]> git.ipfire.org Git - thirdparty/squid.git/blob - src/AccessLogEntry.cc
Merged from v5 r15006
[thirdparty/squid.git] / src / AccessLogEntry.cc
1 /*
2 * Copyright (C) 1996-2017 The Squid Software Foundation and contributors
3 *
4 * Squid software is distributed under GPLv2+ license and includes
5 * contributions from numerous individuals and organizations.
6 * Please see the COPYING and CONTRIBUTORS files for details.
7 */
8
9 #include "squid.h"
10 #include "AccessLogEntry.h"
11 #include "HttpReply.h"
12 #include "HttpRequest.h"
13 #include "SquidConfig.h"
14
15 #if USE_OPENSSL
16 #include "ssl/support.h"
17
18 AccessLogEntry::SslDetails::SslDetails(): user(NULL), bumpMode(::Ssl::bumpEnd)
19 {
20 }
21 #endif /* USE_OPENSSL */
22
23 void
24 AccessLogEntry::getLogClientIp(char *buf, size_t bufsz) const
25 {
26 Ip::Address log_ip;
27
28 #if FOLLOW_X_FORWARDED_FOR
29 if (Config.onoff.log_uses_indirect_client && request)
30 log_ip = request->indirect_client_addr;
31 else
32 #endif
33 if (tcpClient)
34 log_ip = tcpClient->remote;
35 else
36 log_ip = cache.caddr;
37
38 // internally generated requests (and some ICAP) lack client IP
39 if (log_ip.isNoAddr()) {
40 strncpy(buf, "-", bufsz);
41 return;
42 }
43
44 // Apply so-called 'privacy masking' to IPv4 clients
45 // - localhost IP is always shown in full
46 // - IPv4 clients masked with client_netmask
47 // - IPv6 clients use 'privacy addressing' instead.
48
49 if (!log_ip.isLocalhost() && log_ip.isIPv4())
50 log_ip.applyMask(Config.Addrs.client_netmask);
51
52 log_ip.toStr(buf, bufsz);
53 }
54
55 SBuf
56 AccessLogEntry::getLogMethod() const
57 {
58 SBuf method;
59 if (icp.opcode)
60 method.append(icp_opcode_str[icp.opcode]);
61 else if (htcp.opcode)
62 method.append(htcp.opcode);
63 else
64 method = http.method.image();
65 return method;
66 }
67
68 AccessLogEntry::~AccessLogEntry()
69 {
70 safe_free(headers.request);
71
72 #if USE_ADAPTATION
73 safe_free(adapt.last_meta);
74 #endif
75
76 safe_free(headers.reply);
77
78 safe_free(headers.adapted_request);
79 HTTPMSGUNLOCK(adapted_request);
80
81 safe_free(lastAclName);
82
83 HTTPMSGUNLOCK(reply);
84 HTTPMSGUNLOCK(request);
85 #if ICAP_CLIENT
86 HTTPMSGUNLOCK(icap.reply);
87 HTTPMSGUNLOCK(icap.request);
88 #endif
89 }
90