]> git.ipfire.org Git - thirdparty/squid.git/log
thirdparty/squid.git
13 years ago3.1.8 SQUID_3_1_8
Amos Jeffries [Sat, 4 Sep 2010 03:25:09 +0000 (21:25 -0600)] 
3.1.8

13 years agoPrep for 3.1.8
Amos Jeffries [Sat, 4 Sep 2010 03:17:31 +0000 (15:17 +1200)] 
Prep for 3.1.8

13 years agoRevert squid_kerb_auth cross-compiler fix.
Amos Jeffries [Fri, 3 Sep 2010 11:48:16 +0000 (05:48 -0600)] 
Revert squid_kerb_auth cross-compiler fix.

13 years agoRemove rev10092 - missing dependent feature
Amos Jeffries [Fri, 3 Sep 2010 09:20:33 +0000 (03:20 -0600)] 
Remove rev10092 - missing dependent feature

13 years agorequest_parse_status is a 3.2 only feature
Amos Jeffries [Fri, 3 Sep 2010 08:31:22 +0000 (02:31 -0600)] 
request_parse_status is a 3.2 only feature

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 3 Sep 2010 05:24:31 +0000 (23:24 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 3020: Segmentation fault: nameservers[vc->ns].vc = NULL

Prevent idnsVCClosed segfaults during shutdown or reconfiguration (at least).

idnsShutdown() schedules comm_close and then frees nameservers[] by
calling idnsFreeNameservers. The closing handler tried to access freed
nameservers[]. The patch prevents access to the freed nameservers[]
array in idnsVCClosed and other functions.

TODO: Nameservers[] array management should be rewritten. The array
should not be freed while there are nameservers using it. It should be
freed when the last entry is gone.

  From: 3p1-rock r9583

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 3 Sep 2010 05:20:26 +0000 (23:20 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1: handle HTTP OPTIONS and TRACE requests with asterisk URIs.

Handle '*' URIs in urlParse(). This allows Squid properly respond to
OPTIONS and TRACE requests with '*' URIs and Max-Forwards value of
zero. Forwarding such requests is out of this change scope and still
does not work because the upstream host and port are not set.

Co-Advisor test cases:
  test_case/rfc2616/options-bodyless-asterisk
  test_case/rfc2616/maxForwardsZero-OPTIONS-asterisk
  test_case/rfc2616/maxForwardsZero-TRACE-asterisk

13 years agoUnit-tests for the new HTTP request-line parser
Amos Jeffries [Fri, 3 Sep 2010 05:18:53 +0000 (23:18 -0600)] 
Unit-tests for the new HTTP request-line parser

13 years agoHarden and speed up HTTP request-line parser
Amos Jeffries [Fri, 3 Sep 2010 05:17:22 +0000 (23:17 -0600)] 
Harden and speed up HTTP request-line parser

An upgrade/fix to handling HTTP request-lines as specific by
section 5.1 of the RFCs. Specifically to handle a sequence of
unknown bytes up to a terminating LF (\n) octet.

* The semantics as previously documented are taken on. No changes
 there, but documentation clarified a bit. Some things previously not
 erroring are now doing so. External code impact is in the nature of
 reduced special cases to be handled. Specifically raw-CR weirdness in
 the request line fields. This occuring in URL was a vulnerability at
 least once before.

* Prior updates to HttpParser object for other parse stages opens the
 possibility of this parse action returning HTTP status code directly.
 Additions are done to make use of this (with the existing status codes
 only).

* Input permutations where the unit-tests showed the old parser was
 violating its own documentation have been fixed to produce expected
 outputs.

* Old parser operated three distinct potentially long parse loops.
 Added several local variables to remember various octets seen while
 searching for the terminal LF. This removed the need for two of the
 parse re-scans (length of method, length of URI).

* relaxed_header_parser will enable it to also skip prefix whitespace
 (space character only) and multiple-\r sequences at the end of line.

* --enable-http-violations is still required before it will accept
 non-HTTP version types 'downgraded' to HTTP/0.9

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 3 Sep 2010 05:12:38 +0000 (23:12 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Define SIZEOF_OFF_T to fix overflow checks.

Overflow checks were broken because 'SIZEOF_OFF_T <= 4' was always true
because SIZEOF_OFF_T was not defined and, hence, treated as zero.

Co-Advisor test cases:

test_case/rfc2616/noXform-fwd-Content-Range-simple-2147483645-2147483646-2147483647-withCc-toClt
test_case/rfc2616/noXform-fwd-Content-Range-simple-2147483645-2147483646-*-withCc-toClt

13 years agoBug 3033: incorrect information regarding TOS
Amos Jeffries [Fri, 3 Sep 2010 04:59:52 +0000 (22:59 -0600)] 
Bug 3033: incorrect information regarding TOS

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 3 Sep 2010 04:58:57 +0000 (22:58 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Added safe HttpMsg pointer wrapper that locks and unlocks the message.

This class will not be needed if we switch to refcounting HttpMsg. Meanwhile,
it allows to pass message pointers in AsyncCalls and avoid auto_ptr<> in
exception-sensitive code.

13 years agoBug 2972: pt 2: More correct LTDL include paths.
Amos Jeffries [Fri, 3 Sep 2010 04:57:12 +0000 (22:57 -0600)] 
Bug 2972: pt 2: More correct LTDL include paths.

After the last few rounds I'm suspicious about calling this closed quite
yet but this patch is required and works for building with libtool 1.5.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 3 Sep 2010 04:55:18 +0000 (22:55 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Remember local port of the CONNECT tunnel to the server, for logging.

13 years agoRemove sending chunked responses. 3.1 is still HTTP/1.0
Amos Jeffries [Fri, 3 Sep 2010 04:47:57 +0000 (22:47 -0600)] 
Remove sending chunked responses. 3.1 is still HTTP/1.0

Blocked by lack of HTTP/1.1 indicator on responses.
Better support is nearly ready but has not made this release.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 1 Sep 2010 07:48:26 +0000 (01:48 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Check for NULL and empty strings before calling str*cmp().

These checks are necessary to ensure consistent comparison results (important
for sorting and searching) and to avoid segfaults on NULL buffers (because
termedBuf() may return NULL instead of the expected "0-terminated buffer").

13 years agoSourceFormat Enforcement
Automatic source maintenance [Tue, 31 Aug 2010 06:26:58 +0000 (00:26 -0600)] 
SourceFormat Enforcement

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Tue, 31 Aug 2010 01:43:31 +0000 (19:43 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Made eCAP compile again after CbcPointer<> changes.

Old eCAP code tried to call stillProducing(this) and stillConsuming(this)
methods from a const status() method. Doing so produces compiler errors
because stillProducing() and stillConsuming() do not accept pointers to
constant jobs.

CBDATA_CLASSes and, hence, CbcPointer<>, do not support const-correctness
well: In order to create/destroy a cbdata-based smart pointer, one has to
lock/unlock cbdata, which requires modifying the object. Thus, the smart
pointer cannot point to a truly constant object. The core of the problem is
that CBDATA_CLASSes keep cbdata and object data together. When all raw/dumb
CBDATA_CLASS pointers are gone, we can separate the two "datas" and solve the
const-correctness problem for good. The "separate-datas" design would even be
consistent with the original cbdata design which we often violate, IMO.

There are other workarounds. We could declare toCbdata() constant, for
example. However, that would essentially disable checks where a
cbdata-protected object is being destroyed despite the caller's intent to keep
the object constant. This change is not as general but is also much less
intrusive.

Also; handle assignment to self correctly.

13 years agoBug 3005: Locate LTDL headers correctly
Amos Jeffries [Mon, 30 Aug 2010 03:58:40 +0000 (21:58 -0600)] 
Bug 3005: Locate LTDL headers correctly

13 years agoFix cross-compile support in ./configure
Amos Jeffries [Sun, 29 Aug 2010 13:58:51 +0000 (07:58 -0600)] 
Fix cross-compile support in ./configure

13 years agoSourceFormat Enforcement
Automatic source maintenance [Sun, 29 Aug 2010 06:15:38 +0000 (00:15 -0600)] 
SourceFormat Enforcement

13 years agoAuthor: Stefan Fritsch <sf@sfritsch.de>
Amos Jeffries [Sun, 29 Aug 2010 00:52:30 +0000 (18:52 -0600)] 
Author: Stefan Fritsch <sf@sfritsch.de>
Bug 2872: leaking file descriptors

As I understand it, the leak happens this way: A client request kicks off an
asynchronous file open request. If the client request is aborted and disappears
before the file open has completed, the file is never closed again. This
explains why this leak can only happen with aufs and not with ufs.

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Sun, 29 Aug 2010 00:49:56 +0000 (18:49 -0600)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Harden DNS client against packet queue attacks.

Strengthen the internal DNS client somewhat by making sure to keep
the receive queue drained. Also avoid parsing messages unless we
have a pending query.

13 years agoSourceFormat Enforcement
Automatic source maintenance [Sat, 28 Aug 2010 03:58:58 +0000 (21:58 -0600)] 
SourceFormat Enforcement

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:46:02 +0000 (10:46 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP Compliance: remove Content-Length header if Transfer-Encoding is present.

If after HTTP header parsing we have both "Transfer-Encoding: chunked"
and Content-Length headers, remove the Content-Length entry. The
adjusted behavior follows httpbis recommendations (ticket #95, part 2).

The old client-side code forwarded the original Content-Length header
which did not match the [dechunked] response, resulting in a malformed
response.

HttpHeader::chunked() method added to check if HTTP headers contain
chunked Transfer-Encoding header. Use this method in code that checks
for chunked encoding.

Co-Advisor test cases: test_case/rfc2616/chunked-1p0-badClen-toClt
                       test_case/rfc2616/chunked-1p1-badClen-toClt

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:45:08 +0000 (10:45 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1: respond to OPTIONS requests with a zero Max-Forwards value.

RFC 2616 section 9.2 says that a proxy MUST NOT forward requests with a
zero Max-Forwards value. RFC 2616 does not define any proper OPTIONS
responses, so we consider successful responses optional and reply with
501 Not Implemented.

No change in handling OPTIONS requests with positive Max-Forwards values.

While TRACE and OPTIONS are similar with regard to Max-Forwards, we
handle them in different places because OPTIONS responses do not need to
echo the request via Store.

Co-Advisor test case: test_case/rfc2616/maxForwardsZero-OPTIONS-absolute

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:42:45 +0000 (10:42 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1 Compliance: rename Trailers header to Trailer everywhere.

RFC 2616 section 13.5.1 has a typo in the Trailers header name. The correct
name is Trailer. See http://trac.tools.ietf.org/wg/httpbis/trac/ticket/9

Co-Advisor test cases: test_case/rfc2616/hopHdr-Trailer-toClt
                       test_case/rfc2616/hopHdr-Trailer-toSrv

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:41:32 +0000 (10:41 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1: Send chunked responses if body size is unknown.

Apply HTTP chunked transfer encoding to the response body sent to client
if all of the following conditions are met:

* client claims HTTP version 1.1 or later support
* response does not have a Content-Length header already
* response does not use multipart/byteranges encoding
* connection is persistent

If we decide to send chunked reply, chunked_reply flag is set. Chunked
encoding is done in ClientSocketContext::packChunk(). The last-chunk
is sent only when clientReplyContext complete flag is set.

This change helps keep client-side connections persistent.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:37:37 +0000 (10:37 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Added more comparison operators to HttpVersion.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 27 Aug 2010 16:16:29 +0000 (10:16 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 2583: pure virtual method called

When a cbdata-protected class holds its own cbdata and has virtual
toCbdata(), there is a catch22 problem: we need cbdata to know whether
the pointer to the class object is valid, and we need to dereference
that pointer to get cbdata.

Added CbcPointer class to hold both a pointer to a potentially freed
class object and the cbdata pointer protecting that object. Keeping the
cbdata pointer allows us to test whether the object is still there
without dereferencing the object pointer.

Use the CbcPointer class to hold safe pointers to AsyncJobs. This
prevents "pure virtual method called" failures because we no longer
dereference freed job pointers.

Removed Initiator parameter from many initiatee constructors. The
Adaptation::Initiator::initiateAdaptation method now sets the initiator
of the job. This makes the constructor profile simpler and removes the
need to propagate Initiator changes through all the [nested]
constructors.

Renamed AsyncJob::AsyncStart() to AsyncJob::Start(). I had to change the
callers code anyway and it was a good opportunity to remove the
redundant "Async".

Special thanks to Stefan Fritsch for updating and testing an earlier
version of this patch.

13 years ago3.1.7 SQUID_3_1_7
Amos Jeffries [Tue, 24 Aug 2010 05:40:25 +0000 (23:40 -0600)] 
3.1.7

13 years agoPrep for 3.1.7
Amos Jeffries [Tue, 24 Aug 2010 00:41:20 +0000 (12:41 +1200)] 
Prep for 3.1.7

13 years agoPreserve auth_param NTLM/Negotiate keep-alive behaviour
Amos Jeffries [Mon, 23 Aug 2010 23:56:49 +0000 (11:56 +1200)] 
Preserve auth_param NTLM/Negotiate keep-alive behaviour

With the change to correct HTTP/1.1 keep-alive behaviour it has become
apparent that the major browsers fail to handle NTLM re-challenge cleanly
over persistent connections.

This alters the default behaviour for NTLM and Negotiate auth when not
explicitly configured. It causes connections to break during initial
protocol negotiation, which while not desirable was the original HTTP/1.0
behaviour of Squid 3.1 on which the browsers appear to depend.

Installs which have explicitly set their keep_alive parameters to ON, may
need to re-asses.

13 years agoAuthor: Stephen Thorne <stephen@thorne.id.au>
Amos Jeffries [Mon, 23 Aug 2010 02:24:51 +0000 (20:24 -0600)] 
Author: Stephen Thorne <stephen@thorne.id.au>
Bug 3021: Large DNS reply causes crash when no ipv6 resolver present

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Thu, 19 Aug 2010 02:27:34 +0000 (20:27 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 3016: HTTP/1.1 compliance: default keep-alive for 1.0/1.1 clients.

aka. NTLM Authentication with Java UA + SSL Problem
Moved httpMsgIsPersistent(version, headers) to HttpMsg::persistent(void).

This move makes it clear that the logic applies only to the message being
examined and not some irrelevant information such as HTTP version supported
by Squid.

Side-effects:

* Squid starts using persistent connections with HTTP/1.1 clients
  that do not send "Connection: close".

13 years agoSourceFormat Enforcement
Automatic source maintenance [Wed, 18 Aug 2010 02:24:34 +0000 (20:24 -0600)] 
SourceFormat Enforcement

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 18 Aug 2010 01:50:51 +0000 (19:50 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 3012: deprecate sslBump and support ssl-bump spelling in http_port

Also adds depricated support for sslbump spelling that was previously
documented in squid.conf but not supported.

13 years agoFix 32-bit wrap in refresh_pattern min/max values.
Amos Jeffries [Wed, 18 Aug 2010 01:46:52 +0000 (19:46 -0600)] 
Fix 32-bit wrap in refresh_pattern min/max values.

Attached patch limits the values to 1 year (arbitrary based on rumours
about good caching times). Checking for 32-bit wrap and setting the max
1 year limit instead of cutting them to zero.

The expected outcome of this is correct cache storage time extension
according to refresh_pattern documentation when people desperately set
min/max to > a million minutes. Instead of a silent always-stale verdict.

13 years agoHTTP/1.1 compliance: Stop using Proxy-Connection header
Amos Jeffries [Wed, 18 Aug 2010 01:45:20 +0000 (19:45 -0600)] 
HTTP/1.1 compliance: Stop using Proxy-Connection header

The Proxy-Connection header is not part of any HTTP standard. It was added
by Netscape to differentiate persistent connections to intermediary proxies
but that duty has been formally superceded by the Connection: header.

This compliance update makes Squid stop sending Proxy-Connection on outbound
requests. Starts consistently using Connection: header instead.

The Proxy-Connection header is also ignored on HTTP-strict builds.
For compatibility we must do a small violation and drop it as a hop-by-hop
header despite strict-mode technically being required to pass it through.

For origin server connections the non-strict builds will retain the
status-quo: interpret it, but treat it as an HTTP/0.9 thing to be
upgraded to HTTP/1.1 Connection: header.

squidclient is also fixed not to send it.

13 years agoBug 2997: visible_hostname directive no longer matches docs
Amos Jeffries [Wed, 18 Aug 2010 01:41:34 +0000 (19:41 -0600)] 
Bug 2997: visible_hostname directive no longer matches docs

13 years agoAuthor: Christos Tsantilas <chtsanti@users.sourceforge.net>
Amos Jeffries [Wed, 18 Aug 2010 01:38:05 +0000 (19:38 -0600)] 
Author: Christos Tsantilas <chtsanti@users.sourceforge.net>
Fix: In the case of an error while accessing a gopher server, squid will crash

The GopherStateData::req  used to retrieve the releated HttpRequest object in
gopherSendComplete function when a server while accessing the server occurs.

The GopherStateData::req is never assigned and it is always NULL (should be
removed?). The gopherState->fwd->request must be used instead.

13 years agoSourceFormat Enforcement
Automatic source maintenance [Thu, 12 Aug 2010 04:22:11 +0000 (22:22 -0600)] 
SourceFormat Enforcement

13 years agoBug 3011: ICAP, HTTPS, cache_peer probe IPv4-only port fixes
Amos Jeffries [Wed, 11 Aug 2010 11:16:41 +0000 (05:16 -0600)] 
Bug 3011: ICAP, HTTPS, cache_peer probe IPv4-only port fixes

Also updates the forwarding CONNECT_FAIL errors to display more correct
errno messages.

13 years agoBug 3003: inconsistent concepts in documentation of cache_dir
Amos Jeffries [Tue, 10 Aug 2010 08:31:49 +0000 (02:31 -0600)] 
Bug 3003: inconsistent concepts in documentation of cache_dir

Thanks to Mattias Hellstrom.

13 years agoAuthor: declanw <declanw@is.bbc.co.uk>
Amos Jeffries [Tue, 10 Aug 2010 08:31:08 +0000 (02:31 -0600)] 
Author: declanw <declanw@is.bbc.co.uk>
Bug 3004: Solaris 9 SunStudio 12 build failure.

const-correctness in IP::Address::NtoA

13 years agoBug 3006: IPV6_V6ONLY definition missing - Solaris 9 - SunStudio 12.0
Amos Jeffries [Tue, 10 Aug 2010 08:29:39 +0000 (02:29 -0600)] 
Bug 3006: IPV6_V6ONLY definition missing - Solaris 9 - SunStudio 12.0

Solaris 9 is not fully RFC 3493 compliant. It does not provide the
IPV6_V6ONLY even as a null-op option.

There are potentially other systems in the same situation. Fix is to
detect the absence of the option and fall back to split-stack on
IPv6-enabled systems without it.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Tue, 10 Aug 2010 08:25:29 +0000 (02:25 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1 Compliance: Forward multiple unknown HTTP Cache-Control directives.

httpHdrCcParseInit() ignored all unknown Cache-Control directives
except for the first one because the (type != CC_OTHER) check
applied to the debugging statement only.

Co-Advisor test case: test_case/rfc2616/endHdr-fwd-set-Cache-Control-toSrv

13 years agoAuthor: Matthias Pitzl <silamael@coronamundi.de>
Amos Jeffries [Tue, 10 Aug 2010 07:58:07 +0000 (01:58 -0600)] 
Author: Matthias Pitzl <silamael@coronamundi.de>
Fix build error on OpenBSD

13 years agoFix more libtool system header includes
Amos Jeffries [Tue, 10 Aug 2010 07:55:31 +0000 (01:55 -0600)] 
Fix more libtool system header includes

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Tue, 10 Aug 2010 07:54:30 +0000 (01:54 -0600)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Documentation: Clarify sslpassword_program arguments

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Tue, 10 Aug 2010 07:53:05 +0000 (01:53 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
HTTP/1.1 Compliance: Improved HTTP Range header field validation.

1) Improved HttpHdrRangeSpec::parseInit() to parse syntactically valid
range specs:

  * Suffix ranges with 0 length (i.e. -0) are syntactically valid.

  * Check that last-byte-pos is greater than or equal to first-byte-pos.

After the change, HttpHdrRangeSpec::parseInit() successfully parses suffix
ranges with 0 length. They were rejected before. RFC 2616 section 14.35.1 says
such range specs are syntactically valid but unsatisfiable. Thus, we should
ignore the range spec itself, but not the whole range header. These range
specs will be rejected later, during canonization.

2) In HttpHdrRangeSpec::parseInit(), ignore the whole range header if one of
range specs is syntactically invalid (i.e. range spec parsing fails).

Co-Advisor test case: test_clause/rfc2616/invalidRange

13 years agoBug 3001: dnsserver link issues
Amos Jeffries [Tue, 10 Aug 2010 02:47:44 +0000 (20:47 -0600)] 
Bug 3001: dnsserver link issues

13 years ago3.1.6 SQUID_3_1_6
Amos Jeffries [Sun, 1 Aug 2010 14:01:09 +0000 (08:01 -0600)] 
3.1.6

13 years agoPrep for 3.1.6
Amos Jeffries [Sun, 1 Aug 2010 13:57:36 +0000 (01:57 +1200)] 
Prep for 3.1.6

13 years agoHack: define top_build_prefix for old autotools
Amos Jeffries [Sun, 1 Aug 2010 13:34:08 +0000 (07:34 -0600)] 
Hack: define top_build_prefix for old autotools

This hack was removed during the libtool 2.2 upgrade.

The issue shows up as bundle builds failing to link libltdl/libltdlc.la
when they should in fact be linking ../libltdl/libltdlc.la in src/Makefile

It is caused by the macros of libtool 2.2 assuming the presence of
top_build_prefix but since autoconf 2.62 that was replaced with
ac_top_build_prefix and is no longer automatically defined in Makefile's.

Some distros also seem to have back-ported the removal of top_build_prefix
into their old autoconf causing macro version tests to fail.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Sun, 1 Aug 2010 13:32:36 +0000 (07:32 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 2975: chunked requests not supported after regular ones

Clean dechunking state to avoid a 501 response to a chunked request
following a non-chunked request on a persistent connection.

13 years agoBug 2994: Basic split-stack functionality
Amos Jeffries [Sun, 1 Aug 2010 13:29:09 +0000 (07:29 -0600)] 
Bug 2994: Basic split-stack functionality

Enable split-stack detection by default.

There is now enough split-stack support to enable accepting IPv6 client
connections on systems with separate IPv4/IPv6 stacks. Also some limited
server connection capabilities (see tcp_outgoing_addr config hacks).

SNMP, ICP, HTCP listeners and outbound connections currently default to
IPv4-only on these systems to retain backward-compatibility.
But may be explicity configured to IPv6-only. There is no support as yet
for dual-protocol behaviour in the sockets of these three protocols.

13 years agoAuthor: Milen Pankov <mail@milen.pankov.eu>
Amos Jeffries [Sun, 1 Aug 2010 13:13:10 +0000 (07:13 -0600)] 
Author: Milen Pankov <mail@milen.pankov.eu>
squid_db_auth support md5 encrypted passwords

--md5 option supporting unsalted MD5 password

13 years agoMake memory_pools_limit an int64_t to handle signed "none" values.
Amos Jeffries [Sat, 31 Jul 2010 14:38:47 +0000 (08:38 -0600)] 
Make memory_pools_limit an int64_t to handle signed "none" values.

13 years agoAuthor: Christos Tsantilas <chtsanti@users.sourceforge.net>
Amos Jeffries [Sat, 31 Jul 2010 14:36:34 +0000 (08:36 -0600)] 
Author: Christos Tsantilas <chtsanti@users.sourceforge.net>
Fix: 32bit integer used in HttpStateData to store the bytes received from next hop

A simple integer used to store the bytes received from the next hop
(http server of proxy), which my cause problems when receives huge
http objects on 32bit systems.

13 years agoAuthor: Christos Tsantilas <chtsanti@users.sourceforge.net>
Amos Jeffries [Sat, 31 Jul 2010 14:32:14 +0000 (08:32 -0600)] 
Author: Christos Tsantilas <chtsanti@users.sourceforge.net>
Fix: The bytes to/from the ICAP server may not logged correctly on 32bit systems

A simple long int (doint/outint) used to log bytes sent/received to/from
the ICAP server, ICAP requests with very large http objects will not
logged correctly. Use int64_t (dooff/outoff) instead

13 years agoAuthor: Matthias Pitzl <silamael@coronamundi.de>
Amos Jeffries [Sat, 31 Jul 2010 14:27:50 +0000 (08:27 -0600)] 
Author: Matthias Pitzl <silamael@coronamundi.de>
Bug 2991: Wrong parameters to fcntl() in commSetCloseOnExec()

13 years agoAuthor: Christos Tsantilas <chtsanti@users.sourceforge.net>
Amos Jeffries [Sat, 31 Jul 2010 14:26:39 +0000 (08:26 -0600)] 
Author: Christos Tsantilas <chtsanti@users.sourceforge.net>
Add a missing break.

Currently does not have any effect but it may cause problems in the feature.

13 years agoBug 2988: Updated documentation of TCP keepalive
Amos Jeffries [Sat, 31 Jul 2010 14:24:36 +0000 (08:24 -0600)] 
Bug 2988: Updated documentation of TCP keepalive

13 years agoDebug stub requires stdio.h
Amos Jeffries [Thu, 29 Jul 2010 01:10:13 +0000 (19:10 -0600)] 
Debug stub requires stdio.h

13 years ago3.1.5.1 SQUID_3_1_5_1
Amos Jeffries [Wed, 28 Jul 2010 08:09:21 +0000 (02:09 -0600)] 
3.1.5.1

13 years agoAdd stub debug API.
Amos Jeffries [Wed, 28 Jul 2010 07:59:53 +0000 (01:59 -0600)] 
Add stub debug API.

To resolve link dependency blowout from linking libip.la with debug.

13 years agoPrep for 3.1.5.1
Amos Jeffries [Wed, 28 Jul 2010 06:55:23 +0000 (18:55 +1200)] 
Prep for 3.1.5.1

13 years agoSourceFormat Enforcement
Automatic source maintenance [Wed, 28 Jul 2010 01:23:12 +0000 (19:23 -0600)] 
SourceFormat Enforcement

13 years agoReplace most USE_IPV6 with run-time support probing
Amos Jeffries [Tue, 27 Jul 2010 13:02:31 +0000 (07:02 -0600)] 
Replace most USE_IPV6 with run-time support probing

This unifies the code built for IPv4-only, dual-stack and split-stack.

 * --disable-ipv6 option remains, however it now prevents the run-time probe

 * Probing previously done in ./configure at build time is now merged and
performed run-time on every startup. IPv6 is enabled or disabled based on
the underlying OS support for sockets and setsockopt operations required.

 * Parsing and other operations which can be performed without specific IPv6
connectivity are enabled.

 * Some DNS logic alterations have had to be made to merge the split-stack
DNS and leverage it for IPv4-only mode. Otherwise the logics are unchanged
from previous dual-stack builds which have been well tested.

13 years agoAuthor: Various Translators
Amos Jeffries [Tue, 27 Jul 2010 11:22:48 +0000 (23:22 +1200)] 
Author: Various Translators
Translations: sync with 3.HEAD language updates

13 years agoSplit-Stack enable DNS and http(s)_port sockets.
Amos Jeffries [Sun, 25 Jul 2010 08:04:41 +0000 (02:04 -0600)] 
Split-Stack enable DNS and http(s)_port sockets.

This breaks the DNS sockets into two when split-stack mode is used.
DnsSocketA becomes IPv4-only and DnsSocketB becomes used as IPv6-only.
Without Split-stack mode DnsSocketA is the only one actually used.

NP: comm outgoing socket support is still a blocker on split-stack support.
However this update is required for the upcoming run-time support.

13 years agoBug 2963: --with-valgrind-debug failures ignored
Amos Jeffries [Fri, 23 Jul 2010 05:00:37 +0000 (23:00 -0600)] 
Bug 2963: --with-valgrind-debug failures ignored

Made to hard-fail if --with is used.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Fri, 23 Jul 2010 04:30:08 +0000 (22:30 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Fixed comm.cc:377: "fd_table[fd].halfClosedReader != NULL" assertion

Client side must stop reading when switching to a tunnel mode. The old code
called low-level commSetSelect to stop reading, but that left Comm tables in
an inconsistent state, with the client side reader callback still scheduled.
Squid would assert when the tunnel called comm_read with its own callback.

The bug is unrelated to half-closed connections despite halfClosedReader
mentioned in the assertion text. The assertion means "no more than one active
reader per FD".

13 years agoAuthor: Francesco Chemolli <kinkie@squid-cache.org>
Amos Jeffries [Fri, 23 Jul 2010 04:28:43 +0000 (22:28 -0600)] 
Author: Francesco Chemolli <kinkie@squid-cache.org>
Kludge: try to detect system acinclude path, to fix libtool brokenness.

13 years agoAuthor: isaac <isaacarsenal@gmail.com>
Amos Jeffries [Wed, 21 Jul 2010 08:08:26 +0000 (02:08 -0600)] 
Author: isaac <isaacarsenal@gmail.com>
Bug 2985: search scope for digest_ldap_auth didn't work

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Wed, 21 Jul 2010 07:48:15 +0000 (01:48 -0600)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Update libtool autoconf macros to libtool2 style

13 years agoCorrection documentation of QoS disable-preserve-miss
Amos Jeffries [Wed, 21 Jul 2010 07:40:22 +0000 (01:40 -0600)] 
Correction documentation of QoS disable-preserve-miss

13 years agoRemove .so from SASL build checks
Amos Jeffries [Wed, 21 Jul 2010 07:23:43 +0000 (01:23 -0600)] 
Remove .so from SASL build checks

We definitely require the .a and .la files to build against SASL libraries.
The run-time .so is only relevant later.

13 years agoAuthor: Karl Benoit <karl.isatwork@gmail.com>
Amos Jeffries [Wed, 21 Jul 2010 07:22:55 +0000 (01:22 -0600)] 
Author: Karl Benoit <karl.isatwork@gmail.com>
Bug 2885: AIX support: c only c++ style comments test case

13 years agoBug 2885: AIX support: check libm for log()
Amos Jeffries [Wed, 21 Jul 2010 07:22:02 +0000 (01:22 -0600)] 
Bug 2885: AIX support: check libm for log()

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 21 Jul 2010 07:17:51 +0000 (01:17 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Do not stop accepting just because we got COMM_NOMESSAGE.

Do not dereference a possibly NULL callback pointer.

13 years agoAuthor: Karl Benoit <karl.isatwork@gmail.com>
Amos Jeffries [Thu, 15 Jul 2010 00:47:20 +0000 (18:47 -0600)] 
Author: Karl Benoit <karl.isatwork@gmail.com>
Bug 2885: AIX support: uchar is already define (more)

13 years agoAuthor: Karl Benoit <karl.isatwork@gmail.com>
Amos Jeffries [Thu, 15 Jul 2010 00:36:09 +0000 (18:36 -0600)] 
Author: Karl Benoit <karl.isatwork@gmail.com>
Bug 2885: AIX support: uchar is already define

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 14 Jul 2010 23:47:08 +0000 (17:47 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Bug 2651: crash handling NULL write callback

Check whether the old-style (function-based) callback has the
function address to call. A writer may leave no "callback number".

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Wed, 14 Jul 2010 23:45:54 +0000 (17:45 -0600)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Correct Joomla DB auth handling

Found while reading the code. Original clearly could not have worked as
it split the password field using an uninitialized delimiter.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 14 Jul 2010 23:42:01 +0000 (17:42 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Fixed memory leak related to retried requests.

ErrorState object was not destroyed if the failed request to the origin
server or peer was retried.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 14 Jul 2010 23:41:16 +0000 (17:41 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Prevent memory leaks when cloning Range requests.

HttpRequest::range field was set to a new HttpHdrRange object twice:
once in HttpRequest::clone() and once in HttpRequest::hdrCacheInit()
called from clone().

Polished HttpReply::clone() to make sure HttpReply::hdrCacheInit()
does not use uninitialized HttpReply::sline field and to prevent
benign double-initialization of HttpReply::keep_alive.

13 years agoAuthor: Alex Rousskov <rousskov@measurement-factory.com>
Amos Jeffries [Wed, 14 Jul 2010 23:40:27 +0000 (17:40 -0600)] 
Author: Alex Rousskov <rousskov@measurement-factory.com>
Fixed memory leaks related to Range requests.

HttpRequest::range field could be cleared without destroying HttpHdrRange
object in clientInterpretRequestHeaders().

The range field is essentially a cached value of the parsed Range header.
Managing the cache outside its owner object is a bad idea.

13 years agoBetter bug 2972 fix.
Amos Jeffries [Mon, 5 Jul 2010 11:50:36 +0000 (05:50 -0600)] 
Better bug 2972 fix.

sed the includes explicitly. Previous run worked unless code was actually
bootstrapped to an older libtool version.

13 years agoBug 2972: LTDL 2.2.6b compile errors
Amos Jeffries [Mon, 5 Jul 2010 11:00:00 +0000 (05:00 -0600)] 
Bug 2972: LTDL 2.2.6b compile errors

Bundle a slightly hacked version of libltdl/ltdl.h which does not use <>
for inclusion of its dependency files. This makes it portable to OS with
older libtool versions.

13 years agoMaintenance: Fix validaton of release version SQUID_3_1_5
Amos Jeffries [Fri, 2 Jul 2010 02:19:59 +0000 (20:19 -0600)] 
Maintenance: Fix validaton of release version

13 years ago3.1.5
Amos Jeffries [Fri, 2 Jul 2010 02:03:45 +0000 (20:03 -0600)] 
3.1.5

13 years agoPrep for 3.1.5
Amos Jeffries [Fri, 2 Jul 2010 01:59:56 +0000 (13:59 +1200)] 
Prep for 3.1.5

13 years agoFix context leak in HttpStateData::processReplyHeader
Amos Jeffries [Fri, 2 Jul 2010 01:24:43 +0000 (19:24 -0600)] 
Fix context leak in HttpStateData::processReplyHeader

13 years agoAuthor: Matthias Pitzl <silamael@coronamundi.de>
Amos Jeffries [Sun, 27 Jun 2010 09:54:35 +0000 (21:54 +1200)] 
Author: Matthias Pitzl <silamael@coronamundi.de>
Bug 2967: raw-IPv6 address URL with append_domain broken

13 years agoAuthor: Sean Critica <sean.critica@gmail.com>
Amos Jeffries [Sun, 27 Jun 2010 09:50:06 +0000 (21:50 +1200)] 
Author: Sean Critica <sean.critica@gmail.com>
Bug 2903: does not send indirect X-Client-Ip in ICAP respmod

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Sun, 27 Jun 2010 09:44:17 +0000 (21:44 +1200)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Fix free memory corruption and off-by-on error when comparing SNMP OIDs

Both introduced by the polishing of the SNMP tree generator.

13 years agoAuthor: Henrik Nordstrom <henrik@henriknordstrom.net>
Amos Jeffries [Sun, 27 Jun 2010 09:40:48 +0000 (21:40 +1200)] 
Author: Henrik Nordstrom <henrik@henriknordstrom.net>
Restart DNS retransmission count when restarting the query as an A lookup

13 years agoAuthor: Robert Collins <robertc@robertcollins.net>
Amos Jeffries [Sun, 27 Jun 2010 09:35:30 +0000 (21:35 +1200)] 
Author: Robert Collins <robertc@robertcollins.net>
Bug 2950: HTTP responses with no Date, L-M or Expires can now be cached

HTTP responses with no Date, Last-modified or Expires headers can
now be cached (given an appropriate refresh_pattern). Previously we
were not caching them in case of an infinite loop in cache farms:
however Squid adds Date: headers now which remove that concern.