[MINOR] move some flags from session.h to proto_http.h
Some session flags were clearly related to HTTP transactions.
A new 'flags' field has been added to http_txn, and the
associated flags moved to proto_http.h.
diff --git a/include/proto/proto_http.h b/include/proto/proto_http.h
index 297c5b9..298d30d 100644
--- a/include/proto/proto_http.h
+++ b/include/proto/proto_http.h
@@ -82,6 +82,15 @@
int stats_check_uri_auth(struct session *t, struct proxy *backend);
void init_proto_http();
+/* used to clear the cookie flags when a transaction failed on the server
+ * designed by the cookie. We clear the CK_VALID bit and set the CK_DOWN.
+ */
+static inline void http_flush_cookie_flags(struct http_txn *txn)
+{
+ if ((txn->flags & TX_CK_MASK) == TX_CK_VALID)
+ txn->flags ^= (TX_CK_VALID | TX_CK_DOWN);
+}
+
#endif /* _PROTO_PROTO_HTTP_H */
/*
diff --git a/include/types/proto_http.h b/include/types/proto_http.h
index 58a89ff..a6709aa 100644
--- a/include/types/proto_http.h
+++ b/include/types/proto_http.h
@@ -53,6 +53,41 @@
#define SV_STSHUTW 5
#define SV_STCLOSE 6
+/*
+ * Transaction flags moved from session
+ */
+
+
+/* action flags */
+#define TX_CLDENY 0x00000001 /* a client header matches a deny regex */
+#define TX_CLALLOW 0x00000002 /* a client header matches an allow regex */
+#define TX_SVDENY 0x00000004 /* a server header matches a deny regex */
+#define TX_SVALLOW 0x00000008 /* a server header matches an allow regex */
+#define TX_CLTARPIT 0x00000010 /* the session is tarpitted (anti-dos) */
+/* unused: 0x00000020 */
+
+/* transaction flags dedicated to cookies : bits values 0x40, 0x80 (0-3 shift 6) */
+#define TX_CK_NONE 0x00000000 /* this session had no cookie */
+#define TX_CK_INVALID 0x00000040 /* this session had a cookie which matches no server */
+#define TX_CK_DOWN 0x00000080 /* this session had cookie matching a down server */
+#define TX_CK_VALID 0x000000C0 /* this session had cookie matching a valid server */
+#define TX_CK_MASK 0x000000C0 /* mask to get this session's cookie flags */
+#define TX_CK_SHIFT 6 /* bit shift */
+
+/* cookie information, bits values 0x100 to 0x800 (0-8 shift 8) */
+#define TX_SCK_NONE 0x00000000 /* no set-cookie seen for the server cookie */
+#define TX_SCK_DELETED 0x00000100 /* existing set-cookie deleted or changed */
+#define TX_SCK_INSERTED 0x00000200 /* new set-cookie inserted or changed existing one */
+#define TX_SCK_SEEN 0x00000400 /* set-cookie seen for the server cookie */
+#define TX_SCK_MASK 0x00000700 /* mask to get the set-cookie field */
+#define TX_SCK_ANY 0x00000800 /* at least one set-cookie seen (not to be counted) */
+#define TX_SCK_SHIFT 8 /* bit shift */
+
+/* cacheability management, bits values 0x1000 to 0x3000 (0-3 shift 12) */
+#define TX_CACHEABLE 0x00001000 /* at least part of the response is cacheable */
+#define TX_CACHE_COOK 0x00002000 /* a cookie in the response is cacheable */
+#define TX_CACHE_SHIFT 12 /* bit shift */
+
/* The HTTP parser is more complex than it looks like, because we have to
* support multi-line headers and any number of spaces between the colon and
@@ -204,6 +239,7 @@
char *cli_cookie; /* cookie presented by the client, in capture mode */
char *srv_cookie; /* cookie presented by the server, in capture mode */
int status; /* HTTP status from the server, negative if from proxy */
+ unsigned int flags; /* transaction flags */
};
diff --git a/include/types/session.h b/include/types/session.h
index 99f8819..1011c9a 100644
--- a/include/types/session.h
+++ b/include/types/session.h
@@ -41,19 +41,13 @@
/* various session flags, bits values 0x01 to 0x20 (shift 0) */
#define SN_DIRECT 0x00000001 /* connection made on the server matching the client cookie */
-#define SN_CLDENY 0x00000002 /* a client header matches a deny regex */
-#define SN_CLALLOW 0x00000004 /* a client header matches an allow regex */
-#define SN_SVDENY 0x00000008 /* a server header matches a deny regex */
-#define SN_SVALLOW 0x00000010 /* a server header matches an allow regex */
-#define SN_BE_ASSIGNED 0x00000020 /* a backend was assigned. Conns are accounted. */
-
-/* session flags dedicated to cookies : bits values 0x40, 0x80 (0-3 shift 6) */
-#define SN_CK_NONE 0x00000000 /* this session had no cookie */
-#define SN_CK_INVALID 0x00000040 /* this session had a cookie which matches no server */
-#define SN_CK_DOWN 0x00000080 /* this session had cookie matching a down server */
-#define SN_CK_VALID 0x000000C0 /* this session had cookie matching a valid server */
-#define SN_CK_MASK 0x000000C0 /* mask to get this session's cookie flags */
-#define SN_CK_SHIFT 6 /* bit shift */
+#define SN_ASSIGNED 0x00000002 /* no need to assign a server to this session */
+#define SN_ADDR_SET 0x00000004 /* this session's server address has been set */
+#define SN_BE_ASSIGNED 0x00000008 /* a backend was assigned. Conns are accounted. */
+#define SN_CONN_CLOSED 0x00000010 /* "Connection: close" was present or added */
+#define SN_MONITOR 0x00000020 /* this session comes from a monitoring system */
+#define SN_SELF_GEN 0x00000040 /* the proxy generates data for the client (eg: stats) */
+/* unused: 0x00000080 */
/* session termination conditions, bits values 0x100 to 0x700 (0-7 shift 8) */
#define SN_ERR_NONE 0x00000000
@@ -66,6 +60,7 @@
#define SN_ERR_INTERNAL 0x00000700 /* the proxy encountered an internal error */
#define SN_ERR_MASK 0x00000700 /* mask to get only session error flags */
#define SN_ERR_SHIFT 8 /* bit shift */
+/* unused: 0x00000800 */
/* session state at termination, bits values 0x1000 to 0x7000 (0-7 shift 12) */
#define SN_FINST_R 0x00001000 /* session ended during client request */
@@ -77,28 +72,7 @@
#define SN_FINST_T 0x00007000 /* session ended tarpitted */
#define SN_FINST_MASK 0x00007000 /* mask to get only final session state flags */
#define SN_FINST_SHIFT 12 /* bit shift */
-
-/* cookie information, bits values 0x10000 to 0x80000 (0-8 shift 16) */
-#define SN_SCK_NONE 0x00000000 /* no set-cookie seen for the server cookie */
-#define SN_SCK_DELETED 0x00010000 /* existing set-cookie deleted or changed */
-#define SN_SCK_INSERTED 0x00020000 /* new set-cookie inserted or changed existing one */
-#define SN_SCK_SEEN 0x00040000 /* set-cookie seen for the server cookie */
-#define SN_SCK_MASK 0x00070000 /* mask to get the set-cookie field */
-#define SN_SCK_ANY 0x00080000 /* at least one set-cookie seen (not to be counted) */
-#define SN_SCK_SHIFT 16 /* bit shift */
-
-/* cacheability management, bits values 0x100000 to 0x300000 (0-3 shift 20) */
-#define SN_CACHEABLE 0x00100000 /* at least part of the response is cacheable */
-#define SN_CACHE_COOK 0x00200000 /* a cookie in the response is cacheable */
-#define SN_CACHE_SHIFT 20 /* bit shift */
-
-/* various other session flags, bits values 0x400000 and above */
-#define SN_CONN_CLOSED 0x00000800 /* "Connection: close" was present or added */
-#define SN_MONITOR 0x00400000 /* this session comes from a monitoring system */
-#define SN_ASSIGNED 0x00800000 /* no need to assign a server to this session */
-#define SN_ADDR_SET 0x01000000 /* this session's server address has been set */
-#define SN_SELF_GEN 0x02000000 /* the proxy generates data for the client (eg: stats) */
-#define SN_CLTARPIT 0x04000000 /* the session is tarpitted (anti-dos) */
+/* unused: 0x00008000 */
/* WARNING: if new fields are added, they must be initialized in event_accept()
diff --git a/src/backend.c b/src/backend.c
index 68f2925..0918a0b 100644
--- a/src/backend.c
+++ b/src/backend.c
@@ -639,10 +639,7 @@
t->flags &= ~(SN_DIRECT | SN_ASSIGNED | SN_ADDR_SET);
t->srv = NULL; /* it's left to the dispatcher to choose a server */
- if ((t->flags & SN_CK_MASK) == SN_CK_VALID) {
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_DOWN;
- }
+ http_flush_cookie_flags(&t->txn);
return 0;
}
diff --git a/src/checks.c b/src/checks.c
index 054571e..ed0873a 100644
--- a/src/checks.c
+++ b/src/checks.c
@@ -33,6 +33,7 @@
#include <proto/fd.h>
#include <proto/log.h>
#include <proto/queue.h>
+#include <proto/proto_http.h>
#include <proto/proxy.h>
#include <proto/server.h>
#include <proto/task.h>
@@ -71,10 +72,7 @@
*/
sess->flags &= ~(SN_DIRECT | SN_ASSIGNED | SN_ADDR_SET);
sess->srv = NULL; /* it's left to the dispatcher to choose a server */
- if ((sess->flags & SN_CK_MASK) == SN_CK_VALID) {
- sess->flags &= ~SN_CK_MASK;
- sess->flags |= SN_CK_DOWN;
- }
+ http_flush_cookie_flags(&sess->txn);
pendconn_free(pc);
task_wakeup(&rq, sess->task);
xferred++;
diff --git a/src/client.c b/src/client.c
index 1a1ccca..ea33240 100644
--- a/src/client.c
+++ b/src/client.c
@@ -195,6 +195,7 @@
p->cum_feconn++; /* cum_beconn will be increased once assigned */
txn = &s->txn;
+ txn->flags = 0;
txn->req.cap = NULL;
txn->rsp.cap = NULL;
txn->hdr_idx.v = NULL;
diff --git a/src/log.c b/src/log.c
index a67a46d..b07d54b 100644
--- a/src/log.c
+++ b/src/log.c
@@ -410,8 +410,8 @@
txn->srv_cookie ? txn->srv_cookie : "-",
sess_term_cond[(s->flags & SN_ERR_MASK) >> SN_ERR_SHIFT],
sess_fin_state[(s->flags & SN_FINST_MASK) >> SN_FINST_SHIFT],
- (be->beprm->options & PR_O_COOK_ANY) ? sess_cookie[(s->flags & SN_CK_MASK) >> SN_CK_SHIFT] : '-',
- (be->beprm->options & PR_O_COOK_ANY) ? sess_set_cookie[(s->flags & SN_SCK_MASK) >> SN_SCK_SHIFT] : '-',
+ (be->beprm->options & PR_O_COOK_ANY) ? sess_cookie[(txn->flags & TX_CK_MASK) >> TX_CK_SHIFT] : '-',
+ (be->beprm->options & PR_O_COOK_ANY) ? sess_set_cookie[(txn->flags & TX_SCK_MASK) >> TX_SCK_SHIFT] : '-',
actconn, fe->feconn, be->beprm->beconn, s->srv ? s->srv->cur_sess : 0,
s->logs.srv_queue_size, s->logs.prx_queue_size, tmpline);
}
diff --git a/src/proto_http.c b/src/proto_http.c
index 7ed6929..eb2c0d5 100644
--- a/src/proto_http.c
+++ b/src/proto_http.c
@@ -1450,7 +1450,7 @@
}
/* has the request been denied ? */
- if (t->flags & SN_CLDENY) {
+ if (txn->flags & TX_CLDENY) {
/* no need to go further */
txn->status = 403;
/* let's log the request time */
@@ -1585,7 +1585,7 @@
* the fields will stay coherent and the URI will not move.
* This should only be performed in the backend.
*/
- if (!(t->flags & (SN_CLDENY|SN_CLTARPIT)))
+ if (!(txn->flags & (TX_CLDENY|TX_CLTARPIT)))
manage_client_side_cookies(t, req);
@@ -1667,7 +1667,7 @@
* timeout. If unset, then set it to zero because we really want it
* to expire at one moment.
*/
- if (t->flags & SN_CLTARPIT) {
+ if (txn->flags & TX_CLTARPIT) {
t->req->l = 0;
/* flush the request so that we can drop the connection early
* if the client closes first.
@@ -1986,6 +1986,7 @@
{
int s = t->srv_state;
int c = t->cli_state;
+ struct http_txn *txn = &t->txn;
struct buffer *req = t->req;
struct buffer *rep = t->rep;
int conn_err;
@@ -2009,7 +2010,7 @@
/* note that this must not return any error because it would be able to
* overwrite the client_retnclose() output.
*/
- if (t->flags & SN_CLTARPIT)
+ if (txn->flags & TX_CLTARPIT)
srv_close_with_err(t, SN_ERR_CLICL, SN_FINST_T, 0, NULL);
else
srv_close_with_err(t, SN_ERR_CLICL, t->pend_pos ? SN_FINST_Q : SN_FINST_C, 0, NULL);
@@ -2017,7 +2018,7 @@
return 1;
}
else {
- if (t->flags & SN_CLTARPIT) {
+ if (txn->flags & TX_CLTARPIT) {
/* This connection is being tarpitted. The CLIENT side has
* already set the connect expiration date to the right
* timeout. We just have to check that it has not expired.
@@ -2124,9 +2125,9 @@
t->flags &= ~(SN_DIRECT | SN_ASSIGNED | SN_ADDR_SET);
t->srv = NULL; /* it's left to the dispatcher to choose a server */
- if ((t->flags & SN_CK_MASK) == SN_CK_VALID) {
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_DOWN;
+ if ((txn->flags & TX_CK_MASK) == TX_CK_VALID) {
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_DOWN;
}
/* first, get a connection */
@@ -2227,7 +2228,6 @@
*/
int cur_idx;
- struct http_txn *txn = &t->txn;
struct http_msg *msg = &txn->rsp;
struct proxy *cur_proxy;
@@ -2469,7 +2469,7 @@
*/
if (likely(txn->meth != HTTP_METH_POST) &&
unlikely(t->be->beprm->options & PR_O_CHK_CACHE))
- t->flags |= SN_CACHEABLE | SN_CACHE_COOK;
+ txn->flags |= TX_CACHEABLE | TX_CACHE_COOK;
break;
default:
break;
@@ -2528,7 +2528,7 @@
}
/* has the response been denied ? */
- if (t->flags & SN_SVDENY) {
+ if (txn->flags & TX_SVDENY) {
if (t->srv) {
t->srv->cur_sess--;
t->srv->failed_secu++;
@@ -2634,7 +2634,7 @@
if (hdr_idx_add(len - 2, 1, &txn->hdr_idx, txn->hdr_idx.tail) < 0)
goto return_bad_resp;
- t->flags |= SN_SCK_INSERTED;
+ txn->flags |= TX_SCK_INSERTED;
/* Here, we will tell an eventual cache on the client side that we don't
* want it to cache this reply because HTTP/1.0 caches also cache cookies !
@@ -2665,8 +2665,8 @@
* We'll block the response if security checks have caught
* nasty things such as a cacheable cookie.
*/
- if (((t->flags & (SN_CACHEABLE | SN_CACHE_COOK | SN_SCK_ANY)) ==
- (SN_CACHEABLE | SN_CACHE_COOK | SN_SCK_ANY)) &&
+ if (((txn->flags & (TX_CACHEABLE | TX_CACHE_COOK | TX_SCK_ANY)) ==
+ (TX_CACHEABLE | TX_CACHE_COOK | TX_SCK_ANY)) &&
(t->be->beprm->options & PR_O_CHK_CACHE)) {
/* we're in presence of a cacheable response containing
@@ -3569,9 +3569,9 @@
old_idx = 0;
while (!last_hdr) {
- if (unlikely(t->flags & (SN_CLDENY | SN_CLTARPIT)))
+ if (unlikely(txn->flags & (TX_CLDENY | TX_CLTARPIT)))
return 1;
- else if (unlikely(t->flags & SN_CLALLOW) &&
+ else if (unlikely(txn->flags & TX_CLALLOW) &&
(exp->action == ACT_ALLOW ||
exp->action == ACT_DENY ||
exp->action == ACT_TARPIT))
@@ -3622,18 +3622,18 @@
break;
case ACT_ALLOW:
- t->flags |= SN_CLALLOW;
+ txn->flags |= TX_CLALLOW;
last_hdr = 1;
break;
case ACT_DENY:
- t->flags |= SN_CLDENY;
+ txn->flags |= TX_CLDENY;
last_hdr = 1;
t->be->beprm->denied_req++;
break;
case ACT_TARPIT:
- t->flags |= SN_CLTARPIT;
+ txn->flags |= TX_CLTARPIT;
last_hdr = 1;
t->be->beprm->denied_req++;
break;
@@ -3693,9 +3693,9 @@
int len, delta;
- if (unlikely(t->flags & (SN_CLDENY | SN_CLTARPIT)))
+ if (unlikely(txn->flags & (TX_CLDENY | TX_CLTARPIT)))
return 1;
- else if (unlikely(t->flags & SN_CLALLOW) &&
+ else if (unlikely(txn->flags & TX_CLALLOW) &&
(exp->action == ACT_ALLOW ||
exp->action == ACT_DENY ||
exp->action == ACT_TARPIT))
@@ -3742,18 +3742,18 @@
break;
case ACT_ALLOW:
- t->flags |= SN_CLALLOW;
+ txn->flags |= TX_CLALLOW;
done = 1;
break;
case ACT_DENY:
- t->flags |= SN_CLDENY;
+ txn->flags |= TX_CLDENY;
t->be->beprm->denied_req++;
done = 1;
break;
case ACT_TARPIT:
- t->flags |= SN_CLTARPIT;
+ txn->flags |= TX_CLTARPIT;
t->be->beprm->denied_req++;
done = 1;
break;
@@ -3800,8 +3800,9 @@
*/
int apply_filters_to_request(struct session *t, struct buffer *req, struct hdr_exp *exp)
{
+ struct http_txn *txn = &t->txn;
/* iterate through the filters in the outer loop */
- while (exp && !(t->flags & (SN_CLDENY|SN_CLTARPIT))) {
+ while (exp && !(txn->flags & (TX_CLDENY|TX_CLTARPIT))) {
int ret;
/*
@@ -3810,7 +3811,7 @@
* the evaluation.
*/
- if ((t->flags & SN_CLALLOW) &&
+ if ((txn->flags & TX_CLALLOW) &&
(exp->action == ACT_ALLOW || exp->action == ACT_DENY ||
exp->action == ACT_TARPIT || exp->action == ACT_PASS)) {
exp = exp->next;
@@ -4014,23 +4015,24 @@
!memcmp(p3, srv->cookie, delim - p3)) {
if (srv->state & SRV_RUNNING || t->be->beprm->options & PR_O_PERSIST) {
/* we found the server and it's usable */
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_VALID | SN_DIRECT | SN_ASSIGNED;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_VALID;
+ t->flags |= SN_DIRECT | SN_ASSIGNED;
t->srv = srv;
break;
} else {
/* we found a server, but it's down */
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_DOWN;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_DOWN;
}
}
srv = srv->next;
}
- if (!srv && !(t->flags & SN_CK_DOWN)) {
+ if (!srv && !(txn->flags & TX_CK_DOWN)) {
/* no server matched this cookie */
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_INVALID;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_INVALID;
}
/* depending on the cookie mode, we may have to either :
@@ -4123,13 +4125,14 @@
if (strcmp(srv->id, asession_temp->serverid) == 0) {
if (srv->state & SRV_RUNNING || t->be->beprm->options & PR_O_PERSIST) {
/* we found the server and it's usable */
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_VALID | SN_DIRECT | SN_ASSIGNED;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_VALID;
+ t->flags |= SN_DIRECT | SN_ASSIGNED;
t->srv = srv;
break;
} else {
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_DOWN;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_DOWN;
}
}
srv = srv->next;
@@ -4194,9 +4197,9 @@
old_idx = 0;
while (!last_hdr) {
- if (unlikely(t->flags & SN_SVDENY))
+ if (unlikely(txn->flags & TX_SVDENY))
return 1;
- else if (unlikely(t->flags & SN_SVALLOW) &&
+ else if (unlikely(txn->flags & TX_SVALLOW) &&
(exp->action == ACT_ALLOW ||
exp->action == ACT_DENY))
return 0;
@@ -4225,12 +4228,12 @@
if (regexec(exp->preg, cur_ptr, MAX_MATCH, pmatch, 0) == 0) {
switch (exp->action) {
case ACT_ALLOW:
- t->flags |= SN_SVALLOW;
+ txn->flags |= TX_SVALLOW;
last_hdr = 1;
break;
case ACT_DENY:
- t->flags |= SN_SVDENY;
+ txn->flags |= TX_SVDENY;
last_hdr = 1;
break;
@@ -4287,9 +4290,9 @@
int len, delta;
- if (unlikely(t->flags & SN_SVDENY))
+ if (unlikely(txn->flags & TX_SVDENY))
return 1;
- else if (unlikely(t->flags & SN_SVALLOW) &&
+ else if (unlikely(txn->flags & TX_SVALLOW) &&
(exp->action == ACT_ALLOW ||
exp->action == ACT_DENY))
return 0;
@@ -4314,12 +4317,12 @@
if (regexec(exp->preg, cur_ptr, MAX_MATCH, pmatch, 0) == 0) {
switch (exp->action) {
case ACT_ALLOW:
- t->flags |= SN_SVALLOW;
+ txn->flags |= TX_SVALLOW;
done = 1;
break;
case ACT_DENY:
- t->flags |= SN_SVDENY;
+ txn->flags |= TX_SVDENY;
done = 1;
break;
@@ -4364,8 +4367,9 @@
*/
int apply_filters_to_response(struct session *t, struct buffer *rtr, struct hdr_exp *exp)
{
+ struct http_txn *txn = &t->txn;
/* iterate through the filters in the outer loop */
- while (exp && !(t->flags & SN_SVDENY)) {
+ while (exp && !(txn->flags & TX_SVDENY)) {
int ret;
/*
@@ -4374,7 +4378,7 @@
* the evaluation.
*/
- if ((t->flags & SN_SVALLOW) &&
+ if ((txn->flags & TX_SVALLOW) &&
(exp->action == ACT_ALLOW || exp->action == ACT_DENY ||
exp->action == ACT_PASS)) {
exp = exp->next;
@@ -4445,7 +4449,7 @@
}
/* OK, right now we know we have a set-cookie at cur_ptr */
- t->flags |= SN_SCK_ANY;
+ txn->flags |= TX_SCK_ANY;
/* maybe we only wanted to see if there was a set-cookie */
@@ -4506,7 +4510,7 @@
if ((p2 - p1 == t->be->beprm->cookie_len) && (t->be->beprm->cookie_name != NULL) &&
(memcmp(p1, t->be->beprm->cookie_name, p2 - p1) == 0)) {
/* Cool... it's the right one */
- t->flags |= SN_SCK_SEEN;
+ txn->flags |= TX_SCK_SEEN;
/* If the cookie is in insert mode on a known server, we'll delete
* this occurrence because we'll insert another one later.
@@ -4522,7 +4526,7 @@
cur_next += delta;
txn->rsp.eoh += delta;
- t->flags |= SN_SCK_DELETED;
+ txn->flags |= TX_SCK_DELETED;
}
else if ((t->srv) && (t->srv->cookie) &&
(t->be->beprm->options & PR_O_COOK_RW)) {
@@ -4534,7 +4538,7 @@
cur_next += delta;
txn->rsp.eoh += delta;
- t->flags |= SN_SCK_INSERTED | SN_SCK_DELETED;
+ txn->flags |= TX_SCK_INSERTED | TX_SCK_DELETED;
}
else if ((t->srv) && (t->srv->cookie) &&
(t->be->beprm->options & PR_O_COOK_PFX)) {
@@ -4547,7 +4551,7 @@
txn->rsp.eoh += delta;
p3[t->srv->cklen] = COOKIE_DELIM;
- t->flags |= SN_SCK_INSERTED | SN_SCK_DELETED;
+ txn->flags |= TX_SCK_INSERTED | TX_SCK_DELETED;
}
}
/* next, let's see if the cookie is our appcookie */
@@ -4623,7 +4627,7 @@
char *cur_ptr, *cur_end, *cur_next;
int cur_idx;
- if (!t->flags & SN_CACHEABLE)
+ if (!txn->flags & TX_CACHEABLE)
return;
/* Iterate through the headers.
@@ -4647,7 +4651,7 @@
if ((cur_end - cur_ptr >= 16) &&
strncasecmp(cur_ptr, "Pragma: no-cache", 16) == 0) {
- t->flags &= ~SN_CACHEABLE & ~SN_CACHE_COOK;
+ txn->flags &= ~TX_CACHEABLE & ~TX_CACHE_COOK;
return;
}
@@ -4677,7 +4681,7 @@
if ((cur_end - p1 >= 21) &&
strncasecmp(p1, "no-cache=\"set-cookie", 20) == 0
&& (p1[20] == '"' || p1[20] == ','))
- t->flags &= ~SN_CACHE_COOK;
+ txn->flags &= ~TX_CACHE_COOK;
continue;
}
@@ -4686,12 +4690,12 @@
((p2 - p1 == 8) && strncasecmp(p1, "no-store", 8) == 0) ||
((p2 - p1 == 9) && strncasecmp(p1, "max-age=0", 9) == 0) ||
((p2 - p1 == 10) && strncasecmp(p1, "s-maxage=0", 10) == 0)) {
- t->flags &= ~SN_CACHEABLE & ~SN_CACHE_COOK;
+ txn->flags &= ~TX_CACHEABLE & ~TX_CACHE_COOK;
return;
}
if ((p2 - p1 == 6) && strncasecmp(p1, "public", 6) == 0) {
- t->flags |= SN_CACHEABLE | SN_CACHE_COOK;
+ txn->flags |= TX_CACHEABLE | TX_CACHE_COOK;
continue;
}
}
@@ -4704,6 +4708,7 @@
*/
void get_srv_from_appsession(struct session *t, const char *begin, int len)
{
+ struct http_txn *txn = &t->txn;
appsess *asession_temp = NULL;
appsess local_asession;
char *request_line;
@@ -4770,13 +4775,14 @@
if (strcmp(srv->id, asession_temp->serverid) == 0) {
if (srv->state & SRV_RUNNING || t->be->beprm->options & PR_O_PERSIST) {
/* we found the server and it's usable */
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_VALID | SN_DIRECT | SN_ASSIGNED;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_VALID;
+ t->flags |= SN_DIRECT | SN_ASSIGNED;
t->srv = srv;
break;
} else {
- t->flags &= ~SN_CK_MASK;
- t->flags |= SN_CK_DOWN;
+ txn->flags &= ~TX_CK_MASK;
+ txn->flags |= TX_CK_DOWN;
}
}
srv = srv->next;