]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
SourceFormat Enforcement
authorSource Maintenance <squidadm@squid-cache.org>
Fri, 4 Nov 2016 18:12:20 +0000 (18:12 +0000)
committerSource Maintenance <squidadm@squid-cache.org>
Fri, 4 Nov 2016 18:12:20 +0000 (18:12 +0000)
src/FwdState.cc
src/client_side.cc
src/servers/Http1Server.cc
src/tunnel.cc

index da6927b598c57e34689b744c65983b8ac72c0704..ddcdbebdbed991c1180a1b0f2afbfef2bd4fbfca 100644 (file)
@@ -866,7 +866,6 @@ FwdState::connectStart()
             return;
         }
 
-
         // Pinned connection failure.
         debugs(17,2,HERE << "Pinned connection failed: " << pinned_connection);
         ErrorState *anErr = new ErrorState(ERR_ZERO_SIZE_OBJECT, Http::scServiceUnavailable, request);
index 7e0de1b88abfe7c9f1f1e518791e0a3b5967ee4a..0ceffb48358652f1d3504b5068d061541804dd96 100644 (file)
@@ -3403,9 +3403,9 @@ ConnStateData::buildFakeRequest(Http::MethodType const method, SBuf &useHost, un
     http->uri = SBufToCstring(useHost);
     stream->flags.parsed_ok = 1; // Do we need it?
     stream->mayUseConnection(true);
-    
+
     AsyncCall::Pointer timeoutCall = commCbCall(5, 4, "clientLifetimeTimeout",
-                                                CommTimeoutCbPtrFun(clientLifetimeTimeout, stream->http));
+                                     CommTimeoutCbPtrFun(clientLifetimeTimeout, stream->http));
     commSetConnTimeout(clientConnection, Config.Timeout.lifetime, timeoutCall);
 
     stream->registerWithConn();
@@ -4097,9 +4097,10 @@ ConnStateData::mayTunnelUnsupportedProto()
 {
     return Config.accessList.on_unsupported_protocol
 #if USE_OPENSSL
-        &&
-        ((port->flags.isIntercepted() && port->flags.tunnelSslBumping)
-        || (serverBump() && pinning.serverConnection))
+           &&
+           ((port->flags.isIntercepted() && port->flags.tunnelSslBumping)
+            || (serverBump() && pinning.serverConnection))
 #endif
-        ;
+           ;
 }
+
index 959f6dd5d61c439ffb9481d371cf59689f92baae..b564896c3cb3d5478c8995b1e3a7853b3e9e0802 100644 (file)
@@ -196,20 +196,20 @@ Http::One::Server::buildHttpRequest(Http::StreamPointer &context)
 void
 Http::One::Server::setReplyError(Http::StreamPointer &context, HttpRequest::Pointer &request, const HttpRequestMethod& method, err_type requestError, Http::StatusCode errStatusCode, const char *requestErrorBytes)
 {
-        quitAfterError(request.getRaw());
-        if (!context->connRegistered()) {
-            debugs(33, 2, "Client stream deregister it self, nothing to do");
-            clientConnection->close();
-            return;
-        }
-        clientStreamNode *node = context->getClientReplyContext();
-        clientReplyContext *repContext = dynamic_cast<clientReplyContext *>(node->data.getRaw());
-        assert (repContext);
+    quitAfterError(request.getRaw());
+    if (!context->connRegistered()) {
+        debugs(33, 2, "Client stream deregister it self, nothing to do");
+        clientConnection->close();
+        return;
+    }
+    clientStreamNode *node = context->getClientReplyContext();
+    clientReplyContext *repContext = dynamic_cast<clientReplyContext *>(node->data.getRaw());
+    assert (repContext);
 
-        repContext->setReplyToError(requestError, errStatusCode, method, context->http->uri, clientConnection->remote, nullptr, requestErrorBytes, nullptr);
+    repContext->setReplyToError(requestError, errStatusCode, method, context->http->uri, clientConnection->remote, nullptr, requestErrorBytes, nullptr);
 
-        assert(context->http->out.offset == 0);
-        context->pullData();
+    assert(context->http->out.offset == 0);
+    context->pullData();
 }
 
 void
index 8c80693d562aaaf60459d16dbb84d529924e4e59..b04553df4997ff837dbe9c17908dfb489f8202fb 100644 (file)
@@ -105,7 +105,7 @@ public:
 
     /// Whether the client sent a CONNECT request to us.
     bool clientExpectsConnectResponse() const {
-        // If we are forcing a tunnel after receiving a client CONNECT, then we 
+        // If we are forcing a tunnel after receiving a client CONNECT, then we
         // have already responded to that CONNECT before tunnel.cc started.
         if (request && request->flags.forceTunnel)
             return false;