Lines Matching defs:to
1 /* Licensed to the Apache Software Foundation (ASF) under one or more
4 * The ASF licenses this file to You under the Apache License, Version 2.0
10 * Unless required by applicable law or agreed to in writing, software
73 * now parse path/search args, according to rfc1738:
77 * unless proxy-nocanon is set to say it's raw
254 char chunk_hdr[20]; /* must be here due to transient bucket. */
265 /* We can't pass this EOS to the output_filters. */
295 * body already, unless we are EOS since everything is to be
304 * ap_save_brigade ensures these buckets to be set aside.
306 * bb brigade already has been created and does not need to get
336 "read request body failed to %pI (%s)"
352 /* input brigade still has an EOS which we can't pass to the output_filters. */
421 /* Once we hit EOS, we are ready to flush. */
424 /* We can't pass this EOS to the output_filters. */
469 * ap_save_brigade ensures these buckets to be set aside.
471 * bb brigade already has been created and does not need to get
501 "read request body failed to %pI (%s)"
558 /* We can't pass this EOS to the output_filters. */
568 * Let it take effect if we decide to store the body in a
577 /* can't spool any more in memory; write latest brigade to disk */
614 "write to temporary file %s failed",
629 * ap_save_brigade ensures these buckets to be set aside.
631 * body_brigade already has been created and does not need to get
675 * Transform buckets from one bucket allocator to another one by creating a
688 apr_bucket_brigade *from, apr_bucket_brigade *to)
696 apr_brigade_cleanup(to);
703 APR_BRIGADE_INSERT_TAIL(to, new);
707 APR_BRIGADE_INSERT_TAIL(to, new);
711 APR_BRIGADE_INSERT_TAIL(to, new);
771 * Reading anything with ap_get_brigade is likely to consume the
815 * request bodies, since we are willing to keep in
836 "prefetch request body failed to %pI (%s)"
850 * ap_save_brigade ensures these buckets to be set aside.
852 * input_brigade already has been created and does not need to get
859 " to %pI (%s) from %s (%s)",
866 * for ap_get_brigade's filters to fetch us another bucket,
899 * options to restore the default behavior where desireable.
901 * We have to compute content length by reading the entire request
903 * input to a temporary file. Chunked is always preferable.
956 /* If we have to spool the body, do it now, before connecting or
973 * If we plan to close the backend connection sent Connection: close
1029 "pass request body failed to %pI (%s) from %s (%s)",
1040 * is converted to the RFC 1123 format.
1139 * local storage to the calling code in order for pread_len to make
1174 * MS IIS servers, so we need to determine just how to handle
1198 "Starting body due to bogus non-header "
1224 ++value; /* Skip to start of value */
1230 /* make sure we add so as not to destroy duplicated headers
1243 if (len == 0) /* time to exit the larger loop as well */
1280 * Limit the number of interim responses we sent back to the client. Otherwise
1282 * an unlimited number of interim responses to the client. Thus if we cross
1358 /* In case anyone needs to know, this is a fake request that is really a
1389 * WITHOUT ANY response to trigger a retry by the client
1402 "Closing connection to client because"
1415 /* Need to return OK to avoid sending an error message */
1421 "NOT Closing connection to client"
1481 /* N.B. for HTTP/1.0 clients, we have to fold line-wrapped headers*/
1499 * ap_send_error relies on a headers_out to be present. we
1501 * to have nothing to do with the incoming packet
1532 * XXX: We aught to treat such a response as uncachable
1544 * ap_http_filter to know where to end.
1615 /* Reset to old timeout iff we've adjusted it */
1626 /* RFC2616 tells us to forward this.
1638 * We need to set "r->expecting_100 = 1" otherwise origin
1649 /* FIXME: refine this to be able to specify per-response-status
1650 * policies and maybe also add option to bail out with 502
1658 * ProxyPassReverse/etc from here to ap_proxy_read_headers
1677 * exclusive possibilities, that just happen to require very
1688 * However, chances are that we are not really talking to an
1689 * HTTP/0.9 server, but to some different protocol, therefore
1690 * the best guess IMHO is to always treat the buffer as "text/x":
1710 /* Add minimal headers needed to allow http_in filter
1733 /* We need to copy the output headers and treat them as input
1734 * headers as well. BUT, we need to do this before we remove
1736 * ap_http_filter to know where to end.
1757 /* read the body, pass it to the output filters */
1785 /* flush to the client and switch to blocking mode */
1804 "Response chunk/line was too large to parse");
1817 * through a response, our only option is to
1873 /* finally it is safe to clean up the brigade from the
1881 * left waiting for a slow client to eventually
1898 * longer safe to fiddle around with backend as it might
1920 * left waiting for a slow client to eventually
1937 /* We have to cleanup bb brigade, because buckets inserted to it could be
1953 /* If our connection with the client is to be aborted, return DONE. */
1974 * also, if we have trouble which is clearly specific to the proxy, then
2000 * Use a shorter-lived pool to reduce memory usage
2055 * with the client, do NOT reuse the connection to the backend, because
2056 * we cannot forward a failure to the client in this case as the client
2076 /* Prefetch (nonlocking) the request body so to increase the chance to get
2079 * to minimize the delay between this connection is considered alive and
2081 * filter retain the data). This is a best effort to prevent the backend
2083 * to reduce to the minimum the unavoidable local is_socket_connected() vs
2095 /* We need to reset backend->close now, since ap_proxy_http_prefetch() set
2096 * it to disable the reuse of the connection *after* this request (no keep-
2097 * alive), not to close any reusable connection before this request. However
2099 * when ap_proxy_connect_backend() below provides the connection to close.
2117 * ap_proxy_http_prefetch() would have to be called every time,
2126 "HTTP: failed to make connection to backend: %s",
2142 * requested, such that mod_ssl can check if it is requested to do
2160 "socket check failed to %pI (%s)",
2167 /* Don't recycle the connection if prefetch (above) told not to do so */
2187 "HTTP: 100-Continue failed to %pI (%s)",
2196 /* Step Five: Receive the Response... Fall thru to cleanup */