| 123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591 | 
							- /* <!-- copyright */
 
- /*
 
-  * aria2 - The high speed download utility
 
-  *
 
-  * Copyright (C) 2006 Tatsuhiro Tsujikawa
 
-  *
 
-  * This program is free software; you can redistribute it and/or modify
 
-  * it under the terms of the GNU General Public License as published by
 
-  * the Free Software Foundation; either version 2 of the License, or
 
-  * (at your option) any later version.
 
-  *
 
-  * This program is distributed in the hope that it will be useful,
 
-  * but WITHOUT ANY WARRANTY; without even the implied warranty of
 
-  * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE.  See the
 
-  * GNU General Public License for more details.
 
-  *
 
-  * You should have received a copy of the GNU General Public License
 
-  * along with this program; if not, write to the Free Software
 
-  * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA  02110-1301  USA
 
-  *
 
-  * In addition, as a special exception, the copyright holders give
 
-  * permission to link the code of portions of this program with the
 
-  * OpenSSL library under certain conditions as described in each
 
-  * individual source file, and distribute linked combinations
 
-  * including the two.
 
-  * You must obey the GNU General Public License in all respects
 
-  * for all of the code used other than OpenSSL.  If you modify
 
-  * file(s) with this exception, you may extend this exception to your
 
-  * version of the file(s), but you are not obligated to do so.  If you
 
-  * do not wish to do so, delete this exception statement from your
 
-  * version.  If you delete this exception statement from all source
 
-  * files in the program, then also delete it here.
 
-  */
 
- /* copyright --> */
 
- #include "AbstractCommand.h"
 
- #include <algorithm>
 
- #include "Request.h"
 
- #include "DownloadEngine.h"
 
- #include "Option.h"
 
- #include "PeerStat.h"
 
- #include "SegmentMan.h"
 
- #include "Logger.h"
 
- #include "Segment.h"
 
- #include "DlAbortEx.h"
 
- #include "DlRetryEx.h"
 
- #include "DownloadFailureException.h"
 
- #include "CreateRequestCommand.h"
 
- #include "InitiateConnectionCommandFactory.h"
 
- #include "SleepCommand.h"
 
- #ifdef ENABLE_ASYNC_DNS
 
- #include "AsyncNameResolver.h"
 
- #endif // ENABLE_ASYNC_DNS
 
- #include "StreamCheckIntegrityEntry.h"
 
- #include "PieceStorage.h"
 
- #include "Socket.h"
 
- #include "message.h"
 
- #include "prefs.h"
 
- #include "StringFormat.h"
 
- #include "ServerStat.h"
 
- #include "RequestGroupMan.h"
 
- #include "A2STR.h"
 
- #include "Util.h"
 
- #include "LogFactory.h"
 
- #include "DownloadContext.h"
 
- namespace aria2 {
 
- AbstractCommand::AbstractCommand(int32_t cuid,
 
- 				 const SharedHandle<Request>& req,
 
- 				 const SharedHandle<FileEntry>& fileEntry,
 
- 				 RequestGroup* requestGroup,
 
- 				 DownloadEngine* e,
 
- 				 const SocketHandle& s):
 
-   Command(cuid), _requestGroup(requestGroup),
 
-   req(req), _fileEntry(fileEntry), e(e), socket(s),
 
-   checkSocketIsReadable(false), checkSocketIsWritable(false),
 
-   nameResolverCheck(false)
 
- {
 
-   if(!socket.isNull() && socket->isOpen()) {
 
-     setReadCheckSocket(socket);
 
-   }
 
-   timeout = _requestGroup->getTimeout();
 
-   _requestGroup->increaseStreamConnection();
 
-   _requestGroup->increaseNumCommand();
 
- }
 
- AbstractCommand::~AbstractCommand() {
 
-   disableReadCheckSocket();
 
-   disableWriteCheckSocket();
 
- #ifdef ENABLE_ASYNC_DNS
 
-   disableNameResolverCheck(_asyncNameResolver);
 
- #endif // ENABLE_ASYNC_DNS
 
-   _requestGroup->decreaseNumCommand();
 
-   _requestGroup->decreaseStreamConnection();
 
- }
 
- bool AbstractCommand::execute() {
 
-   logger->debug("CUID#%d - socket: read:%d, write:%d, hup:%d, err:%d",
 
- 		cuid, _readEvent, _writeEvent, _hupEvent, _errorEvent);
 
-   try {
 
-     if(_requestGroup->downloadFinished() || _requestGroup->isHaltRequested()) {
 
-       //logger->debug("CUID#%d - finished.", cuid);
 
-       return true;
 
-     }
 
-     // TODO it is not needed to check other PeerStats every time.
 
-     // Find faster Request when this is the only active Request
 
-     if(!req.isNull() && _requestGroup->getNumStreamConnection() == 1 &&
 
-        _fileEntry->countPooledRequest() > 0) {
 
-       SharedHandle<Request> fasterRequest = _fileEntry->findFasterRequest(req);
 
-       if(!fasterRequest.isNull()) {
 
- 	logger->info("CUID#%d - Use faster Request hostname=%s, port=%u",
 
- 		     cuid,
 
- 		     fasterRequest->getHost().c_str(),
 
- 		     fasterRequest->getPort());
 
- 	// Cancel current Request object and use faster one.
 
- 	_fileEntry->removeRequest(req);
 
- 	Command* command =
 
- 	  InitiateConnectionCommandFactory::createInitiateConnectionCommand
 
- 	  (cuid, fasterRequest, _fileEntry, _requestGroup, e);
 
- 	e->setNoWait(true);
 
- 	e->commands.push_back(command);
 
- 	return true;
 
-       }
 
-     }
 
-     if((checkSocketIsReadable && _readEvent) ||
 
-        (checkSocketIsWritable && _writeEvent) ||
 
-        _hupEvent ||
 
- #ifdef ENABLE_ASYNC_DNS
 
-        (nameResolverCheck && nameResolveFinished()) ||
 
- #endif // ENABLE_ASYNC_DNS
 
-        (!checkSocketIsReadable && !checkSocketIsWritable && !nameResolverCheck)) {
 
-       checkPoint.reset();
 
-       if(!_requestGroup->getPieceStorage().isNull()) {
 
- 	_segments.clear();
 
- 	_requestGroup->getSegmentMan()->getInFlightSegment(_segments, cuid);
 
- 	if(req.isNull() || req->getMaxPipelinedRequest() == 1 ||
 
- 	   _requestGroup->getDownloadContext()->getFileEntries().size() == 1) {
 
- 	  if(_segments.empty()) {
 
- 	    SharedHandle<Segment> segment =
 
- 	      _requestGroup->getSegmentMan()->getSegment(cuid);
 
- 	    if(!segment.isNull()) {
 
- 	      _segments.push_back(segment);
 
- 	    }
 
- 	  }
 
- 	  if(_segments.empty()) {
 
- 	    // TODO socket could be pooled here if pipelining is enabled...
 
- 	    logger->info(MSG_NO_SEGMENT_AVAILABLE, cuid);
 
- 	    // When all segments are ignored in SegmentMan, there are
 
- 	    // no URIs available, so don't retry.
 
- 	    if(_requestGroup->getSegmentMan()->allSegmentsIgnored()) {
 
- 	      return true;
 
- 	    } else {
 
- 	      return prepareForRetry(1);
 
- 	    }
 
- 	  }
 
- 	} else {
 
- 	  size_t maxSegments = req->getMaxPipelinedRequest();
 
- 	  if(_segments.size() < maxSegments) {
 
- 	      _requestGroup->getSegmentMan()->getSegment
 
- 	      (_segments, cuid, _fileEntry, maxSegments);
 
- 	  }
 
- 	  if(_segments.empty()) {
 
- 	    return prepareForRetry(0);
 
- 	  }
 
- 	}
 
-       }
 
-       return executeInternal();
 
-     } else if(_errorEvent) {
 
-       throw DL_RETRY_EX
 
- 	(StringFormat(MSG_NETWORK_PROBLEM,
 
- 		      socket->getSocketError().c_str()).str());
 
-     } else {
 
-       if(checkPoint.elapsed(timeout)) {
 
- 	// timeout triggers ServerStat error state.
 
- 	SharedHandle<ServerStat> ss =
 
- 	  e->_requestGroupMan->getOrCreateServerStat(req->getHost(),
 
- 						     req->getProtocol());
 
- 	ss->setError();
 
- 	throw DL_RETRY_EX2(EX_TIME_OUT, downloadresultcode::TIME_OUT);
 
-       }
 
-       e->commands.push_back(this);
 
-       return false;
 
-     }
 
-   } catch(DlAbortEx& err) {
 
-     if(req.isNull()) {
 
-       logger->debug(EX_EXCEPTION_CAUGHT, err);
 
-     } else {
 
-       logger->error(MSG_DOWNLOAD_ABORTED,
 
- 		    DL_ABORT_EX2(StringFormat
 
- 				 ("URI=%s", req->getCurrentUrl().c_str()).str(),err),
 
- 		    cuid, req->getUrl().c_str());
 
-       _fileEntry->addURIResult(req->getUrl(), err.getCode());
 
-       _requestGroup->setLastUriResult(req->getUrl(), err.getCode());
 
-     }
 
-     onAbort();
 
-     tryReserved();
 
-     return true;
 
-   } catch(DlRetryEx& err) {
 
-     assert(!req.isNull());
 
-     logger->info(MSG_RESTARTING_DOWNLOAD,
 
- 		 DL_RETRY_EX2(StringFormat
 
- 			     ("URI=%s", req->getCurrentUrl().c_str()).str(),err),
 
- 		 cuid, req->getUrl().c_str());
 
-     req->addTryCount();
 
-     req->resetRedirectCount();
 
-     const unsigned int maxTries = getOption()->getAsInt(PREF_MAX_TRIES);
 
-     bool isAbort = maxTries != 0 && req->getTryCount() >= maxTries;
 
-     if(isAbort) {
 
-       onAbort();
 
-       logger->info(MSG_MAX_TRY, cuid, req->getTryCount());
 
-       logger->error(MSG_DOWNLOAD_ABORTED, err, cuid, req->getUrl().c_str());
 
-       _fileEntry->addURIResult(req->getUrl(), err.getCode());
 
-       _requestGroup->setLastUriResult(req->getUrl(), err.getCode());
 
-       tryReserved();
 
-       return true;
 
-     } else {
 
-       return prepareForRetry(0);
 
-     }
 
-   } catch(DownloadFailureException& err) {
 
-     logger->error(EX_EXCEPTION_CAUGHT, err);
 
-     if(!req.isNull()) {
 
-       _fileEntry->addURIResult(req->getUrl(), err.getCode());
 
-       _requestGroup->setLastUriResult(req->getUrl(), err.getCode());
 
-     }
 
-     _requestGroup->setHaltRequested(true);
 
-     return true;
 
-   }
 
- }
 
- void AbstractCommand::tryReserved() {
 
-   if(_requestGroup->getDownloadContext()->getFileEntries().size() == 1) {
 
-     const SharedHandle<FileEntry>& entry =
 
-       _requestGroup->getDownloadContext()->getFirstFileEntry();
 
-     // Don't create new command if currently file length is unknown
 
-     // and there are no URI left. Because file length is unknown, we
 
-     // can assume that there are no in-flight request object.
 
-     if(entry->getLength() == 0 && entry->getRemainingUris().empty()) {
 
-       logger->debug("CUID#%d - Not trying next request."
 
- 		    " No reserved/pooled request is remaining and"
 
- 		    " total length is still unknown.", cuid);
 
-       return;
 
-     }
 
-   }
 
-   logger->debug("CUID#%d - Trying reserved/pooled request.", cuid);
 
-   Commands commands;
 
-   _requestGroup->createNextCommand(commands, e, 1);
 
-   e->setNoWait(true);
 
-   e->addCommand(commands);
 
- }
 
- bool AbstractCommand::prepareForRetry(time_t wait) {
 
-   if(!_requestGroup->getPieceStorage().isNull()) {
 
-     _requestGroup->getSegmentMan()->cancelSegment(cuid);
 
-   }
 
-   if(!req.isNull()) {
 
-     _fileEntry->poolRequest(req);
 
-     logger->debug("CUID#%d - Pooling request URI=%s",
 
- 		  cuid, req->getUrl().c_str());
 
-     if(!_requestGroup->getSegmentMan().isNull()) {
 
-       _requestGroup->getSegmentMan()->recognizeSegmentFor(_fileEntry);
 
-     }
 
-   }
 
-   Command* command = new CreateRequestCommand(cuid, _requestGroup, e);
 
-   if(wait == 0) {
 
-     e->setNoWait(true);
 
-     e->commands.push_back(command);
 
-   } else {
 
-     SleepCommand* scom = new SleepCommand(cuid, e, _requestGroup,
 
- 					  command, wait);
 
-     e->commands.push_back(scom);
 
-   }
 
-   return true;
 
- }
 
- void AbstractCommand::onAbort() {
 
-   if(!req.isNull()) {
 
-     logger->debug(req->getCurrentUrl().c_str());
 
-     // TODO This might be a problem if the failure is caused by proxy.
 
-     e->_requestGroupMan->getOrCreateServerStat(req->getHost(),
 
- 					       req->getProtocol())->setError();
 
-     _fileEntry->removeIdenticalURI(req->getUrl());
 
-     _fileEntry->removeRequest(req);
 
-   }
 
-   logger->debug("CUID#%d - Aborting download", cuid);
 
-   if(!_requestGroup->getPieceStorage().isNull()) {
 
-     _requestGroup->getSegmentMan()->cancelSegment(cuid);
 
-   }
 
- }
 
- void AbstractCommand::disableReadCheckSocket() {
 
-   if(checkSocketIsReadable) {
 
-     e->deleteSocketForReadCheck(readCheckTarget, this);
 
-     checkSocketIsReadable = false;
 
-     readCheckTarget = SocketHandle();
 
-   }  
 
- }
 
- void AbstractCommand::setReadCheckSocket(const SocketHandle& socket) {
 
-   if(!socket->isOpen()) {
 
-     disableReadCheckSocket();
 
-   } else {
 
-     if(checkSocketIsReadable) {
 
-       if(readCheckTarget != socket) {
 
- 	e->deleteSocketForReadCheck(readCheckTarget, this);
 
- 	e->addSocketForReadCheck(socket, this);
 
- 	readCheckTarget = socket;
 
-       }
 
-     } else {
 
-       e->addSocketForReadCheck(socket, this);
 
-       checkSocketIsReadable = true;
 
-       readCheckTarget = socket;
 
-     }
 
-   }
 
- }
 
- void AbstractCommand::setReadCheckSocketIf
 
- (const SharedHandle<SocketCore>& socket, bool pred)
 
- {
 
-   if(pred) {
 
-     setReadCheckSocket(socket);
 
-   } else {
 
-     disableReadCheckSocket();
 
-   }
 
- }
 
- void AbstractCommand::disableWriteCheckSocket() {
 
-   if(checkSocketIsWritable) {
 
-     e->deleteSocketForWriteCheck(writeCheckTarget, this);
 
-     checkSocketIsWritable = false;
 
-     writeCheckTarget = SocketHandle();
 
-   }
 
- }
 
- void AbstractCommand::setWriteCheckSocket(const SocketHandle& socket) {
 
-   if(!socket->isOpen()) {
 
-     disableWriteCheckSocket();
 
-   } else {
 
-     if(checkSocketIsWritable) {
 
-       if(writeCheckTarget != socket) {
 
- 	e->deleteSocketForWriteCheck(writeCheckTarget, this);
 
- 	e->addSocketForWriteCheck(socket, this);
 
- 	writeCheckTarget = socket;
 
-       }
 
-     } else {
 
-       e->addSocketForWriteCheck(socket, this);
 
-       checkSocketIsWritable = true;
 
-       writeCheckTarget = socket;
 
-     }
 
-   }
 
- }
 
- void AbstractCommand::setWriteCheckSocketIf
 
- (const SharedHandle<SocketCore>& socket, bool pred)
 
- {
 
-   if(pred) {
 
-     setWriteCheckSocket(socket);
 
-   } else {
 
-     disableWriteCheckSocket();
 
-   }
 
- }
 
- static const std::string& getProxyStringFor(const std::string& proxyPref,
 
- 					    const SharedHandle<Option>& option)
 
- {
 
-   if(option->defined(proxyPref)) {
 
-     return option->get(proxyPref);
 
-   } else {
 
-     return option->get(PREF_ALL_PROXY);
 
-   }
 
- }
 
- static bool isProxyUsed(const std::string& proxyPref,
 
- 			const SharedHandle<Option>& option)
 
- {
 
-   std::string proxy = getProxyStringFor(proxyPref, option);
 
-   if(proxy.empty()) {
 
-     return false;
 
-   } else {
 
-     return Request().setUrl(proxy);
 
-   }
 
- }
 
- static bool isProxyRequest(const std::string& protocol,
 
- 			   const SharedHandle<Option>& option)
 
- {
 
-   return
 
-     (protocol == Request::PROTO_HTTP && isProxyUsed(PREF_HTTP_PROXY, option)) ||
 
-     (protocol == Request::PROTO_HTTPS && isProxyUsed(PREF_HTTPS_PROXY,option))||
 
-     (protocol == Request::PROTO_FTP && isProxyUsed(PREF_FTP_PROXY, option));
 
- }
 
- class DomainMatch {
 
- private:
 
-   std::string _hostname;
 
- public:
 
-   DomainMatch(const std::string& hostname):_hostname(hostname) {}
 
-   bool operator()(const std::string& domain) const
 
-   {
 
-     if(Util::startsWith(domain, ".")) {
 
-       return Util::endsWith(_hostname, domain);
 
-     } else {
 
-       return Util::endsWith(_hostname, "."+domain);
 
-     }
 
-   }
 
- };
 
- static bool inNoProxy(const SharedHandle<Request>& req,
 
- 		      const std::string& noProxy)
 
- {
 
-   std::deque<std::string> entries;
 
-   Util::slice(entries, noProxy, ',', true);
 
-   if(entries.empty()) {
 
-     return false;
 
-   }
 
-   return
 
-     std::find_if(entries.begin(), entries.end(),
 
- 		 DomainMatch("."+req->getHost())) != entries.end();
 
- }
 
- bool AbstractCommand::isProxyDefined() const
 
- {
 
-   return isProxyRequest(req->getProtocol(), getOption()) &&
 
-     !inNoProxy(req, getOption()->get(PREF_NO_PROXY));
 
- }
 
- static const std::string& getProxyString(const SharedHandle<Request>& req,
 
- 					 const SharedHandle<Option>& option)
 
- {
 
-   if(req->getProtocol() == Request::PROTO_HTTP) {
 
-     return getProxyStringFor(PREF_HTTP_PROXY, option);
 
-   } else if(req->getProtocol() == Request::PROTO_HTTPS) {
 
-     return getProxyStringFor(PREF_HTTPS_PROXY, option);
 
-   } else if(req->getProtocol() == Request::PROTO_FTP) {
 
-     return getProxyStringFor(PREF_FTP_PROXY, option);
 
-   } else {
 
-     return A2STR::NIL;
 
-   }
 
- }
 
- SharedHandle<Request> AbstractCommand::createProxyRequest() const
 
- {
 
-   SharedHandle<Request> proxyRequest;
 
-   if(inNoProxy(req, getOption()->get(PREF_NO_PROXY))) {
 
-     return proxyRequest;
 
-   }
 
-   std::string proxy = getProxyString(req, getOption());
 
-   if(!proxy.empty()) {
 
-     proxyRequest.reset(new Request());
 
-     if(proxyRequest->setUrl(proxy)) {
 
-       logger->debug("CUID#%d - Using proxy", cuid);      
 
-     } else {
 
-       logger->debug("CUID#%d - Failed to parse proxy string", cuid);
 
-       proxyRequest.reset();
 
-     }
 
-   }
 
-   return proxyRequest;
 
- }
 
- #ifdef ENABLE_ASYNC_DNS
 
- bool AbstractCommand::isAsyncNameResolverInitialized() const
 
- {
 
-   return !_asyncNameResolver.isNull();
 
- }
 
- void AbstractCommand::initAsyncNameResolver(const std::string& hostname)
 
- {
 
-   _asyncNameResolver.reset(new AsyncNameResolver());
 
-   logger->info(MSG_RESOLVING_HOSTNAME, cuid, hostname.c_str());
 
-   _asyncNameResolver->resolve(hostname);
 
-   setNameResolverCheck(_asyncNameResolver);
 
- }
 
- bool AbstractCommand::asyncResolveHostname()
 
- {
 
-   switch(_asyncNameResolver->getStatus()) {
 
-   case AsyncNameResolver::STATUS_SUCCESS:
 
-     return true;
 
-   case AsyncNameResolver::STATUS_ERROR:
 
-     if(!isProxyRequest(req->getProtocol(), getOption())) {
 
-       e->_requestGroupMan->getOrCreateServerStat
 
- 	(req->getHost(), req->getProtocol())->setError();
 
-     }
 
-     throw DL_ABORT_EX(StringFormat(MSG_NAME_RESOLUTION_FAILED, cuid,
 
- 				 _asyncNameResolver->getHostname().c_str(),
 
- 				 _asyncNameResolver->getError().c_str()).str());
 
-   default:
 
-     return false;
 
-   }
 
- }
 
- const std::deque<std::string>& AbstractCommand::getResolvedAddresses()
 
- {
 
-   return _asyncNameResolver->getResolvedAddresses();
 
- }
 
- void AbstractCommand::setNameResolverCheck
 
- (const SharedHandle<AsyncNameResolver>& resolver) {
 
-   if(!resolver.isNull()) {
 
-     nameResolverCheck = true;
 
-     e->addNameResolverCheck(resolver, this);
 
-   }
 
- }
 
- void AbstractCommand::disableNameResolverCheck
 
- (const SharedHandle<AsyncNameResolver>& resolver) {
 
-   if(!resolver.isNull()) {
 
-     nameResolverCheck = false;
 
-     e->deleteNameResolverCheck(resolver, this);
 
-   }
 
- }
 
- bool AbstractCommand::nameResolveFinished() const {
 
-   return
 
-     _asyncNameResolver->getStatus() ==  AsyncNameResolver::STATUS_SUCCESS ||
 
-     _asyncNameResolver->getStatus() == AsyncNameResolver::STATUS_ERROR;
 
- }
 
- #endif // ENABLE_ASYNC_DNS
 
- void AbstractCommand::prepareForNextAction(Command* nextCommand)
 
- {
 
-   CheckIntegrityEntryHandle entry
 
-     (new StreamCheckIntegrityEntry(_requestGroup, nextCommand));
 
-   std::deque<Command*> commands;
 
-   _requestGroup->processCheckIntegrityEntry(commands, entry, e);
 
-   e->addCommand(commands);
 
-   e->setNoWait(true);
 
- }
 
- bool AbstractCommand::checkIfConnectionEstablished
 
- (const SharedHandle<SocketCore>& socket,
 
-  const std::string& connectedHostname,
 
-  const std::string& connectedAddr,
 
-  uint16_t connectedPort)
 
- {
 
-   if(socket->isReadable(0)) {
 
-     std::string error = socket->getSocketError();
 
-     if(!error.empty()) {
 
-       // See also InitiateConnectionCommand::executeInternal()
 
-       e->markBadIPAddress(connectedHostname, connectedAddr, connectedPort);
 
-       if(!e->findCachedIPAddress(connectedHostname, connectedPort).empty()) {
 
- 	logger->info(MSG_CONNECT_FAILED_AND_RETRY,
 
- 		     cuid, connectedAddr.c_str(), connectedPort);
 
- 	Command* command =
 
- 	  InitiateConnectionCommandFactory::createInitiateConnectionCommand
 
- 	  (cuid, req, _fileEntry, _requestGroup, e);
 
- 	e->setNoWait(true);
 
- 	e->commands.push_back(command);
 
- 	return false;
 
-       }
 
-       e->removeCachedIPAddress(connectedHostname, connectedPort);
 
-       // Don't set error if proxy server is used and its method is GET.
 
-       if(resolveProxyMethod(req->getProtocol()) != V_GET ||
 
- 	 !isProxyRequest(req->getProtocol(), getOption())) {
 
- 	e->_requestGroupMan->getOrCreateServerStat
 
- 	  (req->getHost(), req->getProtocol())->setError();
 
-       }
 
-       throw DL_RETRY_EX
 
- 	(StringFormat(MSG_ESTABLISHING_CONNECTION_FAILED, error.c_str()).str());
 
-     }
 
-   }
 
-   return true;
 
- }
 
- const std::string& AbstractCommand::resolveProxyMethod
 
- (const std::string& protocol) const
 
- {
 
-   if(getOption()->get(PREF_PROXY_METHOD) == V_TUNNEL ||
 
-      Request::PROTO_HTTPS == protocol) {
 
-     return V_TUNNEL;
 
-   } else {
 
-     return V_GET;
 
-   }
 
- }
 
- const SharedHandle<Option>& AbstractCommand::getOption() const
 
- {
 
-   return _requestGroup->getOption();
 
- }
 
- } // namespace aria2
 
 
  |