From: Christos Tsantilas Date: Tue, 25 Sep 2012 13:42:54 +0000 (+0300) Subject: Polish the ACLFilledChecklist::fd related documentation X-Git-Tag: SQUID_3_3_0_1~44 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=d04905a0831f761d39aaed0cef27aa6fe5bd922e;p=thirdparty%2Fsquid.git Polish the ACLFilledChecklist::fd related documentation --- diff --git a/src/acl/FilledChecklist.h b/src/acl/FilledChecklist.h index 6c926d85ed..057aee5d8e 100644 --- a/src/acl/FilledChecklist.h +++ b/src/acl/FilledChecklist.h @@ -27,14 +27,15 @@ public: ~ACLFilledChecklist(); public: + /// The client connection manager ConnStateData * conn() const; - /// uses conn() if available + /// The client side fd. It uses conn() if available int fd() const; /// set either conn void conn(ConnStateData *); - /// set FD + /// set the client side FD void fd(int aDescriptor); //int authenticated(); diff --git a/src/client_side.cc b/src/client_side.cc index 84db45fc67..1ad470d08b 100644 --- a/src/client_side.cc +++ b/src/client_side.cc @@ -2516,8 +2516,6 @@ bool ConnStateData::serveDelayedError(ClientSocketContext *context) ACLFilledChecklist check(Config.ssl_client.cert_error, request, dash_str); check.sslErrors = new Ssl::Errors(SQUID_X509_V_ERR_DOMAIN_MISMATCH); - if (Comm::IsConnOpen(pinning.serverConnection)) - check.fd(pinning.serverConnection->fd); const bool allowDomainMismatch = check.fastCheck() == ACCESS_ALLOWED; delete check.sslErrors; diff --git a/src/forward.cc b/src/forward.cc index 4ad233451e..75da0f3583 100644 --- a/src/forward.cc +++ b/src/forward.cc @@ -214,6 +214,12 @@ FwdState::completed() assert(err); errorAppendEntry(entry, err); err = NULL; +#if USE_SSL + if (request->flags.sslPeek && request->clientConnectionManager.valid()) { + CallJobHere1(17, 4, request->clientConnectionManager, ConnStateData, + ConnStateData::httpsPeeked, Comm::ConnectionPointer(NULL)); + } +#endif } else { EBIT_CLR(entry->flags, ENTRY_FWD_HDR_WAIT); entry->complete(); @@ -369,14 +375,6 @@ FwdState::startConnectionOrFail() ErrorState *anErr = new ErrorState(ERR_CANNOT_FORWARD, HTTP_INTERNAL_SERVER_ERROR, request); fail(anErr); } // else use actual error from last connection attempt -#if USE_SSL - if (request->flags.sslPeek && request->clientConnectionManager.valid()) { - errorAppendEntry(entry, err); // will free err - err = NULL; - CallJobHere1(17, 4, request->clientConnectionManager, ConnStateData, - ConnStateData::httpsPeeked, Comm::ConnectionPointer(NULL)); - } -#endif self = NULL; // refcounted } } @@ -828,7 +826,6 @@ FwdState::initiateSSL() // The list is used in ssl_verify_cb() and is freed in ssl_free(). if (acl_access *acl = Config.ssl_client.cert_error) { ACLFilledChecklist *check = new ACLFilledChecklist(acl, request, dash_str); - check->fd(fd); SSL_set_ex_data(ssl, ssl_ex_index_cert_error_check, check); }