2004-09-08 13:18:51 +08:00
|
|
|
|
2004-09-28 16:34:51 +08:00
|
|
|
/*
|
2004-09-30 00:00:49 +08:00
|
|
|
* Copyright (C) Igor Sysoev
|
2004-09-28 16:34:51 +08:00
|
|
|
*/
|
|
|
|
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
#include <ngx_config.h>
|
|
|
|
#include <ngx_core.h>
|
|
|
|
#include <ngx_event.h>
|
2004-09-09 23:40:48 +08:00
|
|
|
#include <ngx_event_connect.h>
|
2004-09-08 13:18:51 +08:00
|
|
|
#include <ngx_imap.h>
|
|
|
|
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
static void ngx_imap_proxy_block_read(ngx_event_t *rev);
|
2004-09-12 04:22:11 +08:00
|
|
|
static void ngx_imap_proxy_auth_handler(ngx_event_t *rev);
|
2004-09-09 23:40:48 +08:00
|
|
|
static void ngx_imap_proxy_init_handler(ngx_event_t *wev);
|
|
|
|
static void ngx_imap_proxy_dummy_handler(ngx_event_t *ev);
|
|
|
|
static ngx_int_t ngx_imap_proxy_read_response(ngx_imap_session_t *s);
|
|
|
|
static void ngx_imap_proxy_handler(ngx_event_t *ev);
|
2004-09-08 13:18:51 +08:00
|
|
|
static void ngx_imap_proxy_close_session(ngx_imap_session_t *s);
|
|
|
|
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
void ngx_imap_proxy_init(ngx_imap_session_t *s)
|
2004-09-08 13:18:51 +08:00
|
|
|
{
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_int_t rc;
|
|
|
|
ngx_peers_t *peers;
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
struct sockaddr_in *sin;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_proxy_ctx_t *p;
|
|
|
|
|
|
|
|
if (!(p = ngx_pcalloc(s->connection->pool, sizeof(ngx_imap_proxy_ctx_t)))) {
|
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->proxy = p;
|
|
|
|
|
|
|
|
/**/
|
|
|
|
|
|
|
|
if (!(peers = ngx_pcalloc(s->connection->pool, sizeof(ngx_peers_t)))) {
|
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->upstream.peers = peers;
|
|
|
|
p->upstream.log = s->connection->log;
|
|
|
|
p->upstream.log_error = NGX_ERROR_ERR;
|
|
|
|
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
if (!(sin = ngx_pcalloc(s->connection->pool, sizeof(struct sockaddr_in)))) {
|
|
|
|
ngx_imap_close_connection(s->connection);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
peers->peer[0].sockaddr = (struct sockaddr *) sin;
|
|
|
|
peers->peer[0].socklen = sizeof(struct sockaddr_in);
|
|
|
|
|
|
|
|
sin->sin_port = htons(110);
|
|
|
|
#if 1
|
|
|
|
sin->sin_addr.s_addr = inet_addr("81.19.64.101");
|
|
|
|
peers->peer[0].name.len = sizeof("81.19.64.101:110") - 1;
|
|
|
|
peers->peer[0].name.data = (u_char *) "81.19.64.101:110";
|
2004-09-14 00:18:09 +08:00
|
|
|
#else
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
sin->sin_addr.s_addr = inet_addr("81.19.69.70");
|
|
|
|
peers->peer[0].name.len = sizeof("81.19.69.70:110") - 1;
|
|
|
|
peers->peer[0].name.data = (u_char *) "81.19.69.70:110";
|
2004-09-14 00:18:09 +08:00
|
|
|
#endif
|
2004-09-09 23:40:48 +08:00
|
|
|
|
nginx-0.1.14-RELEASE import
*) Feature: the autoconfiguration directives:
--http-client-body-temp-path=PATH, --http-proxy-temp-path=PATH, and
--http-fastcgi-temp-path=PATH
*) Change: the directory name for the temporary files with the client
request body is specified by directive client_body_temp_path, by
default it is <prefix>/client_body_temp.
*) Feature: the ngx_http_fastcgi_module and the directives:
fastcgi_pass, fastcgi_root, fastcgi_index, fastcgi_params,
fastcgi_connect_timeout, fastcgi_send_timeout, fastcgi_read_timeout,
fastcgi_send_lowat, fastcgi_header_buffer_size, fastcgi_buffers,
fastcgi_busy_buffers_size, fastcgi_temp_path,
fastcgi_max_temp_file_size, fastcgi_temp_file_write_size,
fastcgi_next_upstream, and fastcgi_x_powered_by.
*) Bugfix: the "[alert] zero size buf" error; the bug had appeared in
0.1.3.
*) Change: the URI must be specified after the host name in the
proxy_pass directive.
*) Change: the %3F symbol in the URI was considered as the argument
string start.
*) Feature: the unix domain sockets support in the
ngx_http_proxy_module.
*) Feature: the ssl_engine and ssl_ciphers directives.
Thanks to Sergey Skvortsov for SSL-accelerator.
2005-01-18 21:03:58 +08:00
|
|
|
peers->number = 1;
|
|
|
|
|
|
|
|
peers->peer[0].max_fails = 1;
|
|
|
|
peers->peer[0].fail_timeout = 60;
|
|
|
|
peers->peer[0].weight = 1;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
rc = ngx_event_connect_peer(&p->upstream);
|
|
|
|
|
|
|
|
if (rc == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p->upstream.connection->data = s;
|
|
|
|
p->upstream.connection->pool = s->connection->pool;
|
|
|
|
|
|
|
|
s->connection->read->event_handler = ngx_imap_proxy_block_read;
|
2004-09-12 04:22:11 +08:00
|
|
|
p->upstream.connection->read->event_handler = ngx_imap_proxy_auth_handler;
|
2004-09-09 23:40:48 +08:00
|
|
|
p->upstream.connection->write->event_handler = ngx_imap_proxy_dummy_handler;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_block_read(ngx_event_t *rev)
|
|
|
|
{
|
|
|
|
ngx_connection_t *c;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy block read");
|
|
|
|
|
|
|
|
if (ngx_handle_read_event(rev, 0) == NGX_ERROR) {
|
|
|
|
c = rev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
static void ngx_imap_proxy_auth_handler(ngx_event_t *rev)
|
2004-09-09 23:40:48 +08:00
|
|
|
{
|
2004-09-12 04:22:11 +08:00
|
|
|
u_char *p;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_int_t rc;
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_str_t line;
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_connection_t *c;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy auth handler");
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
c = rev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (rev->timedout) {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT, "client timed out");
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
if (s->proxy->buffer == NULL) {
|
|
|
|
s->proxy->buffer = ngx_create_temp_buf(c->pool, /* STUB */ 4096);
|
|
|
|
if (s->proxy->buffer == NULL) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
rc = ngx_imap_proxy_read_response(s);
|
|
|
|
|
|
|
|
if (rc == NGX_AGAIN) {
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
if (rc == NGX_ERROR) {
|
|
|
|
/* TODO: ngx_imap_proxy_finalize_session(s, NGX_IMAP_INTERNAL_ERROR) */
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (s->imap_state == ngx_pop3_start) {
|
2004-09-09 23:40:48 +08:00
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy send user");
|
2004-09-09 23:40:48 +08:00
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
line.len = sizeof("USER ") + s->login.len - 1 + 2;
|
|
|
|
if (!(line.data = ngx_palloc(c->pool, line.len))) {
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
p = ngx_cpymem(line.data, "USER ", sizeof("USER ") - 1);
|
|
|
|
p = ngx_cpymem(p, s->login.data, s->login.len);
|
|
|
|
*p++ = CR; *p++ = LF;
|
|
|
|
|
|
|
|
if (ngx_send(c, line.data, line.len) < (ssize_t) line.len) {
|
|
|
|
/*
|
|
|
|
* we treat the incomplete sending as NGX_ERROR
|
|
|
|
* because it is very strange here
|
|
|
|
*/
|
|
|
|
ngx_imap_close_connection(c);
|
|
|
|
return;
|
2004-09-09 23:40:48 +08:00
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
s->imap_state = ngx_pop3_user;
|
|
|
|
|
|
|
|
s->proxy->buffer->pos = s->proxy->buffer->start;
|
|
|
|
s->proxy->buffer->last = s->proxy->buffer->start;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-12 04:22:11 +08:00
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, rev->log, 0, "imap proxy send pass");
|
|
|
|
|
|
|
|
line.len = sizeof("PASS ") + s->passwd.len - 1 + 2;
|
|
|
|
if (!(line.data = ngx_palloc(c->pool, line.len))) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = ngx_cpymem(line.data, "PASS ", sizeof("PASS ") - 1);
|
|
|
|
p = ngx_cpymem(p, s->passwd.data, s->passwd.len);
|
|
|
|
*p++ = CR; *p++ = LF;
|
|
|
|
|
|
|
|
if (ngx_send(c, line.data, line.len) < (ssize_t) line.len) {
|
|
|
|
/*
|
|
|
|
* we treat the incomplete sending as NGX_ERROR
|
|
|
|
* because it is very strange here
|
|
|
|
*/
|
|
|
|
ngx_imap_close_connection(c);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
s->proxy->buffer->pos = s->proxy->buffer->start;
|
|
|
|
s->proxy->buffer->last = s->proxy->buffer->start;
|
|
|
|
|
|
|
|
s->connection->read->event_handler = ngx_imap_proxy_handler;
|
|
|
|
s->connection->write->event_handler = ngx_imap_proxy_handler;
|
|
|
|
rev->event_handler = ngx_imap_proxy_handler;
|
|
|
|
c->write->event_handler = ngx_imap_proxy_handler;
|
2004-09-09 23:40:48 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_dummy_handler(ngx_event_t *ev)
|
|
|
|
{
|
|
|
|
ngx_log_debug0(NGX_LOG_DEBUG_IMAP, ev->log, 0, "imap proxy dummy handler");
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static ngx_int_t ngx_imap_proxy_read_response(ngx_imap_session_t *s)
|
|
|
|
{
|
|
|
|
u_char *p;
|
|
|
|
ssize_t n;
|
|
|
|
ngx_buf_t *b;
|
|
|
|
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
|
|
|
|
n = ngx_recv(s->proxy->upstream.connection, b->last, b->end - b->last);
|
|
|
|
|
|
|
|
if (n == NGX_ERROR || n == 0) {
|
|
|
|
return NGX_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n == NGX_AGAIN) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
b->last += n;
|
|
|
|
|
|
|
|
if (b->last - b->pos < 5) {
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (*(b->last - 2) != CR || *(b->last - 1) != LF) {
|
|
|
|
if (b->last == b->end) {
|
|
|
|
*(b->last - 1) = '\0';
|
|
|
|
ngx_log_error(NGX_LOG_ERR, s->connection->log, 0,
|
|
|
|
"upstream sent too long response line: \"%s\"",
|
|
|
|
b->pos);
|
|
|
|
return NGX_IMAP_PROXY_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
return NGX_AGAIN;
|
|
|
|
}
|
|
|
|
|
|
|
|
p = b->pos;
|
|
|
|
|
|
|
|
if (p[0] == '+' && p[1] == 'O' && p[2] == 'K') {
|
|
|
|
return NGX_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (p[0] == '-' && p[1] == 'E' && p[2] == 'R' && p[3] == 'R') {
|
|
|
|
return NGX_IMAP_PROXY_ERROR;
|
|
|
|
}
|
|
|
|
|
|
|
|
*(b->last - 2) = '\0';
|
|
|
|
ngx_log_error(NGX_LOG_ERR, s->connection->log, 0,
|
|
|
|
"upstream sent invalid greeting line: \"%s\"", p);
|
|
|
|
|
|
|
|
return NGX_IMAP_PROXY_INVALID;
|
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_handler(ngx_event_t *ev)
|
|
|
|
{
|
|
|
|
size_t size;
|
2004-09-08 13:18:51 +08:00
|
|
|
ssize_t n;
|
|
|
|
ngx_buf_t *b;
|
2004-09-14 00:18:09 +08:00
|
|
|
ngx_uint_t again, do_write;
|
2004-09-08 13:18:51 +08:00
|
|
|
ngx_connection_t *c, *src, *dst;
|
|
|
|
ngx_imap_session_t *s;
|
|
|
|
|
|
|
|
c = ev->data;
|
|
|
|
s = c->data;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->timedout) {
|
|
|
|
if (c == s->connection) {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT,
|
|
|
|
"client timed out");
|
|
|
|
} else {
|
|
|
|
ngx_log_error(NGX_LOG_INFO, c->log, NGX_ETIMEDOUT,
|
|
|
|
"upstream timed out");
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
if (c == s->connection) {
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->write) {
|
|
|
|
src = s->proxy->upstream.connection;
|
|
|
|
dst = c;
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
src = c;
|
|
|
|
dst = s->proxy->upstream.connection;
|
|
|
|
b = s->buffer;
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
} else {
|
2004-09-14 00:18:09 +08:00
|
|
|
if (ev->write) {
|
|
|
|
src = s->connection;
|
|
|
|
dst = c;
|
|
|
|
b = s->buffer;
|
|
|
|
|
|
|
|
} else {
|
|
|
|
src = c;
|
|
|
|
dst = s->connection;
|
|
|
|
b = s->proxy->buffer;
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
do_write = ev->write ? 1 : 0;
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
ngx_log_debug3(NGX_LOG_DEBUG_IMAP, ev->log, 0,
|
|
|
|
"imap proxy handler: %d, #%d > #%d",
|
|
|
|
do_write, src->fd, dst->fd);
|
|
|
|
|
2004-09-08 13:18:51 +08:00
|
|
|
do {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 0;
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (do_write == 1) {
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
size = b->last - b->pos;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (size && dst->write->ready) {
|
2004-09-09 23:40:48 +08:00
|
|
|
n = ngx_send(dst, b->pos, size);
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (n == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n > 0) {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 1;
|
2004-09-08 13:18:51 +08:00
|
|
|
b->pos += n;
|
|
|
|
|
|
|
|
if (b->pos == b->last) {
|
|
|
|
b->pos = b->start;
|
|
|
|
b->last = b->start;
|
|
|
|
}
|
|
|
|
}
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
if (n == NGX_AGAIN || n < (ssize_t) size) {
|
2004-10-11 23:07:03 +08:00
|
|
|
if (ngx_handle_write_event(dst->write, /* TODO: LOWAT */ 0)
|
2004-09-09 23:40:48 +08:00
|
|
|
== NGX_ERROR)
|
|
|
|
{
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2004-09-09 23:40:48 +08:00
|
|
|
size = b->end - b->last;
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
if (size && src->read->ready) {
|
2004-09-09 23:40:48 +08:00
|
|
|
n = ngx_recv(src, b->last, size);
|
2004-09-08 13:18:51 +08:00
|
|
|
|
|
|
|
if (n == NGX_ERROR || n == 0) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
|
|
|
|
if (n > 0) {
|
2004-09-14 00:18:09 +08:00
|
|
|
again = 1;
|
2004-09-08 13:18:51 +08:00
|
|
|
do_write = 1;
|
|
|
|
b->last += n;
|
|
|
|
}
|
2004-09-09 23:40:48 +08:00
|
|
|
|
|
|
|
if (n == NGX_AGAIN || n < (ssize_t) size) {
|
|
|
|
if (ngx_handle_read_event(src->read, 0) == NGX_ERROR) {
|
|
|
|
ngx_imap_proxy_close_session(s);
|
|
|
|
return;
|
|
|
|
}
|
|
|
|
}
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
2004-09-14 00:18:09 +08:00
|
|
|
} while (again);
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
|
|
|
|
static void ngx_imap_proxy_close_session(ngx_imap_session_t *s)
|
|
|
|
{
|
2004-09-09 23:40:48 +08:00
|
|
|
if (ngx_close_socket(s->proxy->upstream.connection->fd) == -1) {
|
|
|
|
ngx_log_error(NGX_LOG_ALERT, s->connection->log, ngx_socket_errno,
|
|
|
|
ngx_close_socket_n " failed");
|
|
|
|
}
|
|
|
|
|
|
|
|
ngx_imap_close_connection(s->connection);
|
2004-09-08 13:18:51 +08:00
|
|
|
}
|