]> git.ipfire.org Git - thirdparty/squid.git/commitdiff
Polish the ACLFilledChecklist::fd related documentation
authorChristos Tsantilas <chtsanti@users.sourceforge.net>
Tue, 25 Sep 2012 13:42:54 +0000 (16:42 +0300)
committerChristos Tsantilas <chtsanti@users.sourceforge.net>
Tue, 25 Sep 2012 13:42:54 +0000 (16:42 +0300)
src/acl/FilledChecklist.h
src/client_side.cc
src/forward.cc

index 6c926d85ed2824e0dbd401be5e9d0ffe64fab58f..057aee5d8e95a51490f9abdc890f8db9dfd880b6 100644 (file)
@@ -27,14 +27,15 @@ public:
     ~ACLFilledChecklist();
 
 public:
+    /// The client connection manager
     ConnStateData * conn() const;
 
-    /// uses conn() if available
+    /// The client side fd. It uses conn() if available
     int fd() const;
 
     /// set either conn
     void conn(ConnStateData *);
-    /// set FD
+    /// set the client side FD
     void fd(int aDescriptor);
 
     //int authenticated();
index 84db45fc675b2f94c1479438727d692c15d567a3..1ad470d08b1bf10f8419b619f8e82a8bb33f9aa3 100644 (file)
@@ -2516,8 +2516,6 @@ bool ConnStateData::serveDelayedError(ClientSocketContext *context)
 
             ACLFilledChecklist check(Config.ssl_client.cert_error, request, dash_str);
             check.sslErrors = new Ssl::Errors(SQUID_X509_V_ERR_DOMAIN_MISMATCH);
-            if (Comm::IsConnOpen(pinning.serverConnection))
-                check.fd(pinning.serverConnection->fd);
             const bool allowDomainMismatch =
                 check.fastCheck() == ACCESS_ALLOWED;
             delete check.sslErrors;
index 4ad233451e8e857e1aa80ef53b5ef3caf76b5144..75da0f3583aa50a519a122c720dd8bd6d65ba87f 100644 (file)
@@ -214,6 +214,12 @@ FwdState::completed()
             assert(err);
             errorAppendEntry(entry, err);
             err = NULL;
+#if USE_SSL
+            if (request->flags.sslPeek && request->clientConnectionManager.valid()) {
+                CallJobHere1(17, 4, request->clientConnectionManager, ConnStateData,
+                             ConnStateData::httpsPeeked, Comm::ConnectionPointer(NULL));
+            }
+#endif
         } else {
             EBIT_CLR(entry->flags, ENTRY_FWD_HDR_WAIT);
             entry->complete();
@@ -369,14 +375,6 @@ FwdState::startConnectionOrFail()
             ErrorState *anErr = new ErrorState(ERR_CANNOT_FORWARD, HTTP_INTERNAL_SERVER_ERROR, request);
             fail(anErr);
         } // else use actual error from last connection attempt
-#if USE_SSL
-        if (request->flags.sslPeek && request->clientConnectionManager.valid()) {
-            errorAppendEntry(entry, err); // will free err
-            err = NULL;
-            CallJobHere1(17, 4, request->clientConnectionManager, ConnStateData,
-                         ConnStateData::httpsPeeked, Comm::ConnectionPointer(NULL));
-        }
-#endif
         self = NULL;       // refcounted
     }
 }
@@ -828,7 +826,6 @@ FwdState::initiateSSL()
     // The list is used in ssl_verify_cb() and is freed in ssl_free().
     if (acl_access *acl = Config.ssl_client.cert_error) {
         ACLFilledChecklist *check = new ACLFilledChecklist(acl, request, dash_str);
-        check->fd(fd);
         SSL_set_ex_data(ssl, ssl_ex_index_cert_error_check, check);
     }