made for this request.
<p>Squid now adds <em>ABORTED</em> to values printed by the <em>Ss</em> code in more
cases where a TCP Squid-to-server connection was closed prematurely.
+ <p>Squid now logs <em>TCP_TUNNEL</em> with the <em>Ss</em> code when a CONNECT tunnel
+ is attempted, not just on successful tunnel setup.
<tag>server_cert_fingerprint</tag>
<p>Removed the broken <em>-sha</em> option. <em>SHA1</em> remains the default and
al = clientRequest->al;
http = clientRequest;
+ al->cache.code.update(LOG_TCP_TUNNEL);
+
client.initConnection(clientRequest->getConn()->clientConnection, tunnelClientClosed, "tunnelClientClosed", this);
AsyncCall::Pointer timeoutCall = commCbCall(5, 4, "tunnelTimeout",
commSetConnTimeout(tunnelState->server.conn, Config.Timeout.read, timeoutCall);
*tunnelState->status_ptr = Http::scOkay;
- tunnelState->al->cache.code.update(LOG_TCP_TUNNEL);
if (cbdataReferenceValid(tunnelState)) {
// Shovel any payload already pushed into reply buffer by the server response
peerWait.finish();
server.len = 0;
- al->cache.code.update(LOG_TCP_TUNNEL);
-
// XXX: al->http.code (i.e. *status_ptr) should not be (re)set
// until we actually start responding to the client. Right here/now, we only
// know how this cache_peer has responded to us.
ch.syncAle(request, http->log_uri);
if (ch.fastCheck().denied()) {
debugs(26, 4, "MISS access forbidden.");
+ http->updateLoggingTags(LOG_TCP_TUNNEL);
err = new ErrorState(ERR_FORWARDING_DENIED, Http::scForbidden, request, http->al);
http->al->http.code = Http::scForbidden;
errorSend(http->getConn()->clientConnection, err);