nginx/src/core/ngx_inet.c

628 lines
12 KiB
C
Raw Normal View History

2002-12-15 14:25:09 +08:00
/*
* Copyright (C) Igor Sysoev
*/
2002-12-15 14:25:09 +08:00
#include <ngx_config.h>
2003-06-03 23:42:58 +08:00
#include <ngx_core.h>
2002-12-15 14:25:09 +08:00
2008-01-04 19:54:55 +08:00
static size_t ngx_sprint_uchar(u_char *text, u_char c, size_t len);
2007-11-24 00:59:24 +08:00
/* AF_INET only */
in_addr_t
ngx_inet_addr(u_char *text, size_t len)
{
u_char *p, c;
in_addr_t addr;
ngx_uint_t octet, n;
addr = 0;
octet = 0;
n = 0;
for (p = text; p < text + len; p++) {
c = *p;
if (c >= '0' && c <= '9') {
octet = octet * 10 + (c - '0');
continue;
}
if (c == '.' && octet < 256) {
addr = (addr << 8) + octet;
octet = 0;
n++;
continue;
}
return INADDR_NONE;
}
if (n != 3) {
return INADDR_NONE;
}
if (octet < 256) {
addr = (addr << 8) + octet;
return htonl(addr);
}
return INADDR_NONE;
}
/*
* ngx_sock_ntop() and ngx_inet_ntop() may be implemented as
* "ngx_sprintf(text, "%ud.%ud.%ud.%ud", p[0], p[1], p[2], p[3])", however,
* they had been implemented long before the ngx_sprintf() had appeared
* and they are faster by 1.5-2.5 times, so it is worth to keep them.
*
* By the way, the implementation using ngx_sprintf() is faster by 2.5-3 times
* than using FreeBSD libc's snprintf().
*/
2003-01-30 15:28:09 +08:00
/* AF_INET only */
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
size_t
ngx_sock_ntop(int family, struct sockaddr *sa, u_char *text, size_t len)
2003-01-30 15:28:09 +08:00
{
2004-03-16 15:10:12 +08:00
u_char *p;
2004-03-16 21:35:20 +08:00
size_t n;
ngx_uint_t i;
struct sockaddr_in *sin;
2003-01-30 15:28:09 +08:00
2004-03-16 21:35:20 +08:00
if (len == 0) {
return 0;
}
2003-01-30 15:28:09 +08:00
if (family != AF_INET) {
return 0;
}
sin = (struct sockaddr_in *) sa;
p = (u_char *) &sin->sin_addr;
2004-03-16 15:10:12 +08:00
2004-03-16 21:35:20 +08:00
if (len > INET_ADDRSTRLEN) {
len = INET_ADDRSTRLEN;
}
n = ngx_sprint_uchar(text, p[0], len);
i = 1;
do {
if (len == n) {
text[n - 1] = '\0';
return n;
}
text[n++] = '.';
if (len == n) {
text[n - 1] = '\0';
return n;
}
n += ngx_sprint_uchar(&text[n], p[i++], len - n);
} while (i < 4);
if (len == n) {
text[n] = '\0';
return n;
}
text[n] = '\0';
return n;
2003-01-30 15:28:09 +08:00
}
2008-01-04 19:54:55 +08:00
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
size_t
ngx_inet_ntop(int family, void *addr, u_char *text, size_t len)
2002-12-15 14:25:09 +08:00
{
2004-03-16 21:35:20 +08:00
u_char *p;
size_t n;
ngx_uint_t i;
if (len == 0) {
return 0;
}
2003-01-30 15:28:09 +08:00
if (family != AF_INET) {
2002-12-15 14:25:09 +08:00
return 0;
2003-01-30 15:28:09 +08:00
}
2002-12-15 14:25:09 +08:00
2004-03-16 21:35:20 +08:00
p = (u_char *) addr;
if (len > INET_ADDRSTRLEN) {
len = INET_ADDRSTRLEN;
}
n = ngx_sprint_uchar(text, p[0], len);
i = 1;
do {
if (len == n) {
text[n - 1] = '\0';
return n;
}
text[n++] = '.';
if (len == n) {
text[n - 1] = '\0';
return n;
}
n += ngx_sprint_uchar(&text[n], p[i++], len - n);
} while (i < 4);
if (len == n) {
text[n] = '\0';
return n;
}
text[n] = '\0';
return n;
2002-12-15 14:25:09 +08:00
}
2004-05-25 23:28:46 +08:00
2008-01-04 19:54:55 +08:00
static size_t
ngx_sprint_uchar(u_char *text, u_char c, size_t len)
{
size_t n;
ngx_uint_t c1, c2;
n = 0;
if (len == n) {
return n;
}
c1 = c / 100;
if (c1) {
*text++ = (u_char) (c1 + '0');
n++;
if (len == n) {
return n;
}
}
c2 = (c % 100) / 10;
if (c1 || c2) {
*text++ = (u_char) (c2 + '0');
n++;
if (len == n) {
return n;
}
}
c2 = c % 10;
*text++ = (u_char) (c2 + '0');
n++;
return n;
}
2004-05-25 23:28:46 +08:00
/* AF_INET only */
nginx-0.1.29-RELEASE import *) Feature: the ngx_http_ssi_module supports "include virtual" command. *) Feature: the ngx_http_ssi_module supports the condition command like 'if expr="$NAME"' and "else" and "endif" commands. Only one nested level is supported. *) Feature: the ngx_http_ssi_module supports the DATE_LOCAL and DATE_GMT variables and "config timefmt" command. *) Feature: the "ssi_ignore_recycled_buffers" directive. *) Bugfix: the "echo" command did not show the default value for the empty QUERY_STRING variable. *) Change: the ngx_http_proxy_module was rewritten. *) Feature: the "proxy_redirect", "proxy_pass_request_headers", "proxy_pass_request_body", and "proxy_method" directives. *) Feature: the "proxy_set_header" directive. The "proxy_x_var" was canceled and must be replaced with the proxy_set_header directive. *) Change: the "proxy_preserve_host" is canceled and must be replaced with the "proxy_set_header Host $host" and the "proxy_redirect off" directives, the "proxy_set_header Host $host:$proxy_port" directive and the appropriate proxy_redirect directives. *) Change: the "proxy_set_x_real_ip" is canceled and must be replaced with the "proxy_set_header X-Real-IP $remote_addr" directive. *) Change: the "proxy_add_x_forwarded_for" is canceled and must be replaced with the "proxy_set_header X-Forwarded-For $proxy_add_x_forwarded_for" directive. *) Change: the "proxy_set_x_url" is canceled and must be replaced with the "proxy_set_header X-URL http://$host:$server_port$request_uri" directive. *) Feature: the "fastcgi_param" directive. *) Change: the "fastcgi_root", "fastcgi_set_var" and "fastcgi_params" directive are canceled and must be replaced with the fastcgi_param directives. *) Feature: the "index" directive can use the variables. *) Feature: the "index" directive can be used at http and server levels. *) Change: the last index only in the "index" directive can be absolute. *) Feature: the "rewrite" directive can use the variables. *) Feature: the "internal" directive. *) Feature: the CONTENT_LENGTH, CONTENT_TYPE, REMOTE_PORT, SERVER_ADDR, SERVER_PORT, SERVER_PROTOCOL, DOCUMENT_ROOT, SERVER_NAME, REQUEST_METHOD, REQUEST_URI, and REMOTE_USER variables. *) Change: nginx now passes the invalid lines in a client request headers or a backend response header. *) Bugfix: if the backend did not transfer response for a long time and the "send_timeout" was less than "proxy_read_timeout", then nginx returned the 408 response. *) Bugfix: the segmentation fault was occurred if the backend sent an invalid line in response header; the bug had appeared in 0.1.26. *) Bugfix: the segmentation fault may occurred in FastCGI fault tolerance configuration. *) Bugfix: the "expires" directive did not remove the previous "Expires" and "Cache-Control" headers. *) Bugfix: nginx did not take into account trailing dot in "Host" header line. *) Bugfix: the ngx_http_auth_module did not work under Linux. *) Bugfix: the rewrite directive worked incorrectly, if the arguments were in a request. *) Bugfix: nginx could not be built on MacOS X.
2005-05-12 22:58:06 +08:00
ngx_int_t
ngx_ptocidr(ngx_str_t *text, void *cidr)
2004-05-25 23:28:46 +08:00
{
2004-06-25 00:07:04 +08:00
ngx_int_t m;
2004-05-25 23:28:46 +08:00
ngx_uint_t i;
ngx_inet_cidr_t *in_cidr;
in_cidr = cidr;
for (i = 0; i < text->len; i++) {
if (text->data[i] == '/') {
break;
}
}
if (i == text->len) {
return NGX_ERROR;
}
text->data[i] = '\0';
in_cidr->addr = inet_addr((char *) text->data);
text->data[i] = '/';
if (in_cidr->addr == INADDR_NONE) {
return NGX_ERROR;
}
2004-06-25 00:07:04 +08:00
m = ngx_atoi(&text->data[i + 1], text->len - (i + 1));
if (m == NGX_ERROR) {
2004-05-25 23:28:46 +08:00
return NGX_ERROR;
}
2004-06-25 00:07:04 +08:00
if (m == 0) {
/* the x86 compilers use the shl instruction that shifts by modulo 32 */
in_cidr->mask = 0;
return NGX_OK;
}
2004-07-31 01:05:14 +08:00
in_cidr->mask = htonl((ngx_uint_t) (0 - (1 << (32 - m))));
2004-06-25 00:07:04 +08:00
if (in_cidr->addr == (in_cidr->addr & in_cidr->mask)) {
return NGX_OK;
}
in_cidr->addr &= in_cidr->mask;
return NGX_DONE;
2004-05-25 23:28:46 +08:00
}
ngx_int_t
2007-10-08 16:55:12 +08:00
ngx_parse_url(ngx_pool_t *pool, ngx_url_t *u)
{
2006-12-13 00:46:16 +08:00
u_char *p, *host, *port_start;
size_t len, port_len;
ngx_int_t port;
ngx_uint_t i;
struct hostent *h;
#if (NGX_HAVE_UNIX_DOMAIN)
struct sockaddr_un *saun;
#endif
len = u->url.len;
p = u->url.data;
2007-02-15 02:51:19 +08:00
if (ngx_strncasecmp(p, (u_char *) "unix:", 5) == 0) {
#if (NGX_HAVE_UNIX_DOMAIN)
p += 5;
len -= 5;
u->uri.len = len;
u->uri.data = p;
if (u->uri_part) {
for (i = 0; i < len; i++) {
if (p[i] == ':') {
len = i;
u->uri.len -= len + 1;
u->uri.data += len + 1;
break;
}
}
}
if (len == 0) {
u->err = "no path in the unix domain socket";
return NGX_ERROR;
}
if (len + 1 > sizeof(saun->sun_path)) {
u->err = "too long path in the unix domain socket";
return NGX_ERROR;
}
2007-10-08 16:55:12 +08:00
u->addrs = ngx_pcalloc(pool, sizeof(ngx_peer_addr_t));
2006-12-05 00:46:13 +08:00
if (u->addrs == NULL) {
return NGX_ERROR;
}
2007-10-08 16:55:12 +08:00
saun = ngx_pcalloc(pool, sizeof(struct sockaddr_un));
if (saun == NULL) {
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
u->naddrs = 1;
saun->sun_family = AF_UNIX;
(void) ngx_cpystrn((u_char *) saun->sun_path, p, len + 1);
2006-12-05 00:46:13 +08:00
u->addrs[0].sockaddr = (struct sockaddr *) saun;
u->addrs[0].socklen = sizeof(struct sockaddr_un);
u->addrs[0].name.len = len + 5;
u->addrs[0].name.data = u->url.data;
u->host.len = len;
u->host.data = p;
2006-12-13 00:46:16 +08:00
u->unix_socket = 1;
return NGX_OK;
#else
u->err = "the unix domain sockets are not supported on this platform";
return NGX_ERROR;
#endif
}
if ((p[0] == ':' || p[0] == '/') && !u->listen) {
u->err = "invalid host";
return NGX_ERROR;
}
u->host.data = p;
2006-12-13 00:46:16 +08:00
port_start = NULL;
port_len = 0;
for (i = 0; i < len; i++) {
if (p[i] == ':') {
2006-12-13 00:46:16 +08:00
port_start = &p[i + 1];
u->host.len = i;
if (!u->uri_part) {
2006-12-13 00:46:16 +08:00
port_len = len - (i + 1);
break;
}
}
if (p[i] == '/') {
u->uri.len = len - i;
u->uri.data = &p[i];
if (u->host.len == 0) {
u->host.len = i;
}
2006-12-13 00:46:16 +08:00
if (port_start == NULL) {
2006-12-05 00:46:13 +08:00
u->no_port = 1;
goto no_port;
}
2006-12-13 00:46:16 +08:00
port_len = &p[i] - port_start;
2006-12-13 00:46:16 +08:00
if (port_len == 0) {
u->err = "invalid port";
return NGX_ERROR;
}
break;
}
}
2006-12-13 00:46:16 +08:00
if (port_start) {
2006-12-13 00:46:16 +08:00
if (port_len == 0) {
port_len = &p[i] - port_start;
2006-12-13 00:46:16 +08:00
if (port_len == 0) {
u->err = "invalid port";
return NGX_ERROR;
}
}
2006-12-13 00:46:16 +08:00
port = ngx_atoi(port_start, port_len);
if (port == NGX_ERROR || port < 1 || port > 65536) {
u->err = "invalid port";
return NGX_ERROR;
}
u->port_text.len = port_len;
u->port_text.data = port_start;
} else {
port = ngx_atoi(p, len);
if (port == NGX_ERROR) {
u->host.len = len;
2006-12-05 00:46:13 +08:00
u->no_port = 1;
2006-12-05 00:46:13 +08:00
goto no_port;
}
u->wildcard = 1;
}
2006-12-13 00:46:16 +08:00
u->port = (in_port_t) port;
2006-12-05 00:46:13 +08:00
no_port:
if (u->listen) {
2006-12-05 00:46:13 +08:00
2006-12-13 00:46:16 +08:00
if (u->port == 0) {
if (u->default_port == 0) {
u->err = "no port";
return NGX_ERROR;
}
2006-12-13 00:46:16 +08:00
u->port = u->default_port;
}
if (u->host.len == 1 && u->host.data[0] == '*') {
u->host.len = 0;
}
/* AF_INET only */
if (u->host.len) {
2007-10-08 16:55:12 +08:00
host = ngx_alloc(u->host.len + 1, pool->log);
if (host == NULL) {
return NGX_ERROR;
}
2007-10-08 16:55:12 +08:00
(void) ngx_cpystrn(host, u->host.data, u->host.len + 1);
u->addr.in_addr = inet_addr((const char *) host);
if (u->addr.in_addr == INADDR_NONE) {
h = gethostbyname((const char *) host);
if (h == NULL || h->h_addr_list[0] == NULL) {
2007-10-08 16:55:12 +08:00
ngx_free(host);
u->err = "host not found";
return NGX_ERROR;
}
2006-12-13 00:46:16 +08:00
u->addr.in_addr = *(in_addr_t *) (h->h_addr_list[0]);
}
2007-10-08 16:55:12 +08:00
ngx_free(host);
} else {
u->addr.in_addr = INADDR_ANY;
}
return NGX_OK;
}
if (u->host.len == 0) {
u->err = "no host";
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
if (u->no_resolve) {
return NGX_OK;
}
2006-12-13 00:46:16 +08:00
if (u->no_port) {
u->port = u->default_port;
}
if (u->port == 0) {
u->err = "no port";
return NGX_ERROR;
}
2007-10-08 16:55:12 +08:00
if (ngx_inet_resolve_host(pool, u) != NGX_OK) {
return NGX_ERROR;
}
return NGX_OK;
}
2006-12-05 00:46:13 +08:00
ngx_int_t
2007-10-08 16:55:12 +08:00
ngx_inet_resolve_host(ngx_pool_t *pool, ngx_url_t *u)
{
2006-12-13 00:46:16 +08:00
u_char *p, *host;
size_t len;
in_addr_t in_addr;
ngx_uint_t i;
struct hostent *h;
struct sockaddr_in *sin;
2007-10-08 16:55:12 +08:00
host = ngx_alloc(u->host.len + 1, pool->log);
if (host == NULL) {
2006-12-05 00:46:13 +08:00
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
(void) ngx_cpystrn(host, u->host.data, u->host.len + 1);
/* AF_INET only */
in_addr = inet_addr((char *) host);
if (in_addr == INADDR_NONE) {
h = gethostbyname((char *) host);
2007-10-08 16:55:12 +08:00
ngx_free(host);
if (h == NULL || h->h_addr_list[0] == NULL) {
2006-12-05 00:46:13 +08:00
u->err = "host not found";
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
if (u->one_addr == 0) {
for (i = 0; h->h_addr_list[i] != NULL; i++) { /* void */ }
} else {
i = 1;
}
/* MP: ngx_shared_palloc() */
2007-10-08 16:55:12 +08:00
u->addrs = ngx_pcalloc(pool, i * sizeof(ngx_peer_addr_t));
2006-12-05 00:46:13 +08:00
if (u->addrs == NULL) {
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
u->naddrs = i;
for (i = 0; h->h_addr_list[i] != NULL; i++) {
2007-10-08 16:55:12 +08:00
sin = ngx_pcalloc(pool, sizeof(struct sockaddr_in));
if (sin == NULL) {
2006-12-05 00:46:13 +08:00
return NGX_ERROR;
}
sin->sin_family = AF_INET;
2006-12-13 00:46:16 +08:00
sin->sin_port = htons(u->port);
sin->sin_addr.s_addr = *(in_addr_t *) (h->h_addr_list[i]);
2006-12-05 00:46:13 +08:00
u->addrs[i].sockaddr = (struct sockaddr *) sin;
u->addrs[i].socklen = sizeof(struct sockaddr_in);
len = INET_ADDRSTRLEN - 1 + 1 + sizeof(":65536") - 1;
2007-10-08 16:55:12 +08:00
p = ngx_palloc(pool, len);
2006-12-13 00:46:16 +08:00
if (p == NULL) {
2006-12-05 00:46:13 +08:00
return NGX_ERROR;
}
2006-12-13 00:46:16 +08:00
len = ngx_sock_ntop(AF_INET, (struct sockaddr *) sin, p, len);
2006-12-13 00:46:16 +08:00
u->addrs[i].name.len = ngx_sprintf(&p[len], ":%d", u->port) - p;
u->addrs[i].name.data = p;
}
} else {
2007-10-08 16:55:12 +08:00
ngx_free(host);
/* MP: ngx_shared_palloc() */
2007-10-08 16:55:12 +08:00
u->addrs = ngx_pcalloc(pool, sizeof(ngx_peer_addr_t));
2006-12-05 00:46:13 +08:00
if (u->addrs == NULL) {
return NGX_ERROR;
}
2007-10-08 16:55:12 +08:00
sin = ngx_pcalloc(pool, sizeof(struct sockaddr_in));
if (sin == NULL) {
2006-12-05 00:46:13 +08:00
return NGX_ERROR;
}
2006-12-05 00:46:13 +08:00
u->naddrs = 1;
sin->sin_family = AF_INET;
2006-12-13 00:46:16 +08:00
sin->sin_port = htons(u->port);
sin->sin_addr.s_addr = in_addr;
2006-12-05 00:46:13 +08:00
u->addrs[0].sockaddr = (struct sockaddr *) sin;
u->addrs[0].socklen = sizeof(struct sockaddr_in);
2007-10-08 16:55:12 +08:00
p = ngx_palloc(pool, u->host.len + sizeof(":65536") - 1);
2006-12-13 00:46:16 +08:00
if (p == NULL) {
2006-12-05 00:46:13 +08:00
return NGX_ERROR;
}
2006-12-13 00:46:16 +08:00
u->addrs[0].name.len = ngx_sprintf(p, "%V:%d", &u->host, u->port) - p;
u->addrs[0].name.data = p;
}
2006-12-05 00:46:13 +08:00
return NGX_OK;
}