MUCH...\n"));
/* the initial part of the content body has been received /* the initial part of the content body has been received
* along with the header. it need to be added to the result * along with the header. it need to be added to the result
* buffer. */ * buffer. */
if (proxy->chunk_res) if (proxy->res_status & PROXY_RES_CHUNK)
{ {
qse_mchar_t buf[64]; qse_mchar_t buf[64];
snprintf (buf, QSE_COUNTOF(buf), QSE_MT("%lX\r\n"), (unsigned long)proxy->content_received); snprintf (buf, QSE_COUNTOF(buf), QSE_MT("%lX\r\n"), (unsigned long)proxy->content_received);
@ -2634,7 +2702,7 @@ qse_printf (QSE_T("PROXY SCRIPT FUCKED - RETURNING TOO MUCH...\n"));
return -1; return -1;
} }
if (proxy->chunk_res) if (proxy->res_status & PROXY_RES_CHUNK)
{ {
if (qse_mbs_ncat (proxy->res, QSE_MT("\r\n"), 2) == (qse_size_t)-1) if (qse_mbs_ncat (proxy->res, QSE_MT("\r\n"), 2) == (qse_size_t)-1)
{ {
@ -2643,6 +2711,12 @@ qse_printf (QSE_T("PROXY SCRIPT FUCKED - RETURNING TOO MUCH...\n"));
} }
} }
} }
if (proxy->res_status & PROXY_RES_CHUNK)
{
/* arrange to store further contents received to proxy->res */
qse_htre_setconcb (req, proxy_snatch_peer_content, xtn->task);
}
} }
proxy->res_pending = QSE_MBS_LEN(proxy->res) - proxy->res_consumed; proxy->res_pending = QSE_MBS_LEN(proxy->res) - proxy->res_consumed;
@ -2651,15 +2725,7 @@ qse_printf (QSE_T("PROXY SCRIPT FUCKED - RETURNING TOO MUCH...\n"));
static int proxy_htrd_handle_request (qse_htrd_t* htrd, qse_htre_t* req) static int proxy_htrd_handle_request (qse_htrd_t* htrd, qse_htre_t* req)
{ {
proxy_htrd_xtn_t* xtn = (proxy_htrd_xtn_t*) qse_htrd_getxtn (htrd); qse_printf (QSE_T("FINISHED READING REQUEST...\n"));
task_proxy_t* proxy = xtn->proxy;
if (proxy->expect_100 == 0 || proxy->expect_100 == -2)
{
qse_printf (QSE_T("SETTIG HTRD TO PEEK ONLY >>>>>>>>>>>>>>>>>>>>>>>>.\n"));
qse_htrd_setoption (htrd, qse_htrd_getoption(htrd) | QSE_HTRD_PEEKONLY);
}
return 0; return 0;
} }
@ -2724,7 +2790,7 @@ qse_printf (QSE_T("PROXY FORWARD: @@@@@@@@WRITE TO PROXY FAILED\n"));
{ {
qse_htre_discardcontent (proxy->req); qse_htre_discardcontent (proxy->req);
/* NOTE: proxy->req may be set to QSE_NULL /* NOTE: proxy->req may be set to QSE_NULL
* in proxy_snatch_content() triggered by * in proxy_snatch_client_content() triggered by
* qse_htre_discardcontent() */ * qse_htre_discardcontent() */
} }
} }
@ -2866,7 +2932,7 @@ len = 1024;
* is fed to the htrd reader. qse_htre_addcontent() that * is fed to the htrd reader. qse_htre_addcontent() that
* htrd calls invokes this callback. */ * htrd calls invokes this callback. */
proxy->req = arg->req; proxy->req = arg->req;
qse_htre_setconcb (proxy->req, proxy_snatch_content, task); qse_htre_setconcb (proxy->req, proxy_snatch_client_content, task);
QSE_ASSERT (arg->req->attr.content_length_set); QSE_ASSERT (arg->req->attr.content_length_set);
content_length = arg->req->attr.content_length; content_length = arg->req->attr.content_length;
@ -2955,11 +3021,11 @@ qse_printf (QSE_T("task_main_proxy_5\n"));
(proxy->reqfwdbuf && QSE_MBS_LEN(proxy->reqfwdbuf) > 0))? 1: 0; (proxy->reqfwdbuf && QSE_MBS_LEN(proxy->reqfwdbuf) > 0))? 1: 0;
} }
static int task_main_proxy_4 ( static int task_main_proxy_4 (
qse_httpd_t* httpd, qse_httpd_client_t* client, qse_httpd_task_t* task) qse_httpd_t* httpd, qse_httpd_client_t* client, qse_httpd_task_t* task)
{ {
task_proxy_t* proxy = (task_proxy_t*)task->ctx; task_proxy_t* proxy = (task_proxy_t*)task->ctx;
qse_ssize_t n;
//QSE_ASSERT (proxy->pio_inited); //QSE_ASSERT (proxy->pio_inited);
@ -2978,6 +3044,8 @@ qse_printf (QSE_T("task_main_proxy_4 trigger[0].mask=%d trigger[1].mask=%d trigg
qse_printf (QSE_T("task_main_proxy_4 about to read from PEER...\n")); qse_printf (QSE_T("task_main_proxy_4 about to read from PEER...\n"));
if (task->trigger[0].mask & QSE_HTTPD_TASK_TRIGGER_READABLE) if (task->trigger[0].mask & QSE_HTTPD_TASK_TRIGGER_READABLE)
{ {
qse_ssize_t n;
if (proxy->buflen < QSE_SIZEOF(proxy->buf)) if (proxy->buflen < QSE_SIZEOF(proxy->buf))
{ {
qse_printf (QSE_T("task_main_proxy_4 reading from PEER... %d %d\n"), (int)proxy->content_length, (int)proxy->content_received); qse_printf (QSE_T("task_main_proxy_4 reading from PEER... %d %d\n"), (int)proxy->content_length, (int)proxy->content_received);
@ -3090,12 +3158,15 @@ qse_printf (QSE_T("[proxy-3 send failure....\n"));
proxy->res_consumed += n; proxy->res_consumed += n;
proxy->res_pending -= n; proxy->res_pending -= n;
/* TODO: compact buffer */
} }
if (proxy->res_pending <= 0) if (proxy->res_pending <= 0)
{ {
if (proxy->content_length_set && qse_mbs_clear (proxy->res);
proxy->content_received >= proxy->content_length)
if ((proxy->res_status & PROXY_RES_CHUNK_GOTALL) ||
(proxy->content_length_set && proxy->content_received >= proxy->content_length))
{ {
task->main = task_main_proxy_5; task->main = task_main_proxy_5;
task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE; task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE;
@ -3143,7 +3214,7 @@ static int task_main_proxy_2 (
qse_ssize_t n; qse_ssize_t n;
qse_size_t count; qse_size_t count;
QSE_ASSERT (proxy->expect_100 == -2); QSE_ASSERT (proxy->expect_100 == -2 || (proxy->res_status & PROXY_RES_CHUNK));
count = proxy->res_pending; count = proxy->res_pending;
if (count > MAX_SEND_SIZE) count = MAX_SEND_SIZE; if (count > MAX_SEND_SIZE) count = MAX_SEND_SIZE;
@ -3164,6 +3235,8 @@ qse_printf (QSE_T("[proxy-2 send failure....\n"));
proxy->res_consumed += n; proxy->res_consumed += n;
proxy->res_pending -= n; proxy->res_pending -= n;
/* TODO: compact buffer */
if (proxy->res_pending <= 0) if (proxy->res_pending <= 0)
{ {
/* '100 Continue' and payload received together /* '100 Continue' and payload received together
@ -3187,7 +3260,6 @@ qse_printf (QSE_T("[proxy-2 send failure....\n"));
); );
if (n <= -1) if (n <= -1)
{ {
/* can't return internal server error any more... */
/* TODO: logging ... */ /* TODO: logging ... */
goto oops; goto oops;
} }
@ -3195,6 +3267,13 @@ qse_printf (QSE_T("[proxy-2 send failure....\n"));
{ {
/* end of output from peer before it has seen a header. /* end of output from peer before it has seen a header.
* the proxy script must be crooked. */ * the proxy script must be crooked. */
if (proxy->res_status & PROXY_RES_CHUNK_GOTALL)
{
task->main = task_main_proxy_3;
task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE;
return 1;
}
/* TODO: logging */ /* TODO: logging */
qse_printf (QSE_T("#####PREMATURE EOF FROM PEER\n")); qse_printf (QSE_T("#####PREMATURE EOF FROM PEER\n"));
goto oops; goto oops;
@ -3202,6 +3281,12 @@ qse_printf (QSE_T("#####PREMATURE EOF FROM PEER\n"));
proxy->buflen += n; proxy->buflen += n;
if (proxy->res_status & PROXY_RES_CHUNK_GOTALL)
{
qse_printf (QSE_T("#####PROXY RETURNING TOO MUCH\n"));
return -1;
}
qse_printf (QSE_T("#####PROXY FEEDING [%.*hs]\n"), (int)proxy->buflen, proxy->buf); qse_printf (QSE_T("#####PROXY FEEDING [%.*hs]\n"), (int)proxy->buflen, proxy->buf);
if (qse_htrd_feed (proxy->htrd, proxy->buf, proxy->buflen) <= -1) if (qse_htrd_feed (proxy->htrd, proxy->buf, proxy->buflen) <= -1)
{ {
@ -3229,7 +3314,14 @@ qse_printf (QSE_T("proxy->expect_100 %d\n"), proxy->expect_100);
* the actual reply. so i can switch to the * the actual reply. so i can switch to the
* next phase */ * next phase */
if (proxy->disconnect && if (proxy->res_status & PROXY_RES_CHUNK)
{
task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE;
return 1;
}
else
{
if ((proxy->res_status & PROXY_RES_DISCONNECT) &&
qse_httpd_entaskdisconnect (httpd, client, task) == QSE_NULL) qse_httpd_entaskdisconnect (httpd, client, task) == QSE_NULL)
{ {
goto oops; goto oops;
@ -3239,9 +3331,9 @@ qse_printf (QSE_T("TRAILING DATA=[%hs]\n"), &QSE_MBS_CHAR(proxy->res,proxy->res_
/* switch to the next phase */ /* switch to the next phase */
task->main = task_main_proxy_3; task->main = task_main_proxy_3;
task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE; task->trigger[2].mask |= QSE_HTTPD_TASK_TRIGGER_WRITE;
return 1; return 1;
} }
}
else if (proxy->expect_100 == 0) else if (proxy->expect_100 == 0)
{ {
/* if it's set to 0, it's seen '100 Continue' /* if it's set to 0, it's seen '100 Continue'
@ -3259,6 +3351,7 @@ qse_printf (QSE_T("TRAILING DATA=[%hs]\n"), &QSE_MBS_CHAR(proxy->res,proxy->res_
return 1; return 1;
oops: oops:
/* TODO: if it's before sending anything i can send 500 otherwise just return -1; */
return (entask_error (httpd, client, task, 500, &proxy->version, proxy->keepalive) == QSE_NULL)? -1: 0; return (entask_error (httpd, client, task, 500, &proxy->version, proxy->keepalive) == QSE_NULL)? -1: 0;
} }
@ -3312,16 +3405,14 @@ static int task_main_proxy (
if (proxy->init_failed) goto oops; if (proxy->init_failed) goto oops;
/* set up a http reader to read a response from the peer */
proxy->htrd = qse_htrd_open (httpd->mmgr, QSE_SIZEOF(proxy_htrd_xtn_t)); proxy->htrd = qse_htrd_open (httpd->mmgr, QSE_SIZEOF(proxy_htrd_xtn_t));
if (proxy->htrd == QSE_NULL) goto oops; if (proxy->htrd == QSE_NULL) goto oops;
xtn = (proxy_htrd_xtn_t*) qse_htrd_getxtn (proxy->htrd); xtn = (proxy_htrd_xtn_t*) qse_htrd_getxtn (proxy->htrd);
xtn->proxy = proxy; xtn->proxy = proxy;
xtn->task = task;
qse_htrd_setrecbs (proxy->htrd, &proxy_htrd_cbs); qse_htrd_setrecbs (proxy->htrd, &proxy_htrd_cbs);
if (proxy->expect_100 == 1)
qse_htrd_setoption (proxy->htrd, QSE_HTRD_RESPONSE); qse_htrd_setoption (proxy->htrd, QSE_HTRD_RESPONSE);
else
qse_htrd_setoption (proxy->htrd, QSE_HTRD_PEEKONLY | QSE_HTRD_RESPONSE);
proxy->res = qse_mbs_open (httpd->mmgr, 0, 256); proxy->res = qse_mbs_open (httpd->mmgr, 0, 256);
if (proxy->res == QSE_NULL) goto oops; if (proxy->res == QSE_NULL) goto oops;

View File

@ -322,7 +322,7 @@ static void free_client (
qse_htrd_close (client->htrd); qse_htrd_close (client->htrd);
qse_fprintf (QSE_STDERR, QSE_T("Debug: closing socket %d\n"), client->handle.i); qse_printf (QSE_T("Debug: CLOSING SOCKET %d\n"), client->handle.i);
if (client->status & CLIENT_HANDLE_IN_MUX) if (client->status & CLIENT_HANDLE_IN_MUX)
{ {
@ -940,6 +940,7 @@ static int perform_client_task (
else else
{ {
/* locate an active client to the tail of the client list */ /* locate an active client to the tail of the client list */
qse_gettime (&client->last_active); /* TODO: error check??? */ qse_gettime (&client->last_active); /* TODO: error check??? */
move_client_to_tail (httpd, client); move_client_to_tail (httpd, client);

View File

@ -605,6 +605,7 @@ static int mux_addhnd (
ev.data.ptr = mev; ev.data.ptr = mev;
qse_printf (QSE_T("MUX ADDING %d\n"), (int)handle.i);
if (epoll_ctl (mux->fd, EPOLL_CTL_ADD, handle.i, &ev) <= -1) if (epoll_ctl (mux->fd, EPOLL_CTL_ADD, handle.i, &ev) <= -1)
{ {
/* don't rollback ee.ptr */ /* don't rollback ee.ptr */
@ -626,6 +627,7 @@ static int mux_delhnd (qse_httpd_t* httpd, void* vmux, qse_ubi_t handle)
return -1; return -1;
} }
qse_printf (QSE_T("MUX DELETING %d\n"), (int)handle.i);
mux->ee.len--; mux->ee.len--;
return 0; return 0;
} }
@ -658,6 +660,7 @@ static int mux_poll (qse_httpd_t* httpd, void* vmux, qse_ntime_t timeout)
if (mev->reqmask & QSE_HTTPD_MUX_WRITE) mask |= QSE_HTTPD_MUX_WRITE; if (mev->reqmask & QSE_HTTPD_MUX_WRITE) mask |= QSE_HTTPD_MUX_WRITE;
} }
qse_printf (QSE_T("MUX EXEC %d\n"), (int)mev->handle.i);
mev->cbfun (httpd, mux, mev->handle, mask, mev->cbarg); mev->cbfun (httpd, mux, mev->handle, mask, mev->cbarg);
} }
return 0; return 0;
@ -1216,7 +1219,7 @@ qse_printf (QSE_T("Host not included....\n"));
{ {
qse_nwad_t nwad; qse_nwad_t nwad;
//qse_strtonwad (QSE_T("192.168.1.55:9000"), &nwad); //qse_strtonwad (QSE_T("192.168.1.55:9000"), &nwad);
qse_strtonwad (QSE_T("192.168.1.3:80"), &nwad); qse_strtonwad (QSE_T("1.234.53.142:80"), &nwad);
task = qse_httpd_entaskproxy (httpd, client, QSE_NULL, &nwad, req); task = qse_httpd_entaskproxy (httpd, client, QSE_NULL, &nwad, req);
if (task == QSE_NULL) goto oops; if (task == QSE_NULL) goto oops;
} }