2002-12-15 14:25:09 +08:00
|
|
|
|
2004-09-28 16:34:51 +08:00
|
|
|
/*
|
2004-09-30 00:00:49 +08:00
|
|
|
* Copyright (C) Igor Sysoev
|
2004-09-28 16:34:51 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2002-12-15 14:25:09 +08:00
|
|
|
#include <ngx_config.h>
|
2003-06-03 23:42:58 +08:00
|
|
|
#include <ngx_core.h>
|
2002-12-15 14:25:09 +08:00
|
|
|
|
|
|
|
|
2004-11-11 22:07:14 +08:00
|
|
|
/*
|
|
|
|
* ngx_sock_ntop() and ngx_inet_ntop() may be implemented as
|
2005-11-26 18:11:11 +08:00
|
|
|
* "ngx_sprintf(text, "%ud.%ud.%ud.%ud", p[0], p[1], p[2], p[3])", however,
|
|
|
|
* they had been implemented long before the ngx_sprintf() had appeared
|
2004-11-11 22:07:14 +08:00
|
|
|
* and they are faster by 1.5-2.5 times, so it is worth to keep them.
|
|
|
|
*
|
|
|
|
* By the way, the implementation using ngx_sprintf() is faster by 2.5-3 times
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
* than using FreeBSD libc's snprintf().
|
2004-11-11 22:07:14 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2006-04-07 22:08:04 +08:00
|
|
|
static ngx_inline size_t
|
|
|
|
ngx_sprint_uchar(u_char *text, u_char c, size_t len)
|
2004-03-16 21:35:20 +08:00
|
|
|
{
|
|
|
|
size_t n;
|
|
|
|
ngx_uint_t c1, c2;
|
|
|
|
|
|
|
|
n = 0;
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
c1 = c / 100;
|
|
|
|
|
|
|
|
if (c1) {
|
|
|
|
*text++ = (u_char) (c1 + '0');
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
c2 = (c % 100) / 10;
|
|
|
|
|
|
|
|
if (c1 || c2) {
|
|
|
|
*text++ = (u_char) (c2 + '0');
|
|
|
|
n++;
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
c2 = c % 10;
|
|
|
|
|
|
|
|
*text++ = (u_char) (c2 + '0');
|
|
|
|
n++;
|
|
|
|
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2003-01-30 15:28:09 +08:00
|
|
|
/* AF_INET only */
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
size_t
|
|
|
|
ngx_sock_ntop(int family, struct sockaddr *sa, u_char *text, size_t len)
|
2003-01-30 15:28:09 +08:00
|
|
|
{
|
2004-03-16 15:10:12 +08:00
|
|
|
u_char *p;
|
2004-03-16 21:35:20 +08:00
|
|
|
size_t n;
|
|
|
|
ngx_uint_t i;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
struct sockaddr_in *sin;
|
2003-01-30 15:28:09 +08:00
|
|
|
|
2004-03-16 21:35:20 +08:00
|
|
|
if (len == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-01-30 15:28:09 +08:00
|
|
|
if (family != AF_INET) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
sin = (struct sockaddr_in *) sa;
|
|
|
|
p = (u_char *) &sin->sin_addr;
|
2004-03-16 15:10:12 +08:00
|
|
|
|
2004-03-16 21:35:20 +08:00
|
|
|
if (len > INET_ADDRSTRLEN) {
|
|
|
|
len = INET_ADDRSTRLEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
n = ngx_sprint_uchar(text, p[0], len);
|
|
|
|
|
|
|
|
i = 1;
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (len == n) {
|
|
|
|
text[n - 1] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
text[n++] = '.';
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
text[n - 1] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
n += ngx_sprint_uchar(&text[n], p[i++], len - n);
|
|
|
|
|
|
|
|
} while (i < 4);
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
text[n] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
text[n] = '\0';
|
|
|
|
|
|
|
|
return n;
|
2003-01-30 15:28:09 +08:00
|
|
|
}
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
size_t
|
|
|
|
ngx_inet_ntop(int family, void *addr, u_char *text, size_t len)
|
2002-12-15 14:25:09 +08:00
|
|
|
{
|
2004-03-16 21:35:20 +08:00
|
|
|
u_char *p;
|
|
|
|
size_t n;
|
|
|
|
ngx_uint_t i;
|
|
|
|
|
|
|
|
if (len == 0) {
|
|
|
|
return 0;
|
|
|
|
}
|
|
|
|
|
2003-01-30 15:28:09 +08:00
|
|
|
if (family != AF_INET) {
|
2002-12-15 14:25:09 +08:00
|
|
|
return 0;
|
2003-01-30 15:28:09 +08:00
|
|
|
}
|
2002-12-15 14:25:09 +08:00
|
|
|
|
2004-03-16 21:35:20 +08:00
|
|
|
p = (u_char *) addr;
|
|
|
|
|
|
|
|
if (len > INET_ADDRSTRLEN) {
|
|
|
|
len = INET_ADDRSTRLEN;
|
|
|
|
}
|
|
|
|
|
|
|
|
n = ngx_sprint_uchar(text, p[0], len);
|
|
|
|
|
|
|
|
i = 1;
|
|
|
|
|
|
|
|
do {
|
|
|
|
if (len == n) {
|
|
|
|
text[n - 1] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
text[n++] = '.';
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
text[n - 1] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
n += ngx_sprint_uchar(&text[n], p[i++], len - n);
|
|
|
|
|
|
|
|
} while (i < 4);
|
|
|
|
|
|
|
|
if (len == n) {
|
|
|
|
text[n] = '\0';
|
|
|
|
return n;
|
|
|
|
}
|
|
|
|
|
|
|
|
text[n] = '\0';
|
|
|
|
|
|
|
|
return n;
|
2002-12-15 14:25:09 +08:00
|
|
|
}
|
2004-05-25 23:28:46 +08:00
|
|
|
|
|
|
|
|
|
|
|
/* AF_INET only */
|
|
|
|
|
nginx-0.1.29-RELEASE import
*) Feature: the ngx_http_ssi_module supports "include virtual" command.
*) Feature: the ngx_http_ssi_module supports the condition command like
'if expr="$NAME"' and "else" and "endif" commands. Only one nested
level is supported.
*) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and
DATE_GMT variables and "config timefmt" command.
*) Feature: the "ssi_ignore_recycled_buffers" directive.
*) Bugfix: the "echo" command did not show the default value for the
empty QUERY_STRING variable.
*) Change: the ngx_http_proxy_module was rewritten.
*) Feature: the "proxy_redirect", "proxy_pass_request_headers",
"proxy_pass_request_body", and "proxy_method" directives.
*) Feature: the "proxy_set_header" directive. The "proxy_x_var" was
canceled and must be replaced with the proxy_set_header directive.
*) Change: the "proxy_preserve_host" is canceled and must be replaced
with the "proxy_set_header Host $host" and the "proxy_redirect off"
directives, the "proxy_set_header Host $host:$proxy_port" directive
and the appropriate proxy_redirect directives.
*) Change: the "proxy_set_x_real_ip" is canceled and must be replaced
with the "proxy_set_header X-Real-IP $remote_addr" directive.
*) Change: the "proxy_add_x_forwarded_for" is canceled and must be
replaced with
the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for"
directive.
*) Change: the "proxy_set_x_url" is canceled and must be replaced with
the "proxy_set_header X-URL http://$host:$server_port$request_uri"
directive.
*) Feature: the "fastcgi_param" directive.
*) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params"
directive are canceled and must be replaced with the fastcgi_param
directives.
*) Feature: the "index" directive can use the variables.
*) Feature: the "index" directive can be used at http and server levels.
*) Change: the last index only in the "index" directive can be absolute.
*) Feature: the "rewrite" directive can use the variables.
*) Feature: the "internal" directive.
*) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR,
SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME,
REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables.
*) Change: nginx now passes the invalid lines in a client request
headers or a backend response header.
*) Bugfix: if the backend did not transfer response for a long time and
the "send_timeout" was less than "proxy_read_timeout", then nginx
returned the 408 response.
*) Bugfix: the segmentation fault was occurred if the backend sent an
invalid line in response header; the bug had appeared in 0.1.26.
*) Bugfix: the segmentation fault may occurred in FastCGI fault
tolerance configuration.
*) Bugfix: the "expires" directive did not remove the previous
"Expires" and "Cache-Control" headers.
*) Bugfix: nginx did not take into account trailing dot in "Host"
header line.
*) Bugfix: the ngx_http_auth_module did not work under Linux.
*) Bugfix: the rewrite directive worked incorrectly, if the arguments
were in a request.
*) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_ptocidr(ngx_str_t *text, void *cidr)
|
2004-05-25 23:28:46 +08:00
|
|
|
{
|
2004-06-25 00:07:04 +08:00
|
|
|
ngx_int_t m;
|
2004-05-25 23:28:46 +08:00
|
|
|
ngx_uint_t i;
|
|
|
|
ngx_inet_cidr_t *in_cidr;
|
|
|
|
|
|
|
|
in_cidr = cidr;
|
|
|
|
|
|
|
|
for (i = 0; i < text->len; i++) {
|
|
|
|
if (text->data[i] == '/') {
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (i == text->len) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
text->data[i] = '\0';
|
|
|
|
in_cidr->addr = inet_addr((char *) text->data);
|
|
|
|
text->data[i] = '/';
|
|
|
|
if (in_cidr->addr == INADDR_NONE) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2004-06-25 00:07:04 +08:00
|
|
|
m = ngx_atoi(&text->data[i + 1], text->len - (i + 1));
|
|
|
|
if (m == NGX_ERROR) {
|
2004-05-25 23:28:46 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2004-06-25 00:07:04 +08:00
|
|
|
if (m == 0) {
|
|
|
|
|
|
|
|
/* the x86 compilers use the shl instruction that shifts by modulo 32 */
|
|
|
|
|
|
|
|
in_cidr->mask = 0;
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
2004-07-31 01:05:14 +08:00
|
|
|
in_cidr->mask = htonl((ngx_uint_t) (0 - (1 << (32 - m))));
|
2004-06-25 00:07:04 +08:00
|
|
|
|
2007-08-10 21:13:28 +08:00
|
|
|
if (in_cidr->addr == (in_cidr->addr & in_cidr->mask)) {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
in_cidr->addr &= in_cidr->mask;
|
|
|
|
|
|
|
|
return NGX_DONE;
|
2004-05-25 23:28:46 +08:00
|
|
|
}
|
2004-09-14 23:55:24 +08:00
|
|
|
|
|
|
|
|
2006-05-23 22:54:58 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_parse_url(ngx_conf_t *cf, ngx_url_t *u)
|
|
|
|
{
|
2006-12-13 00:46:16 +08:00
|
|
|
u_char *p, *host, *port_start;
|
|
|
|
size_t len, port_len;
|
2006-05-23 22:54:58 +08:00
|
|
|
ngx_int_t port;
|
|
|
|
ngx_uint_t i;
|
2006-10-24 21:06:55 +08:00
|
|
|
struct hostent *h;
|
2006-05-23 22:54:58 +08:00
|
|
|
#if (NGX_HAVE_UNIX_DOMAIN)
|
|
|
|
struct sockaddr_un *saun;
|
|
|
|
#endif
|
|
|
|
|
|
|
|
len = u->url.len;
|
|
|
|
p = u->url.data;
|
|
|
|
|
2007-02-15 02:51:19 +08:00
|
|
|
if (ngx_strncasecmp(p, (u_char *) "unix:", 5) == 0) {
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
#if (NGX_HAVE_UNIX_DOMAIN)
|
|
|
|
|
|
|
|
p += 5;
|
|
|
|
len -= 5;
|
|
|
|
|
2006-09-24 22:45:37 +08:00
|
|
|
u->uri.len = len;
|
|
|
|
u->uri.data = p;
|
|
|
|
|
2006-05-23 22:54:58 +08:00
|
|
|
if (u->uri_part) {
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
|
|
|
|
if (p[i] == ':') {
|
|
|
|
len = i;
|
|
|
|
|
|
|
|
u->uri.len -= len + 1;
|
|
|
|
u->uri.data += len + 1;
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len == 0) {
|
|
|
|
u->err = "no path in the unix domain socket";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (len + 1 > sizeof(saun->sun_path)) {
|
|
|
|
u->err = "too long path in the unix domain socket";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs = ngx_pcalloc(cf->pool, sizeof(ngx_peer_addr_t));
|
|
|
|
if (u->addrs == NULL) {
|
2006-05-23 22:54:58 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
saun = ngx_pcalloc(cf->pool, sizeof(struct sockaddr_un));
|
|
|
|
if (saun == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->naddrs = 1;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
saun->sun_family = AF_UNIX;
|
|
|
|
(void) ngx_cpystrn((u_char *) saun->sun_path, p, len + 1);
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs[0].sockaddr = (struct sockaddr *) saun;
|
|
|
|
u->addrs[0].socklen = sizeof(struct sockaddr_un);
|
|
|
|
u->addrs[0].name.len = len + 5;
|
|
|
|
u->addrs[0].name.data = u->url.data;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-06 23:39:08 +08:00
|
|
|
u->host.len = len;
|
|
|
|
u->host.data = p;
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->unix_socket = 1;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
|
|
|
|
#else
|
|
|
|
u->err = "the unix domain sockets are not supported on this platform";
|
|
|
|
|
|
|
|
return NGX_ERROR;
|
|
|
|
|
|
|
|
#endif
|
|
|
|
}
|
|
|
|
|
|
|
|
if ((p[0] == ':' || p[0] == '/') && !u->listen) {
|
|
|
|
u->err = "invalid host";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
u->host.data = p;
|
2006-12-13 00:46:16 +08:00
|
|
|
|
|
|
|
port_start = NULL;
|
|
|
|
port_len = 0;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
for (i = 0; i < len; i++) {
|
|
|
|
|
|
|
|
if (p[i] == ':') {
|
2006-12-13 00:46:16 +08:00
|
|
|
port_start = &p[i + 1];
|
2006-05-23 22:54:58 +08:00
|
|
|
u->host.len = i;
|
|
|
|
|
|
|
|
if (!u->uri_part) {
|
2006-12-13 00:46:16 +08:00
|
|
|
port_len = len - (i + 1);
|
2006-05-23 22:54:58 +08:00
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p[i] == '/') {
|
|
|
|
u->uri.len = len - i;
|
|
|
|
u->uri.data = &p[i];
|
|
|
|
|
|
|
|
if (u->host.len == 0) {
|
|
|
|
u->host.len = i;
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (port_start == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
u->no_port = 1;
|
|
|
|
goto no_port;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
port_len = &p[i] - port_start;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (port_len == 0) {
|
2006-05-23 22:54:58 +08:00
|
|
|
u->err = "invalid port";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
break;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (port_start) {
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (port_len == 0) {
|
|
|
|
port_len = &p[i] - port_start;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (port_len == 0) {
|
2006-05-23 22:54:58 +08:00
|
|
|
u->err = "invalid port";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
port = ngx_atoi(port_start, port_len);
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
if (port == NGX_ERROR || port < 1 || port > 65536) {
|
|
|
|
u->err = "invalid port";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
port = ngx_atoi(p, len);
|
|
|
|
|
|
|
|
if (port == NGX_ERROR) {
|
|
|
|
u->host.len = len;
|
2006-12-05 00:46:13 +08:00
|
|
|
u->no_port = 1;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
goto no_port;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
u->wildcard = 1;
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->port = (in_port_t) port;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
no_port:
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
if (u->listen) {
|
2006-12-05 00:46:13 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (u->port == 0) {
|
|
|
|
if (u->default_port == 0) {
|
2006-10-24 21:06:55 +08:00
|
|
|
u->err = "no port";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->port = u->default_port;
|
2006-10-24 21:06:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
if (u->host.len == 1 && u->host.data[0] == '*') {
|
|
|
|
u->host.len = 0;
|
|
|
|
}
|
|
|
|
|
|
|
|
/* AF_INET only */
|
|
|
|
|
|
|
|
if (u->host.len) {
|
|
|
|
|
|
|
|
host = ngx_palloc(cf->temp_pool, u->host.len + 1);
|
|
|
|
if (host == NULL) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
(void) ngx_cpystrn(host, u->host.data, u->host.len + 1);
|
|
|
|
|
|
|
|
u->addr.in_addr = inet_addr((const char *) host);
|
|
|
|
|
|
|
|
if (u->addr.in_addr == INADDR_NONE) {
|
|
|
|
h = gethostbyname((const char *) host);
|
|
|
|
|
|
|
|
if (h == NULL || h->h_addr_list[0] == NULL) {
|
|
|
|
u->err = "host not found";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->addr.in_addr = *(in_addr_t *) (h->h_addr_list[0]);
|
2006-10-24 21:06:55 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
u->addr.in_addr = INADDR_ANY;
|
|
|
|
}
|
|
|
|
|
2006-05-23 22:54:58 +08:00
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (u->host.len == 0) {
|
|
|
|
u->err = "no host";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
if (u->no_resolve) {
|
|
|
|
return NGX_OK;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
if (u->no_port) {
|
|
|
|
u->port = u->default_port;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (u->port == 0) {
|
|
|
|
u->err = "no port";
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
if (ngx_inet_resolve_host(cf, u) != NGX_OK) {
|
2006-05-23 22:54:58 +08:00
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
ngx_int_t
|
|
|
|
ngx_inet_resolve_host(ngx_conf_t *cf, ngx_url_t *u)
|
2006-05-23 22:54:58 +08:00
|
|
|
{
|
2006-12-13 00:46:16 +08:00
|
|
|
u_char *p, *host;
|
2006-05-23 22:54:58 +08:00
|
|
|
size_t len;
|
|
|
|
in_addr_t in_addr;
|
|
|
|
ngx_uint_t i;
|
|
|
|
struct hostent *h;
|
|
|
|
struct sockaddr_in *sin;
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
host = ngx_palloc(cf->temp_pool, u->host.len + 1);
|
2006-05-23 22:54:58 +08:00
|
|
|
if (host == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
(void) ngx_cpystrn(host, u->host.data, u->host.len + 1);
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
/* AF_INET only */
|
|
|
|
|
|
|
|
in_addr = inet_addr((char *) host);
|
|
|
|
|
|
|
|
if (in_addr == INADDR_NONE) {
|
|
|
|
h = gethostbyname((char *) host);
|
|
|
|
|
|
|
|
if (h == NULL || h->h_addr_list[0] == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
u->err = "host not found";
|
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
if (u->one_addr == 0) {
|
|
|
|
for (i = 0; h->h_addr_list[i] != NULL; i++) { /* void */ }
|
|
|
|
|
|
|
|
} else {
|
|
|
|
i = 1;
|
|
|
|
}
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
/* MP: ngx_shared_palloc() */
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs = ngx_pcalloc(cf->pool, i * sizeof(ngx_peer_addr_t));
|
|
|
|
if (u->addrs == NULL) {
|
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->naddrs = i;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
for (i = 0; h->h_addr_list[i] != NULL; i++) {
|
|
|
|
|
|
|
|
sin = ngx_pcalloc(cf->pool, sizeof(struct sockaddr_in));
|
|
|
|
if (sin == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
sin->sin_family = AF_INET;
|
2006-12-13 00:46:16 +08:00
|
|
|
sin->sin_port = htons(u->port);
|
2006-05-23 22:54:58 +08:00
|
|
|
sin->sin_addr.s_addr = *(in_addr_t *) (h->h_addr_list[i]);
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs[i].sockaddr = (struct sockaddr *) sin;
|
|
|
|
u->addrs[i].socklen = sizeof(struct sockaddr_in);
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
len = INET_ADDRSTRLEN - 1 + 1 + sizeof(":65536") - 1;
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
p = ngx_palloc(cf->pool, len);
|
|
|
|
if (p == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
len = ngx_sock_ntop(AF_INET, (struct sockaddr *) sin, p, len);
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->addrs[i].name.len = ngx_sprintf(&p[len], ":%d", u->port) - p;
|
|
|
|
u->addrs[i].name.data = p;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
} else {
|
|
|
|
|
|
|
|
/* MP: ngx_shared_palloc() */
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs = ngx_pcalloc(cf->pool, sizeof(ngx_peer_addr_t));
|
|
|
|
if (u->addrs == NULL) {
|
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
sin = ngx_pcalloc(cf->pool, sizeof(struct sockaddr_in));
|
|
|
|
if (sin == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->naddrs = 1;
|
2006-05-23 22:54:58 +08:00
|
|
|
|
|
|
|
sin->sin_family = AF_INET;
|
2006-12-13 00:46:16 +08:00
|
|
|
sin->sin_port = htons(u->port);
|
2006-05-23 22:54:58 +08:00
|
|
|
sin->sin_addr.s_addr = in_addr;
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
u->addrs[0].sockaddr = (struct sockaddr *) sin;
|
|
|
|
u->addrs[0].socklen = sizeof(struct sockaddr_in);
|
2006-05-23 22:54:58 +08:00
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
p = ngx_palloc(cf->pool, u->host.len + sizeof(":65536") - 1);
|
|
|
|
if (p == NULL) {
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_ERROR;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-13 00:46:16 +08:00
|
|
|
u->addrs[0].name.len = ngx_sprintf(p, "%V:%d", &u->host, u->port) - p;
|
|
|
|
u->addrs[0].name.data = p;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|
|
|
|
|
2006-12-05 00:46:13 +08:00
|
|
|
return NGX_OK;
|
2006-05-23 22:54:58 +08:00
|
|
|
}
|