struct client *client;
char *zproxy;
enum {
- Conn_Resolving,
+ Conn_Closed,
Conn_Connecting,
- Conn_Open,
- Conn_Dead
+ Conn_Open
} state;
int operation_timeout;
int session_timeout;
co->zproxy = 0;
client_set_connection(cl, co);
co->link = 0;
- co->state = Conn_Resolving;
+ co->state = Conn_Closed;
co->operation_timeout = operation_timeout;
co->session_timeout = session_timeout;
{
int r = ZOOM_connection_exec_task(co->link);
if (!r)
- yaz_log(YLOG_WARN, "No task was executed for connection");
- iochan_setflags(co->iochan, ZOOM_connection_get_mask(co->link));
- iochan_setfd(co->iochan, ZOOM_connection_get_socket(co->link));
+ {
+ const char *error, *addinfo;
+ int err;
+ if ((err = ZOOM_connection_error(co->link, &error, &addinfo)))
+ {
+ if (co->client)
+ {
+ yaz_log(YLOG_LOG, "Error %s from %s",
+ error, client_get_id(co->client));
+ client_set_diagnostic(co->client, err);
+ client_set_state_nb(co->client, Client_Error);
+ }
+ }
+ }
+ else
+ {
+ iochan_setflags(co->iochan, ZOOM_connection_get_mask(co->link));
+ iochan_setfd(co->iochan, ZOOM_connection_get_socket(co->link));
+ }
}
static void connection_handler(IOCHAN iochan, int event)
static int connection_connect(struct connection *con, iochan_man_t iochan_man)
{
- ZOOM_connection link = 0;
struct host *host = connection_get_host(con);
ZOOM_options zoptions = ZOOM_options_create();
const char *auth;
if ((sru_version = session_setting_oneval(sdb, PZ_SRU_VERSION))
&& *sru_version)
ZOOM_options_set(zoptions, "sru_version", sru_version);
- if (!(link = ZOOM_connection_create(zoptions)))
+ if (!(con->link = ZOOM_connection_create(zoptions)))
{
yaz_log(YLOG_FATAL|YLOG_ERRNO, "Failed to create ZOOM Connection");
ZOOM_options_destroy(zoptions);
char http_hostport[512];
strcpy(http_hostport, "http://");
strcat(http_hostport, host->hostport);
- ZOOM_connection_connect(link, http_hostport, 0);
+ ZOOM_connection_connect(con->link, http_hostport, 0);
}
else
{
- ZOOM_connection_connect(link, host->hostport, 0);
+ ZOOM_connection_connect(con->link, host->hostport, 0);
}
- con->link = link;
con->iochan = iochan_create(-1, connection_handler, 0, "connection_socket");
con->state = Conn_Connecting;
iochan_settimeout(con->iochan, con->operation_timeout);
iochan_setdata(con->iochan, con);
iochan_add(iochan_man, con->iochan);
- /* this fragment is bad DRY: from client_prep_connection */
client_set_state(con->client, Client_Connecting);
ZOOM_options_destroy(zoptions);
return 0;
--- /dev/null
+<?xml version="1.0" encoding="UTF-8"?>
+<termlist><activeclients>0</activeclients>
+<list name="xtargets">
+<term>
+<id>id_solr</id>
+<name>LOC (SOLR)</name>
+<frequency>1043</frequency>
+<state>Client_Idle</state>
+<diagnostic>0</diagnostic>
+</term>
+</list>
+<list name="author">
+<term><name>Norton, Peter</name><frequency>2</frequency></term>
+<term><name>Aldrich, Richard W</name><frequency>1</frequency></term>
+<term><name>Anderson, Robert H</name><frequency>1</frequency></term>
+<term><name>Arnold, Ken</name><frequency>1</frequency></term>
+<term><name>Burgess, Mark</name><frequency>1</frequency></term>
+<term><name>Carasik, Anne H</name><frequency>1</frequency></term>
+<term><name>Davis, Phyllis</name><frequency>1</frequency></term>
+<term><name>Dowd, Kevin</name><frequency>1</frequency></term>
+<term><name>Farley, Marc</name><frequency>1</frequency></term>
+<term><name>Gennick, Jonathan</name><frequency>1</frequency></term>
+<term><name>Hawke, Constance S</name><frequency>1</frequency></term>
+<term><name>Hopgood, Adrian A</name><frequency>1</frequency></term>
+<term><name>Kaasgaard, Klaus</name><frequency>1</frequency></term>
+<term><name>Knittel, John</name><frequency>1</frequency></term>
+<term><name>Loudon, Kyle</name><frequency>1</frequency></term>
+</list>
+<list name="subject">
+<term><name>Computer file</name><frequency>35</frequency></term>
+<term><name>Computers</name><frequency>30</frequency></term>
+<term><name>Computer networks</name><frequency>22</frequency></term>
+<term><name>Computer science</name><frequency>16</frequency></term>
+<term><name>Computer graphics</name><frequency>15</frequency></term>
+<term><name>Computer security</name><frequency>15</frequency></term>
+<term><name>Operating systems</name><frequency>14</frequency></term>
+<term><name>Computer program language</name><frequency>13</frequency></term>
+<term><name>Microsoft Windows</name><frequency>13</frequency></term>
+<term><name>Computer software</name><frequency>8</frequency></term>
+<term><name>Computer systems</name><frequency>8</frequency></term>
+<term><name>Computer architecture</name><frequency>7</frequency></term>
+<term><name>Computer programs</name><frequency>6</frequency></term>
+<term><name>Internet</name><frequency>6</frequency></term>
+<term><name>Computer animation</name><frequency>5</frequency></term>
+</list>
+<list name="date">
+<term><name>2000</name><frequency>53</frequency></term>
+<term><name>2001</name><frequency>23</frequency></term>
+<term><name>1999</name><frequency>17</frequency></term>
+<term><name>1998</name><frequency>5</frequency></term>
+<term><name>2002</name><frequency>2</frequency></term>
+<term><name>1997</name><frequency>1</frequency></term>
+</list>
+</termlist>
\ No newline at end of file
--- /dev/null
+<?xml version="1.0" encoding="UTF-8"?>
+<show><status>OK</status>
+<activeclients>0</activeclients>
+<merged>100</merged>
+<total>1043</total>
+<start>0</start>
+<num>20</num>
+<hit>
+
+<md-title>Adobe Illustrator for the Mac</md-title>
+<md-title-remainder>fast & easy</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Woodward, C. Michael</md-author><location id="id_solr" name="LOC (SOLR)">
+<md-title>Adobe Illustrator for the Mac</md-title>
+<md-title-remainder>fast & easy</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Woodward, C. Michael</md-author></location>
+<relevance>600000</relevance>
+<recid>content: title adobe illustrator for the mac author woodward c michael</recid>
+</hit>
+<hit>
+
+<md-title>Advanced computer performance modeling and simulation</md-title>
+<md-date>1998</md-date><location id="id_solr" name="LOC (SOLR)">
+<md-title>Advanced computer performance modeling and simulation</md-title>
+<md-date>1998</md-date></location>
+<relevance>600000</relevance>
+<recid>content: title advanced computer performance modeling and simulation</recid>
+</hit>
+<hit>
+
+<md-title>Computer security</md-title>
+<md-title-remainder>FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>"GAO/AIMD-00-55."</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Computer security</md-title>
+<md-title-remainder>FAA needs to improve controls over use of foreign nationals to remediate and review software : report to the Chairman, Committee on Science, House of Representatives</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>Cover title</md-description>
+<md-description>"December 1999."</md-description>
+<md-description>"GAO/AIMD-00-55."</md-description>
+<md-description>"B-284308"--P. 1</md-description></location>
+<relevance>600000</relevance>
+<recid>content: title computer security</recid>
+</hit>
+<hit>
+
+<md-title>Cyberterrorism and computer crimes</md-title>
+<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Aldrich, Richard W</md-author>
+<md-description>"April 2000."</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Cyberterrorism and computer crimes</md-title>
+<md-title-remainder>issues surrounding the establishment of an international regime</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Aldrich, Richard W</md-author>
+<md-description>"April 2000."</md-description></location>
+<relevance>600000</relevance>
+<recid>content: title cyberterrorism and computer crimes author aldrich richard w</recid>
+</hit>
+<hit>
+
+<md-title>Software design and usability</md-title>
+<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Kaasgaard, Klaus</md-author><location id="id_solr" name="LOC (SOLR)">
+<md-title>Software design and usability</md-title>
+<md-title-remainder>talks with Bonnie Nardi, Jakob Nielsen, David Smith, Austin Henderson & Jed Harris, Terry Winograd, Stephanie Rosenbaum</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Kaasgaard, Klaus</md-author></location>
+<relevance>550000</relevance>
+<recid>content: title software design and usability author kaasgaard klaus</recid>
+</hit>
+<hit>
+
+<md-title>Everything you need to know about the dangers of computer hacking</md-title>
+<md-date>2000</md-date>
+<md-author>Knittel, John</md-author>
+<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Everything you need to know about the dangers of computer hacking</md-title>
+<md-date>2000</md-date>
+<md-author>Knittel, John</md-author>
+<md-description>Explains what computer hacking is, who does it, and how dangerous it can be</md-description></location>
+<relevance>525974</relevance>
+<recid>content: title everything you need to know about the dangers of computer hacking author knittel john</recid>
+</hit>
+<hit>
+
+<md-title>Computer and Internet liability</md-title>
+<md-title-remainder>strategies, claims, and defenses</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Williams, Richard D</md-author>
+<md-description>Rev. ed. of: Law of the year 2000 problem. c1999-</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Computer and Internet liability</md-title>
+<md-title-remainder>strategies, claims, and defenses</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Williams, Richard D</md-author>
+<md-description>Rev. ed. of: Law of the year 2000 problem. c1999-</md-description>
+<md-description>Includes index</md-description></location>
+<relevance>450000</relevance>
+<recid>content: title computer and internet liability author williams richard d</recid>
+</hit>
+<hit>
+
+<md-title>CorelDRAW 8 for Windows</md-title>
+<md-date>1998</md-date>
+<md-author>Davis, Phyllis</md-author>
+<md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>CorelDRAW 8 for Windows</md-title>
+<md-date>1998</md-date>
+<md-author>Davis, Phyllis</md-author>
+<md-description>Includes index</md-description></location>
+<relevance>450000</relevance>
+<recid>content: title coreldraw for windows author davis phyllis</recid>
+</hit>
+<hit>
+
+<md-title>Inside 3ds max 4</md-title>
+<md-date>2002</md-date>
+<md-description>The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Inside 3ds max 4</md-title>
+<md-date>2002</md-date>
+<md-description>Includes index</md-description>
+<md-description>The accompanying CD-ROM contains all the files needed to complete the exercises contained in the book and links to third-party programs</md-description></location>
+<relevance>450000</relevance>
+<recid>content: title inside ds max</recid>
+</hit>
+<hit>
+
+<md-title>Quicken 2000 for the Mac</md-title>
+<md-title-remainder>the official guide</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Langer, Maria</md-author>
+<md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Quicken 2000 for the Mac</md-title>
+<md-title-remainder>the official guide</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Langer, Maria</md-author>
+<md-description>Includes index</md-description>
+<md-description>"Covers Quicken deluxe 2000 for the Mac"--Cover</md-description></location>
+<relevance>450000</relevance>
+<recid>content: title quicken for the mac author langer maria</recid>
+</hit>
+<hit>
+
+<md-title>Sicherheit und Schutz im Netz</md-title>
+<md-date>1998</md-date><location id="id_solr" name="LOC (SOLR)">
+<md-title>Sicherheit und Schutz im Netz</md-title>
+<md-date>1998</md-date></location>
+<relevance>450000</relevance>
+<recid>content: title sicherheit und schutz im netz</recid>
+</hit>
+<hit>
+
+<md-title>Unix Secure Shell</md-title>
+<md-date>1999</md-date>
+<md-author>Carasik, Anne H</md-author>
+<md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Unix Secure Shell</md-title>
+<md-date>1999</md-date>
+<md-author>Carasik, Anne H</md-author>
+<md-description>Includes index</md-description></location>
+<relevance>450000</relevance>
+<recid>content: title unix secure shell author carasik anne h</recid>
+</hit>
+<hit>
+
+<md-title>www.StopThief.net</md-title>
+<md-title-remainder>protecting your identity on the Web</md-title-remainder>
+<md-date>1999</md-date>
+<md-author>Marcella, Albert J</md-author><location id="id_solr" name="LOC (SOLR)">
+<md-title>www.StopThief.net</md-title>
+<md-title-remainder>protecting your identity on the Web</md-title-remainder>
+<md-date>1999</md-date>
+<md-author>Marcella, Albert J</md-author></location>
+<relevance>450000</relevance>
+<recid>content: title www stopthief net author marcella albert j</recid>
+</hit>
+<hit>
+
+<md-title>Eight International Conference on Computer Communications and Networks</md-title>
+<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Eight International Conference on Computer Communications and Networks</md-title>
+<md-title-remainder>proceedings, 11-13 October 1999, Boston, Massachusetts</md-title-remainder>
+<md-date>1999</md-date>
+<md-description>"IEEE catalog number 99EX370"--T.p. verso</md-description></location>
+<relevance>425000</relevance>
+<recid>content: title eight international conference on computer communications and networks</recid>
+</hit>
+<hit>
+
+<md-title>Building storage networks</md-title>
+<md-date>2000</md-date>
+<md-author>Farley, Marc</md-author>
+<md-description>Includes index</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Building storage networks</md-title>
+<md-date>2000</md-date>
+<md-author>Farley, Marc</md-author>
+<md-description>Includes index</md-description></location>
+<relevance>400000</relevance>
+<recid>content: title building storage networks author farley marc</recid>
+</hit>
+<hit>
+
+<md-title>3D games</md-title>
+<md-title-remainder>real-time rendering and software technology</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Watt, Alan H</md-author><location id="id_solr" name="LOC (SOLR)">
+<md-title>3D games</md-title>
+<md-title-remainder>real-time rendering and software technology</md-title-remainder>
+<md-date>2001</md-date>
+<md-author>Watt, Alan H</md-author></location>
+<relevance>400000</relevance>
+<recid>content: title d games author watt alan h</recid>
+</hit>
+<hit>
+
+<md-title>Mastering algorithms with C</md-title>
+<md-date>1999</md-date>
+<md-author>Loudon, Kyle</md-author>
+<md-description>"Useful techniques from sorting to encryption"--Cover</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Mastering algorithms with C</md-title>
+<md-date>1999</md-date>
+<md-author>Loudon, Kyle</md-author>
+<md-description>"Useful techniques from sorting to encryption"--Cover</md-description>
+<md-description>Includes index</md-description></location>
+<relevance>400000</relevance>
+<recid>content: title mastering algorithms with c author loudon kyle</recid>
+</hit>
+<hit>
+
+<md-title>Oracle8i Java component programming with EJB, CORBA, and JSP</md-title>
+<md-date>2000</md-date>
+<md-author>Morisseau-Leroy, Nirva</md-author>
+<md-description>CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP & servlet programs</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Oracle8i Java component programming with EJB, CORBA, and JSP</md-title>
+<md-date>2000</md-date>
+<md-author>Morisseau-Leroy, Nirva</md-author>
+<md-description>"Covers Oracle database releases 8.1.5, 8.1.6, and 8.1.7."</md-description>
+<md-description>CD-ROM includes resources mentioned in the book, electronic versions of the appendices, plus sample JSP & servlet programs</md-description></location>
+<relevance>400000</relevance>
+<recid>content: title oracle i java component programming with ejb corba and jsp author morisseau leroy nirva</recid>
+</hit>
+<hit>
+
+<md-title>Oracle SQL*Plus</md-title>
+<md-title-remainder>pocket reference</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Gennick, Jonathan</md-author>
+<md-description>"Guide to SQL*Plus syntax"--cover</md-description><location id="id_solr" name="LOC (SOLR)">
+<md-title>Oracle SQL*Plus</md-title>
+<md-title-remainder>pocket reference</md-title-remainder>
+<md-date>2000</md-date>
+<md-author>Gennick, Jonathan</md-author>
+<md-description>"Covers Oracle8i"--cover</md-description>
+<md-description>"Guide to SQL*Plus syntax"--cover</md-description></location>
+<relevance>400000</relevance>
+<recid>content: title oracle sql plus author gennick jonathan</recid>
+</hit>
+<hit>
+
+<md-title>Programming Web graphics with PERL and GNU software</md-title>
+<md-date>1999</md-date>
+<md-author>Wallace, Shawn P</md-author><location id="id_solr" name="LOC (SOLR)">
+<md-title>Programming Web graphics with PERL and GNU software</md-title>
+<md-date>1999</md-date>
+<md-author>Wallace, Shawn P</md-author></location>
+<relevance>400000</relevance>
+<recid>content: title programming web graphics with perl and gnu software author wallace shawn p</recid>
+</hit>
+</show>
\ No newline at end of file