/*
- * Copyright (C) 1996-2021 The Squid Software Foundation and contributors
+ * Copyright (C) 1996-2022 The Squid Software Foundation and contributors
*
* Squid software is distributed under GPLv2+ license and includes
* contributions from numerous individuals and organizations.
payloadTruncated(0),
sawDateGoBack(false)
{
- debugs(11,5,HERE << "HttpStateData " << this << " created");
+ debugs(11,5, "HttpStateData " << this << " created");
ignoreCacheControl = false;
surrogateNoStore = false;
serverConnection = fwd->serverConnection();
delete upgradeHeaderOut;
- debugs(11,5, HERE << "HttpStateData " << this << " destroyed; " << serverConnection);
+ debugs(11,5, "HttpStateData " << this << " destroyed; " << serverConnection);
}
const Comm::ConnectionPointer &
bool mayStore = false;
// HTTPbis pt6 section 3.2: a response CC:public is present
if (rep->cache_control->hasPublic()) {
- debugs(22, 3, HERE << "Authenticated but server reply Cache-Control:public");
+ debugs(22, 3, "Authenticated but server reply Cache-Control:public");
mayStore = true;
// HTTPbis pt6 section 3.2: a response CC:must-revalidate is present
} else if (rep->cache_control->hasMustRevalidate()) {
- debugs(22, 3, HERE << "Authenticated but server reply Cache-Control:must-revalidate");
+ debugs(22, 3, "Authenticated but server reply Cache-Control:must-revalidate");
mayStore = true;
#if USE_HTTP_VIOLATIONS
// some. The caching+revalidate is not exactly unsafe though with Squids interpretation of no-cache
// (without parameters) as equivalent to must-revalidate in the reply.
} else if (rep->cache_control->hasNoCacheWithoutParameters()) {
- debugs(22, 3, HERE << "Authenticated but server reply Cache-Control:no-cache (equivalent to must-revalidate)");
+ debugs(22, 3, "Authenticated but server reply Cache-Control:no-cache (equivalent to must-revalidate)");
mayStore = true;
#endif
// HTTPbis pt6 section 3.2: a response CC:s-maxage is present
} else if (rep->cache_control->hasSMaxAge()) {
- debugs(22, 3, HERE << "Authenticated but server reply Cache-Control:s-maxage");
+ debugs(22, 3, "Authenticated but server reply Cache-Control:s-maxage");
mayStore = true;
}
return drop1xx(reason);
}
- debugs(11, 2, HERE << "forwarding 1xx to client");
+ debugs(11, 2, "forwarding 1xx to client");
// the Sink will use this to call us back after writing 1xx to the client
typedef NullaryMemFunT<HttpStateData> CbDialer;
HttpStateData::ConnectionStatus
HttpStateData::persistentConnStatus() const
{
- debugs(11, 3, HERE << serverConnection << " eof=" << eof);
+ debugs(11, 3, serverConnection << " eof=" << eof);
if (eof) // already reached EOF
return COMPLETE_NONPERSISTENT_MSG;
{
if (flags.handling1xx) { // we came back after handling a 1xx response
- debugs(11, 5, HERE << "done with 1xx handling");
+ debugs(11, 5, "done with 1xx handling");
flags.handling1xx = false;
Must(!flags.headers_parsed);
}
HttpStateData::continueAfterParsingHeader()
{
if (flags.handling1xx) {
- debugs(11, 5, HERE << "wait for 1xx handling");
+ debugs(11, 5, "wait for 1xx handling");
Must(!flags.headers_parsed);
return false;
}
}
#if USE_ADAPTATION
- debugs(11,5, HERE << "adaptationAccessCheckPending=" << adaptationAccessCheckPending);
+ debugs(11,5, "adaptationAccessCheckPending=" << adaptationAccessCheckPending);
if (adaptationAccessCheckPending)
return;
void
HttpStateData::wroteLast(const CommIoCbParams &io)
{
- debugs(11, 5, HERE << serverConnection << ": size " << io.size << ": errflag " << io.flag << ".");
+ debugs(11, 5, serverConnection << ": size " << io.size << ": errflag " << io.flag << ".");
#if URL_CHECKSUM_DEBUG
entry->mem_obj->checkUrlChecksum();
void
HttpStateData::closeServer()
{
- debugs(11,5, HERE << "closing HTTP server " << serverConnection << " this " << this);
+ debugs(11,5, "closing HTTP server " << serverConnection << " this " << this);
if (Comm::IsConnOpen(serverConnection)) {
fwd->unregister(serverConnection);
{
MemBuf mb;
- debugs(11, 5, HERE << serverConnection << ", request " << request << ", this " << this << ".");
+ debugs(11, 5, serverConnection << ", request " << request << ", this " << this << ".");
if (!Comm::IsConnOpen(serverConnection)) {
- debugs(11,3, HERE << "cannot send request to closing " << serverConnection);
+ debugs(11,3, "cannot send request to closing " << serverConnection);
assert(closeHandler != NULL);
return false;
}
{
#if USE_HTTP_VIOLATIONS
if (!Config.accessList.brokenPosts) {
- debugs(11, 5, HERE << "No brokenPosts list");
+ debugs(11, 5, "No brokenPosts list");
return false;
}
ch.al = fwd->al;
ch.syncAle(originalRequest().getRaw(), nullptr);
if (!ch.fastCheck().allowed()) {
- debugs(11, 5, HERE << "didn't match brokenPosts");
+ debugs(11, 5, "didn't match brokenPosts");
return false;
}
if (!Comm::IsConnOpen(serverConnection)) {
- debugs(11, 3, HERE << "ignoring broken POST for closed " << serverConnection);
+ debugs(11, 3, "ignoring broken POST for closed " << serverConnection);
assert(closeHandler != NULL);
return true; // prevent caller from proceeding as if nothing happened
}
HttpStateData::finishingChunkedRequest()
{
if (flags.sentLastChunk) {
- debugs(11, 5, HERE << "already sent last-chunk");
+ debugs(11, 5, "already sent last-chunk");
return false;
}
HttpStateData::doneSendingRequestBody()
{
Client::doneSendingRequestBody();
- debugs(11,5, HERE << serverConnection);
+ debugs(11,5, serverConnection);
// do we need to write something after the last body byte?
if (flags.chunked_request && finishingChunkedRequest())
// XXX: we should check this condition in other callbacks then!
// TODO: Check whether this can actually happen: We should unsubscribe
// as a body consumer when the above condition(s) are detected.
- debugs(11, DBG_IMPORTANT, HERE << "Transaction aborted while reading HTTP body");
+ debugs(11, DBG_IMPORTANT, "Transaction aborted while reading HTTP body");
return;
}
void
HttpStateData::abortAll(const char *reason)
{
- debugs(11,5, HERE << "aborting transaction for " << reason <<
+ debugs(11,5, "aborting transaction for " << reason <<
"; " << serverConnection << ", this " << this);
mustStop(reason);
}