2004-09-08 13:18:51 +08:00
|
|
|
|
2004-09-28 16:34:51 +08:00
|
|
|
/*
|
2004-09-30 00:00:49 +08:00
|
|
|
* Copyright (C) Igor Sysoev
|
2004-09-28 16:34:51 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
#include <ngx_config.h>
|
|
|
|
#include <ngx_core.h>
|
|
|
|
#include <ngx_event.h>
|
2004-09-09 23:40:48 +08:00
|
|
|
#include <ngx_event_connect.h>
|
2004-09-08 13:18:51 +08:00
|
|
|
#include <ngx_imap.h>
|
|
|
|
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
static void ngx_imap_proxy_block_read(ngx_event_t *rev);
|
2004-09-12 04:22:11 +08:00
|
|
|
static void ngx_imap_proxy_auth_handler(ngx_event_t *rev);
|
2004-09-09 23:40:48 +08:00
|
|
|
static void ngx_imap_proxy_dummy_handler(ngx_event_t *ev);
|
|
|
|
static ngx_int_t ngx_imap_proxy_read_response(ngx_imap_session_t *s);
|
|
|
|
static void ngx_imap_proxy_handler(ngx_event_t *ev);
|
2004-09-08 13:18:51 +08:00
|
|
|
static void ngx_imap_proxy_close_session(ngx_imap_session_t *s);
|
|
|
|
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
void ngx_imap_proxy_init(ngx_imap_session_t *s)
|
2004-09-08 13:18:51 +08:00
|
|
|
{
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_peers_t *peers;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
struct sockaddr_in *sin;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_proxy_ctx_t *p;
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
p = ngx_pcalloc(s->connection->pool, sizeof(ngx_imap_proxy_ctx_t));
|
|
|
|
if (p == NULL) {
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->proxy = p;
|
|
|
|
|
|
|
|
/**/
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
peers = ngx_pcalloc(s->connection->pool, sizeof(ngx_peers_t));
|
|
|
|
if (peers == NULL) {
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->upstream.peers = peers;
|
|
|
|
p->upstream.log = s->connection->log;
|
|
|
|
p->upstream.log_error = NGX_ERROR_ERR;
|
|
|
|
|
2005-03-19 20:38:37 +08:00
|
|
|
sin = ngx_pcalloc(s->connection->pool, sizeof(struct sockaddr_in));
|
|
|
|
if (sin == NULL) {
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
peers->peer[0].sockaddr = (struct sockaddr *) sin;
|
|
|
|
peers->peer[0].socklen = sizeof(struct sockaddr_in);
|
|
|
|
|
|
|
|
sin->sin_port = htons(110);
|
|
|
|
#if 1
|
|
|
|
sin->sin_addr.s_addr = inet_addr("81.19.64.101");
|
|
|
|
peers->peer[0].name.len = sizeof("81.19.64.101:110") - 1;
|
|
|
|
peers->peer[0].name.data = (u_char *) "81.19.64.101:110";
|
2004-09-14 00:18:09 +08:00
|
|
|
#else
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
sin->sin_addr.s_addr = inet_addr("81.19.69.70");
|
|
|
|
peers->peer[0].name.len = sizeof("81.19.69.70:110") - 1;
|
|
|
|
peers->peer[0].name.data = (u_char *) "81.19.69.70:110";
|
2004-09-14 00:18:09 +08:00
|
|
|
#endif
|
2004-09-09 23:40:48 +08:00
|
|
|
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
peers->number = 1;
|
|
|
|
|
|
|
|
peers->peer[0].max_fails = 1;
|
|
|
|
peers->peer[0].fail_timeout = 60;
|
|
|
|
peers->peer[0].weight = 1;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
rc = ngx_event_connect_peer(&p->upstream);
|
|
|
|
|
|
|
|
if (rc == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->upstream.connection->data = s;
|
|
|
|
p->upstream.connection->pool = s->connection->pool;
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
s->connection->read->handler = ngx_imap_proxy_block_read;
|
|
|
|
p->upstream.connection->read->handler = ngx_imap_proxy_auth_handler;
|
|
|
|
p->upstream.connection->write->handler = ngx_imap_proxy_dummy_handler;
|
2004-09-09 23:40:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_block_read(ngx_event_t *rev)
|
|
|
|
{
|
|
|
|
ngx_connection_t *c;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy block read");
|
|
|
|
|
|
|
|
if (ngx_handle_read_event(rev, 0) == NGX_ERROR) {
|
|
|
|
c = rev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
static void ngx_imap_proxy_auth_handler(ngx_event_t *rev)
|
2004-09-09 23:40:48 +08:00
|
|
|
{
|
2004-09-12 04:22:11 +08:00
|
|
|
u_char *p;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_int_t rc;
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_str_t line;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_connection_t *c;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy auth handler");
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
c = rev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (rev->timedout) {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT, "client timed out");
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
if (s->proxy->buffer == NULL) {
|
|
|
|
s->proxy->buffer = ngx_create_temp_buf(c->pool, /* STUB */ 4096);
|
|
|
|
if (s->proxy->buffer == NULL) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = ngx_imap_proxy_read_response(s);
|
|
|
|
|
|
|
|
if (rc == NGX_AGAIN) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
if (rc == NGX_ERROR) {
|
|
|
|
/* TODO: ngx_imap_proxy_finalize_session(s, NGX_IMAP_INTERNAL_ERROR) */
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s->imap_state == ngx_pop3_start) {
|
2004-09-09 23:40:48 +08:00
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy send user");
|
2004-09-09 23:40:48 +08:00
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
line.len = sizeof("USER ") + s->login.len - 1 + 2;
|
2005-03-19 20:38:37 +08:00
|
|
|
line.data = ngx_palloc(c->pool, line.len);
|
|
|
|
if (line.data == NULL) {
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
p = ngx_cpymem(line.data, "USER ", sizeof("USER ") - 1);
|
|
|
|
p = ngx_cpymem(p, s->login.data, s->login.len);
|
2005-03-19 20:38:37 +08:00
|
|
|
*p++ = CR; *p = LF;
|
2004-09-12 04:22:11 +08:00
|
|
|
|
|
|
|
if (ngx_send(c, line.data, line.len) < (ssize_t) line.len) {
|
|
|
|
/*
|
|
|
|
* we treat the incomplete sending as NGX_ERROR
|
|
|
|
* because it is very strange here
|
|
|
|
*/
|
|
|
|
ngx_imap_close_connection(c);
|
|
|
|
return;
|
2004-09-09 23:40:48 +08:00
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
s->imap_state = ngx_pop3_user;
|
|
|
|
|
|
|
|
s->proxy->buffer->pos = s->proxy->buffer->start;
|
|
|
|
s->proxy->buffer->last = s->proxy->buffer->start;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy send pass");
|
|
|
|
|
|
|
|
line.len = sizeof("PASS ") + s->passwd.len - 1 + 2;
|
2005-03-19 20:38:37 +08:00
|
|
|
line.data = ngx_palloc(c->pool, line.len);
|
|
|
|
if (line.data == NULL) {
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = ngx_cpymem(line.data, "PASS ", sizeof("PASS ") - 1);
|
|
|
|
p = ngx_cpymem(p, s->passwd.data, s->passwd.len);
|
2005-03-19 20:38:37 +08:00
|
|
|
*p++ = CR; *p = LF;
|
2004-09-12 04:22:11 +08:00
|
|
|
|
|
|
|
if (ngx_send(c, line.data, line.len) < (ssize_t) line.len) {
|
|
|
|
/*
|
|
|
|
* we treat the incomplete sending as NGX_ERROR
|
|
|
|
* because it is very strange here
|
|
|
|
*/
|
|
|
|
ngx_imap_close_connection(c);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->proxy->buffer->pos = s->proxy->buffer->start;
|
|
|
|
s->proxy->buffer->last = s->proxy->buffer->start;
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
s->connection->read->handler = ngx_imap_proxy_handler;
|
|
|
|
s->connection->write->handler = ngx_imap_proxy_handler;
|
|
|
|
rev->handler = ngx_imap_proxy_handler;
|
|
|
|
c->write->handler = ngx_imap_proxy_handler;
|
2004-09-09 23:40:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_dummy_handler(ngx_event_t *ev)
|
|
|
|
{
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, ev->log, 0, "imap proxy dummy handler");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t ngx_imap_proxy_read_response(ngx_imap_session_t *s)
|
|
|
|
{
|
|
|
|
u_char *p;
|
|
|
|
ssize_t n;
|
|
|
|
ngx_buf_t *b;
|
|
|
|
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
|
|
|
|
n = ngx_recv(s->proxy->upstream.connection, b->last, b->end - b->last);
|
|
|
|
|
|
|
|
if (n == NGX_ERROR || n == 0) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n == NGX_AGAIN) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
b->last += n;
|
|
|
|
|
|
|
|
if (b->last - b->pos < 5) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*(b->last - 2) != CR || *(b->last - 1) != LF) {
|
|
|
|
if (b->last == b->end) {
|
|
|
|
*(b->last - 1) = '\0';
|
|
|
|
ngx_log_error(NGX_LOG_ERR, s->connection->log, 0,
|
|
|
|
"upstream sent too long response line: \"%s\"",
|
|
|
|
b->pos);
|
|
|
|
return NGX_IMAP_PROXY_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = b->pos;
|
|
|
|
|
|
|
|
if (p[0] == '+' && p[1] == 'O' && p[2] == 'K') {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p[0] == '-' && p[1] == 'E' && p[2] == 'R' && p[3] == 'R') {
|
|
|
|
return NGX_IMAP_PROXY_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
*(b->last - 2) = '\0';
|
|
|
|
ngx_log_error(NGX_LOG_ERR, s->connection->log, 0,
|
|
|
|
"upstream sent invalid greeting line: \"%s\"", p);
|
|
|
|
|
|
|
|
return NGX_IMAP_PROXY_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_handler(ngx_event_t *ev)
|
|
|
|
{
|
|
|
|
size_t size;
|
2004-09-08 13:18:51 +08:00
|
|
|
ssize_t n;
|
|
|
|
ngx_buf_t *b;
|
2004-09-14 00:18:09 +08:00
|
|
|
ngx_uint_t again, do_write;
|
2004-09-08 13:18:51 +08:00
|
|
|
ngx_connection_t *c, *src, *dst;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
|
|
|
c = ev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->timedout) {
|
|
|
|
if (c == s->connection) {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT,
|
|
|
|
"client timed out");
|
|
|
|
} else {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT,
|
|
|
|
"upstream timed out");
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
if (c == s->connection) {
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->write) {
|
|
|
|
src = s->proxy->upstream.connection;
|
|
|
|
dst = c;
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
src = c;
|
|
|
|
dst = s->proxy->upstream.connection;
|
|
|
|
b = s->buffer;
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
} else {
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->write) {
|
|
|
|
src = s->connection;
|
|
|
|
dst = c;
|
|
|
|
b = s->buffer;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
src = c;
|
|
|
|
dst = s->connection;
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
do_write = ev->write ? 1 : 0;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_log_debug3(NGX_LOG_DEBUG_IMAP, ev->log, 0,
|
|
|
|
"imap proxy handler: %d, #%d > #%d",
|
|
|
|
do_write, src->fd, dst->fd);
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
do {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 0;
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (do_write == 1) {
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
size = b->last - b->pos;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (size && dst->write->ready) {
|
2004-09-09 23:40:48 +08:00
|
|
|
n = ngx_send(dst, b->pos, size);
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (n == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n > 0) {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 1;
|
2004-09-08 13:18:51 +08:00
|
|
|
b->pos += n;
|
|
|
|
|
|
|
|
if (b->pos == b->last) {
|
|
|
|
b->pos = b->start;
|
|
|
|
b->last = b->start;
|
|
|
|
}
|
|
|
|
}
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
if (n == NGX_AGAIN || n < (ssize_t) size) {
|
2004-10-11 23:07:03 +08:00
|
|
|
if (ngx_handle_write_event(dst->write, /* TODO: LOWAT */ 0)
|
2004-09-09 23:40:48 +08:00
|
|
|
== NGX_ERROR)
|
|
|
|
{
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
size = b->end - b->last;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (size && src->read->ready) {
|
2004-09-09 23:40:48 +08:00
|
|
|
n = ngx_recv(src, b->last, size);
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (n == NGX_ERROR || n == 0) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n > 0) {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 1;
|
2004-09-08 13:18:51 +08:00
|
|
|
do_write = 1;
|
|
|
|
b->last += n;
|
|
|
|
}
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
if (n == NGX_AGAIN || n < (ssize_t) size) {
|
|
|
|
if (ngx_handle_read_event(src->read, 0) == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
} while (again);
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_close_session(ngx_imap_session_t *s)
|
|
|
|
{
|
2004-09-09 23:40:48 +08:00
|
|
|
if (ngx_close_socket(s->proxy->upstream.connection->fd) == -1) {
|
|
|
|
ngx_log_error(NGX_LOG_ALERT, s->connection->log, ngx_socket_errno,
|
|
|
|
ngx_close_socket_n " failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_imap_close_connection(s->connection);
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|