]> git.ipfire.org Git - thirdparty/squid.git/log
thirdparty/squid.git
13 years agoBug 2976: squid reports ERR_INVALID_URL for transparently captured requests when...
Christos Tsantilas [Sat, 21 Jul 2012 03:50:06 +0000 (21:50 -0600)] 
Bug 2976: squid reports ERR_INVALID_URL for transparently captured requests when reconfiguring

During reconfigure the configured port config objects in http_port_list
may deleted so it is not safe to use them while processing Http requests.
For this reason inside prepareTransparentURL (file client_side.cc) function
the protocol was hard-coded to "http" instead of read it from the related
port config object.
But this is breaks the intercepted https traffic.

This patch:
  1. Inside prepareTransparentURL read the protocol from the related
     port config object
  2. add_http_port() locks the new port pointer before linking it.
  3. parse_*() locks the new port pointer before linking it.
  4. free_*() unlocks the old port pointer before unlinking
     it. It does not delete the old pointer.

This patch also discussed in squid-dev user mailing list in
 "Re: [PATCH] Squid host rewrite for intercepted https requests"
thread.

This is a Measurement Factory project

13 years agoBug 3484: Docs: sslproxy_cert_error example flawed
Guy Helmer [Sat, 21 Jul 2012 03:39:52 +0000 (21:39 -0600)] 
Bug 3484: Docs: sslproxy_cert_error example flawed

This is still far from perfect because dstdomain is not really a FAST ACL
either: Its documentation says that it becomes slow on IP addresses.

13 years agoBug 3133: better fix: Memory leak handling requests for sites that don't exist
Alex Rousskov [Wed, 4 Jul 2012 03:27:59 +0000 (21:27 -0600)] 
Bug 3133: better fix: Memory leak handling requests for sites that don't exist

13 years agoBug 3564: eCAP not supporting CoAP URI schemes
Amos Jeffries [Tue, 19 Jun 2012 07:37:37 +0000 (01:37 -0600)] 
Bug 3564: eCAP not supporting CoAP URI schemes

13 years ago3.1.20 SQUID_3_1_20
Amos Jeffries [Fri, 8 Jun 2012 11:19:27 +0000 (05:19 -0600)] 
3.1.20

13 years agoBug 3013: segmentation fault on shutdown commSetCloseOnExec at comm.cc:1889
Christos Tsantilas [Tue, 5 Jun 2012 09:10:03 +0000 (03:10 -0600)] 
Bug 3013: segmentation fault on shutdown commSetCloseOnExec at comm.cc:1889

13 years agoBug 3233: Invalid URL accepted with url host is white spaces
Amos Jeffries [Tue, 5 Jun 2012 09:08:03 +0000 (03:08 -0600)] 
Bug 3233: Invalid URL accepted with url host is white spaces

13 years agoBug 3074: Improper URL handling with empty path (RFC 3986)
Fyodor [Tue, 5 Jun 2012 09:06:55 +0000 (03:06 -0600)] 
Bug 3074: Improper URL handling with empty path (RFC 3986)

13 years agoBug 3463: dnsserver fails to compile
Christos Tsantilas [Tue, 5 Jun 2012 09:02:11 +0000 (03:02 -0600)] 
Bug 3463: dnsserver fails to compile

13 years agoBug 3390: Proxy auth data visible to scripts
Francesco Chemolli [Tue, 5 Jun 2012 08:22:47 +0000 (02:22 -0600)] 
Bug 3390: Proxy auth data visible to scripts

13 years agoExtend g++ compatibility for extern inline functions
Francesco Chemolli [Tue, 5 Jun 2012 08:20:20 +0000 (02:20 -0600)] 
Extend g++ compatibility for extern inline functions

13 years agoBug 3545: FreeBSD dnsserver segfaults
Marcin Wisnicki [Wed, 30 May 2012 06:09:55 +0000 (00:09 -0600)] 
Bug 3545: FreeBSD dnsserver segfaults

13 years agoBug 3466: Adaptation stuck on last single-byte body piece
Alex Rousskov [Tue, 29 May 2012 11:35:09 +0000 (05:35 -0600)] 
Bug 3466: Adaptation stuck on last single-byte body piece

Changed StoreEntry::bytesWanted(range) to return range.end when the entry can
accommodate range.end bytes. This makes it possible to use that method for
single-byte ranges. Old code returned zero for such ranges, which was
difficult to distinguish from situations where no bytes were wanted at all.

TODO: The StoreEntry::bytesWanted(range) API is left undocumented because it
seems to be slightly broken and/or inconsistent with callers and with the
DelayId::bytesWanted(min, max) API. AFAICT, we should convert
StoreEntry::bytesWanted API from range-based to min/max-based or even just
max-based.

Store Entry API does not use the lower end of the range (except for the
now-removed assertion that the range is not empty). I suspect that Store API
was meant to be used with (first, last+1) "byte position" parameters (returning
the number of bytes wanted) while the DelayId API was meant to be used with
(min, max) "number of bytes" parameters.  However, StoreEntry::bytesWanted
implementation does not follow this assumption so perhaps my speculation is
wrong and there are more problems, including this change.

13 years agoBug 3539: CONNECT server connection not closed correctly on errors
Chao [Mon, 30 Apr 2012 06:15:37 +0000 (00:15 -0600)] 
Bug 3539: CONNECT server connection not closed correctly on errors

13 years agoBug 3133: Memory leak handling requests for sites that don't exist
Stefan Fritsch [Fri, 20 Apr 2012 10:36:06 +0000 (04:36 -0600)] 
Bug 3133: Memory leak handling requests for sites that don't exist

13 years agoBug 3504: Regression: clientside_tos fails to mark traffic
Amos Jeffries [Fri, 23 Mar 2012 03:37:46 +0000 (21:37 -0600)] 
Bug 3504: Regression: clientside_tos fails to mark traffic

revison squid-3.1-10302 removing clientside_tos was a mistake.
The actual problem was portage of ssl_bump access control wrongly
dropping the clientside_tos_done flag.

clientside_mark is the 3.2-only directive.

13 years agoFix URL schemes out of sync
Amos Jeffries [Fri, 23 Mar 2012 03:22:25 +0000 (21:22 -0600)] 
Fix URL schemes out of sync

testURLScheme.cc:115:Assertion
Test name: testURLScheme::testConst_str
equality assertion failed
- Expected: wais
- Actual  : icp

13 years agoAnyP is a 3.2-only namespace
Amos Jeffries [Fri, 16 Mar 2012 14:20:57 +0000 (08:20 -0600)] 
AnyP is a 3.2-only namespace

13 years agoSupport CoAP over HTTP
Amos Jeffries [Fri, 16 Mar 2012 06:19:24 +0000 (00:19 -0600)] 
Support CoAP over HTTP

Make Squid happy with HTTP requests using coap:// and coaps:// URI.

No gateway or other interaction with CoAP is enabled by this patch.

13 years agoBug 3263: ssl_crtd: undefined references to squid_curtime
Alex Rousskov [Fri, 16 Mar 2012 06:12:44 +0000 (00:12 -0600)] 
Bug 3263: ssl_crtd: undefined references to squid_curtime

13 years agoBug 3439: correct external_acl_type documented default for ipv4/ipv6 option
Amos Jeffries [Fri, 16 Mar 2012 06:07:26 +0000 (00:07 -0600)] 
Bug 3439: correct external_acl_type documented default for ipv4/ipv6 option

13 years agoFix closePipesSafely. It is a 3.2 feature
Amos Jeffries [Fri, 16 Mar 2012 05:21:37 +0000 (23:21 -0600)] 
Fix closePipesSafely. It is a 3.2 feature

13 years agoRevert rev10436. Correct patch already applied in 3.1.19
Amos Jeffries [Wed, 7 Mar 2012 01:35:59 +0000 (18:35 -0700)] 
Revert rev10436. Correct patch already applied in 3.1.19

13 years agoBug 3420: part 2: Request body consumption races and theConsumer
Alex Rousskov [Wed, 7 Mar 2012 01:14:42 +0000 (18:14 -0700)] 
Bug 3420: part 2: Request body consumption races and theConsumer

13 years agoBetter helper-to-Squid buffer size management.
Alex Rousskov [Wed, 7 Mar 2012 01:09:59 +0000 (18:09 -0700)] 
Better helper-to-Squid buffer size management.

The minimum buffer size is reduced from 8KB to 4KB after a squid-dev
discussion to prevent wasting of "several hundred KB of unused permanent
memory on some installations".

We now increase the buffer if we cannot parse the helper response message.

The maximum buffer size is now 32KB. This should be enough for all known
helper responses.

We now warn if the read buffer reaches its capacity and kill the offending
helper explicitly. An increase in maximum buffer capacity to 32KB should make
such events rare.

Motivation: ssl_crtd helper may produce responses exceeding 9907 bytes in size
(and possibly much larger if multiple chained certificates need to be returned
to Squid). The old helper.cc code would fill the read buffer completely,
schedule a read for zero bytes, receive zero bytes, declare an EOF condition,
and close the stream (which kills ssl_crtd).  Due to insufficient information
logged, the observable symptoms were pretty much the same as if ssl_crtd
closed the stream first, indicating a ssl_crtd bug.

13 years agoSupport for 3.2 error template codes
Amos Jeffries [Sun, 4 Mar 2012 06:34:39 +0000 (23:34 -0700)] 
Support for 3.2 error template codes

13 years agoTranslations: Sync with 3.2
Various Translators [Sun, 4 Mar 2012 06:13:18 +0000 (23:13 -0700)] 
Translations: Sync with 3.2

13 years agoRegression: snmp/udp address directives not resolving hostname
Amos Jeffries [Sat, 3 Mar 2012 23:56:47 +0000 (16:56 -0700)] 
Regression: snmp/udp address directives not resolving hostname

13 years agoBug 3502: client timeout uses server-side read_timeout, not request_timeout
HONDA Hirofumi [Sat, 3 Mar 2012 23:50:50 +0000 (16:50 -0700)] 
Bug 3502: client timeout uses server-side read_timeout, not request_timeout

Also adjusts request_timeout description in squid.conf to clarify that
request_timeout applies to receiving complete HTTP request headers and not
just the first header byte or body. We reset the connection timeout to
clientLifetimeTimeout after parsing request headers.

https_port was correctly using Config.Timeout.request already.

13 years ago3.1.19 SQUID_3_1_19
Amos Jeffries [Sun, 5 Feb 2012 11:51:07 +0000 (04:51 -0700)] 
3.1.19

13 years agoPrep for 3.1.19
Amos Jeffries [Sun, 5 Feb 2012 11:46:03 +0000 (04:46 -0700)] 
Prep for 3.1.19

13 years agoBug 3441: part 2: Prevent further cache size corruption of swap.state
Alex Rousskov [Sun, 5 Feb 2012 07:31:45 +0000 (00:31 -0700)] 
Bug 3441: part 2: Prevent further cache size corruption of swap.state

13 years agoBug 3441: Part 1: Minimize cache size corruption by malformed swap.state.
Alex Rousskov [Sat, 4 Feb 2012 05:46:26 +0000 (22:46 -0700)] 
Bug 3441: Part 1: Minimize cache size corruption by malformed swap.state.

If swap.state gets corrupted, a single entry with bogus size value will screw
up Squid idea of the current cache size. A newly added StoreSwapLogData sane()
method attempts to minimize the chance of corruption by ignoring log entries
with obviously bogus values.

However, without expensive size checks (-S or "Does the log entry matches the
actual cache file size?"), it is not possible to reliably detect all bogus log
entries.

If Squid gets a wrong idea of the current cache size, it may either cache too
much (and possibly run out of space) OR delete everything.

13 years agoGCC 4.7 SSL fix
Jiri Skala [Wed, 1 Feb 2012 07:55:01 +0000 (00:55 -0700)] 
GCC 4.7 SSL fix

13 years agoBug 3470: GCC 4.7
Amos Jeffries [Wed, 1 Feb 2012 07:53:53 +0000 (00:53 -0700)] 
Bug 3470: GCC 4.7

13 years agoBug 3370: external ACL sometimes skipping
Amos Jeffries [Wed, 1 Feb 2012 07:44:49 +0000 (00:44 -0700)] 
Bug 3370: external ACL sometimes skipping

Emit tag/user/log/message/pass details to the request in the case where
the external ACL entry has expired but within graceful revalidate period.

The result of this bug appears as incorrect matches later down the ACL
processing in any config relying on the external ACL output values.
Example; for bypassing auth login, or for filtering tagged traffic.

13 years agoDo not add HTTP 110 and 111 Warnings to TCP_REFRESH_UNMODIFIED responses.
Alex Rousskov [Sat, 21 Jan 2012 01:16:48 +0000 (18:16 -0700)] 
Do not add HTTP 110 and 111 Warnings to TCP_REFRESH_UNMODIFIED responses.

The old "stale if hit" logic did not account for cases where the stored
stale response became fresh due to a successful revalidation with the
origin server.
When the stored response was stale at the time of the request, we were
adding 110 "Response is stale" and even 111 "Revalidation failed"
Warning headers to responses while logging TCP_REFRESH_UNMODIFIED, which
is considered a hit.

13 years agoSourceFormat Enforcement
Automatic source maintenance [Sat, 14 Jan 2012 20:47:40 +0000 (13:47 -0700)] 
SourceFormat Enforcement

13 years agoBug 3420: Request body consumption races and !theConsumer exception.
Alex Rousskov [Sat, 14 Jan 2012 07:19:41 +0000 (00:19 -0700)] 
Bug 3420: Request body consumption races and !theConsumer exception.

Also fixes endless waiting for HTTP client to send req body we no longer need.

Before these changes, the client side used a single "closing" state to
handle two different error conditions:

  1. We stopped receiving request body because of some error.
  2. We stopped sending response because of some error.

When a "directional" error occurred, we try to keep the transaction going in
the other direction (e.g., to give ICAP the entire request or to give HTTP
client the entire response). However, because there was just one "closing"
state, the code failed to correctly detect or process many corner cases,
resulting in stuck transactions and !theConsumer assertions/exceptions due to
races between enableAutoConsumption() and expectNoConsumption() calls.

This patch replaces the "closing" state with two direction-specific "we
stopped sending/receiving" flags.

Now, when the response sending code is done, it now checks whether the
receiving code stopped and closes the connection as needed. This is done both
when we encounter a sending error (ClientSocketContext::initiateClose) and
when we successfully sent the entire response to the client
(ClientSocketContext::keepaliveNextRequest).

Similarly, when the request body reading code is done, it now checks whether
the receiving code stopped and closes the connection as needed. This is done
both when we encounter a receiving error
(ConnStateData::noteBodyConsumerAborted) and when we successfully receive the
entire request body from the client (ClientSocketContext::writeComplete).

TODO: This patch focuses on various error cases. We might still have problems
when there is an early HTTP response and no errors of any kind. I marked the
corresponding old code with an XXX.

13 years agoBug 3473: erase last uses of obsolete auth_user_hash_pointer
Amos Jeffries [Tue, 10 Jan 2012 02:40:32 +0000 (19:40 -0700)] 
Bug 3473: erase last uses of obsolete auth_user_hash_pointer

13 years agoBug 3085: Crash when parsing esi:include
Amos Jeffries [Tue, 3 Jan 2012 22:11:51 +0000 (15:11 -0700)] 
Bug 3085: Crash when parsing esi:include

13 years agoBug 3442: assertion failed: external_acl.cc:908: ch->auth_user_request != NULL
Amos Jeffries [Thu, 8 Dec 2011 11:13:29 +0000 (04:13 -0700)] 
Bug 3442: assertion failed: external_acl.cc:908: ch->auth_user_request != NULL

External ACL sometimes cannot find the credentials in ACL Checklist even
if they are attached to the HTTPRequest object.

This seems to happen when the checklist is created and the line match
started before the credentials are known. The credentials validation
updates the HTTP request state but is not aware of ACL checklists needing
to be updated so it never happens.

This patch:
* locate the %LOGIN value from either place where credentials can be found,
* updates the checklist if it was unset,
* passes '-' to the helper if no credentials at all were given.

Although the earlier logics forcing a lookup means this '-' case should
not happen it might if the external ACL were processed in 'fast' check.

13 years agoPolish: debug messages on swap.state rename failure
Amos Jeffries [Thu, 8 Dec 2011 11:11:32 +0000 (04:11 -0700)] 
Polish: debug messages on swap.state rename failure

13 years agoPortability: SSL library dependency fixes
Victor Jose Hernandez Gomez [Wed, 7 Dec 2011 12:04:20 +0000 (05:04 -0700)] 
Portability: SSL library dependency fixes

This displays as many 'undefined reference to' on various X509_* objects.

Correct the library linkage order such that our local library links first
and gets visibility of the OpenSSL library definitions.

13 years agoBug 3440: compile error in Adaptation
Joshua Root [Tue, 6 Dec 2011 12:31:35 +0000 (05:31 -0700)] 
Bug 3440: compile error in Adaptation

13 years ago3.1.18 SQUID_3_1_18
Amos Jeffries [Sat, 3 Dec 2011 06:18:25 +0000 (23:18 -0700)] 
3.1.18

13 years agoRegression: compile error in FTP
Amos Jeffries [Sat, 3 Dec 2011 02:46:33 +0000 (19:46 -0700)] 
Regression: compile error in FTP

13 years ago3.1.17 SQUID_3_1_17
Amos Jeffries [Fri, 2 Dec 2011 14:28:40 +0000 (07:28 -0700)] 
3.1.17

13 years agoBug 3422: Buffer overflow in recv-announce
Jan Klemkow [Fri, 2 Dec 2011 12:56:17 +0000 (05:56 -0700)] 
Bug 3422: Buffer overflow in recv-announce

13 years agoBug 3428: Active FTP data channel accepted twice
Michael Weiser [Fri, 2 Dec 2011 12:54:55 +0000 (05:54 -0700)] 
Bug 3428: Active FTP data channel accepted twice

13 years agoBug 3432: Crash logging FTP errors
yabuki [Fri, 2 Dec 2011 12:43:54 +0000 (05:43 -0700)] 
Bug 3432: Crash logging FTP errors

13 years agoBug 3430: Document SSL EDH cipher configuration issues
Amos Jeffries [Fri, 2 Dec 2011 12:42:05 +0000 (05:42 -0700)] 
Bug 3430: Document SSL EDH cipher configuration issues

13 years agoWindows: cf_gen requires a .exe extension
Amos Jeffries [Fri, 2 Dec 2011 12:37:09 +0000 (05:37 -0700)] 
Windows: cf_gen requires a .exe extension

13 years agoPortability: fix radix.c include sequence
Amos Jeffries [Fri, 2 Dec 2011 12:36:12 +0000 (05:36 -0700)] 
Portability: fix radix.c include sequence

13 years agoFix segfault in %F error page token
Amos Jeffries [Fri, 2 Dec 2011 12:34:56 +0000 (05:34 -0700)] 
Fix segfault in %F error page token

13 years agoPolish: convert one SECURITY WARNING to ALERT
Amos Jeffries [Fri, 2 Dec 2011 12:28:58 +0000 (05:28 -0700)] 
Polish: convert one SECURITY WARNING to ALERT

13 years agoBug 2619: Excessive RAM growth due to unlimited adapted body data consumption
Martin Huter [Fri, 2 Dec 2011 12:17:07 +0000 (05:17 -0700)] 
Bug 2619: Excessive RAM growth due to unlimited adapted body data consumption

If the client does not read from the open connection (i.e. the user does not
confirm the browsers download-message-box in microsofts IE), squid keeps on
reading data from the ICAP server into the store entry, while no more data
can be delivered to the client.
Thus the store entry in memory is growing and squid may - in worst case -
consume memory up to the size of the users download.

This patch add API to StoreEntry to call the producer back when released
memory/space from the StoreEntry and add code to the ICAP client code to not
consume body data comes from the ICAP server when there is not available space
in the store entry.

13 years agoSupport %% in external ACL format
Amos Jeffries [Fri, 2 Dec 2011 08:28:17 +0000 (01:28 -0700)] 
Support %% in external ACL format

13 years agoImproved SASL / SASL2 detection
Francesco Chemolli [Tue, 29 Nov 2011 12:39:25 +0000 (05:39 -0700)] 
Improved SASL / SASL2 detection

Solaris and Darwin require -lsasl compile flag detection independent of
the .h include file naming. This may help other OS as well.

13 years agoBug 3423: access violation in URL parser
Jan Klemkow [Thu, 24 Nov 2011 11:11:42 +0000 (04:11 -0700)] 
Bug 3423: access violation in URL parser

13 years agoAvoid crashes when processing bad X509 common names (CN).
Alex Rousskov [Thu, 24 Nov 2011 07:20:46 +0000 (00:20 -0700)] 
Avoid crashes when processing bad X509 common names (CN).

X509_REQ_get_pubkey() returns a refcounted object that we must clean after use.
X509_REQ_get_subject_name() does not; cleaning the result may cause segfaults.
How we are supposed to tell the difference is beyond me.

13 years agoBug 2910: MemBuf may grow beyond max_capacity
Alex Rousskov [Thu, 17 Nov 2011 09:51:07 +0000 (02:51 -0700)] 
Bug 2910: MemBuf may grow beyond max_capacity

13 years agoBug 3412: External ACL Uses Invalid Cache Entry
Amos Jeffries [Thu, 17 Nov 2011 09:48:40 +0000 (02:48 -0700)] 
Bug 3412: External ACL Uses Invalid Cache Entry

13 years agoBug 3398: persistent server connection closed after PUT/DELETE
Christos Tsantilas [Thu, 17 Nov 2011 09:44:39 +0000 (02:44 -0700)] 
Bug 3398: persistent server connection closed after PUT/DELETE

13 years agoFix assertion when dstdomain abused in access controls
Amos Jeffries [Thu, 17 Nov 2011 09:42:02 +0000 (02:42 -0700)] 
Fix assertion when dstdomain abused in access controls

This converts an assertion into a logged warning and a failed-match if
dstdomain ACLs are used in places where the HTTP request is not available.

13 years agoBug 3408: Wrong header length leads to EFAULTs when creating UFS swap.log.new
Matthias Pitzl [Thu, 17 Nov 2011 09:40:29 +0000 (02:40 -0700)] 
Bug 3408: Wrong header length leads to EFAULTs when creating UFS swap.log.new

Also localized the header variable as it may be destroyed at any time.

13 years agoBug 3299: dnsserver: various undefined references
Amos Jeffries [Sun, 6 Nov 2011 07:24:35 +0000 (01:24 -0600)] 
Bug 3299: dnsserver: various undefined references

13 years agoPortability: add cstdarg as source of var_arg when available
Amos Jeffries [Sun, 6 Nov 2011 07:16:18 +0000 (01:16 -0600)] 
Portability: add cstdarg as source of var_arg when available

13 years agoSourceFormat Enforcement
Automatic source maintenance [Mon, 31 Oct 2011 01:15:38 +0000 (19:15 -0600)] 
SourceFormat Enforcement

13 years agoBug 1243: Build overrides configured AR setting
Amos Jeffries [Sun, 30 Oct 2011 06:27:44 +0000 (00:27 -0600)] 
Bug 1243: Build overrides configured AR setting

13 years agoBug 3077: '\' in url query strings cause Digest authentication to fail
Amos Jeffries [Sun, 30 Oct 2011 06:20:26 +0000 (00:20 -0600)] 
Bug 3077: '\' in url query strings cause Digest authentication to fail

13 years ago3.1.16 SQUID_3_1_16
Amos Jeffries [Thu, 13 Oct 2011 08:28:51 +0000 (02:28 -0600)] 
3.1.16

13 years agoPrep for 3.1.16
Amos Jeffries [Thu, 13 Oct 2011 08:22:01 +0000 (02:22 -0600)] 
Prep for 3.1.16

13 years agoSourceFormat Enforcement
Automatic source maintenance [Wed, 12 Oct 2011 02:15:19 +0000 (20:15 -0600)] 
SourceFormat Enforcement

13 years agoAdd directive dns_v4_first to make IPv4 connections before IPv6 is tried.
Amos Jeffries [Tue, 11 Oct 2011 02:12:56 +0000 (20:12 -0600)] 
Add directive dns_v4_first to make IPv4 connections before IPv6 is tried.

Default off, to prefer the faster protocol.

The use-case for this is networks which are IPv6-enabled but stuck
behind slow tunnels and whose upstream is not supporting full transit
services over IP.

13 years agoBug 3237: seq fault in free() from rfc1035RRDestroy
Joerg Lehrke [Tue, 11 Oct 2011 02:08:18 +0000 (20:08 -0600)] 
Bug 3237: seq fault in free() from rfc1035RRDestroy

13 years agoBug 3190: Large HTTP POST stuck after early ICAP 400 error response
Christos Tsantilas [Tue, 11 Oct 2011 02:04:19 +0000 (20:04 -0600)] 
Bug 3190: Large HTTP POST stuck after early ICAP 400 error response

When an ICAP REQMOD service responds with an error to
(or the REQMOD transaction aborts while processing) a large HTTP
request, the HTTP request may get stuck because the request body
buffer gets full and nobody consumes the no-longer-needed content.

The ICAP code quits but leaves the body buffer intact in case the
client-side code wants to bypass the error. After that, nobody consumes
the request body because the buggy client side does not inform the body
pipe that there will be no other consumers, which would have triggered
a noteBodyConsumerAborted() callback and enable auto-consumption or closed
the client connection.

This is a Measurement Factory project

13 years agoBug 3373: invalid URL in ERR_CACHE_ACCESS_DENIED
David Parks [Tue, 11 Oct 2011 02:00:18 +0000 (20:00 -0600)] 
Bug 3373: invalid URL in ERR_CACHE_ACCESS_DENIED

13 years agoBug 3368: Unhandled exceptions are not logged (workaround)
Stefan Fritsch [Sun, 9 Oct 2011 06:02:17 +0000 (00:02 -0600)] 
Bug 3368: Unhandled exceptions are not logged (workaround)

13 years agoBug 3241: squid_kerb_auth cross compilation fix
Bertrand Jacquin [Wed, 5 Oct 2011 22:03:17 +0000 (16:03 -0600)] 
Bug 3241: squid_kerb_auth cross compilation fix

When building inside Squid sources we can assume yes/HAVE_SQUID.

13 years agoDocs: clarify retry_on_error situations
Amos Jeffries [Fri, 16 Sep 2011 11:06:32 +0000 (05:06 -0600)] 
Docs: clarify retry_on_error situations

13 years agodb_auth: display available DSN drivers on connect error
Amos Jeffries [Fri, 16 Sep 2011 10:55:04 +0000 (04:55 -0600)] 
db_auth: display available DSN drivers on connect error

13 years agoUpdated OpenSSL 1.0.0 version checks.
Amos Jeffries [Fri, 16 Sep 2011 10:53:09 +0000 (04:53 -0600)] 
Updated OpenSSL 1.0.0 version checks.

LHASH_LHASH and PSTRING are only screwed up in 1.0.0d and later.

13 years agoRemove duplicated code in gopher fix
Henrik Nordstrom [Fri, 16 Sep 2011 09:01:55 +0000 (03:01 -0600)] 
Remove duplicated code in gopher fix

harmless copy-paste error when patch was forward-ported from squid-2

13 years agoDocs: limit internal DNS options properly
Amos Jeffries [Fri, 16 Sep 2011 09:00:34 +0000 (03:00 -0600)] 
Docs: limit internal DNS options properly

13 years agoBug 3320: miss_access description confusing
Amos Jeffries [Fri, 2 Sep 2011 09:50:43 +0000 (03:50 -0600)] 
Bug 3320: miss_access description confusing

13 years agoBug 3326: miss_access incorrect default
Amos Jeffries [Tue, 30 Aug 2011 02:25:11 +0000 (20:25 -0600)] 
Bug 3326: miss_access incorrect default

13 years ago3.1.15 SQUID_3_1_15
Amos Jeffries [Sun, 28 Aug 2011 07:52:51 +0000 (01:52 -0600)] 
3.1.15

13 years agoPrep for 3.1.15
Amos Jeffries [Sun, 28 Aug 2011 07:49:15 +0000 (01:49 -0600)] 
Prep for 3.1.15

13 years agoRemove hierarchy_stoplist default value
Amos Jeffries [Sun, 28 Aug 2011 06:14:58 +0000 (00:14 -0600)] 
Remove hierarchy_stoplist default value

This should have been done long ago with the other dynamic website
handling changes. It has caused a certain amount of confusion when things
which apparently should go to peers fail to reach them.

13 years agoBug 3295: broken escaping in rfc1738_do_escape
Amos Jeffries [Sun, 28 Aug 2011 06:00:06 +0000 (00:00 -0600)] 
Bug 3295: broken escaping in rfc1738_do_escape

13 years agoSourceFormat Enforcement
Automatic source maintenance [Sun, 28 Aug 2011 04:25:35 +0000 (22:25 -0600)] 
SourceFormat Enforcement

13 years agocf_gen requires cstdlib
Amos Jeffries [Sun, 28 Aug 2011 03:51:05 +0000 (21:51 -0600)] 
cf_gen requires cstdlib

13 years agoPrep for 3.1.15 and 3.0.STABLE26
Amos Jeffries [Sat, 27 Aug 2011 14:55:07 +0000 (08:55 -0600)] 
Prep for 3.1.15 and 3.0.STABLE26

13 years agoPortability: Drop u_short type
Amos Jeffries [Sat, 27 Aug 2011 14:42:51 +0000 (08:42 -0600)] 
Portability: Drop u_short type

Use uint16_t for precise binary size or unsigned short instead.

13 years agoPolished unused code.
Alex Rousskov [Sat, 27 Aug 2011 12:34:04 +0000 (06:34 -0600)] 
Polished unused code.

The unused dlopen() call is actually useful to enable when lt_dlopen() reports
"file not found" errors for loadable modules that do exist but that Libtool
cannot load successfully due to undefined symbols or other errors.

This inability to correctly report a library loading error is a long-standing
Libtool bug, stemming from Libtool's desire to try and load several
differently named library files until one succeeds, losing true error
information in the process.

13 years agoCorrect parsing of large Gopher indexes
Henrik Nordstrom [Sat, 27 Aug 2011 12:32:51 +0000 (06:32 -0600)] 
Correct parsing of large Gopher indexes

13 years agoTypo on rev.10357 port
Amos Jeffries [Sat, 27 Aug 2011 10:38:01 +0000 (04:38 -0600)] 
Typo on rev.10357 port

13 years agoBug 3213: https sites (CONNECT) not open when using NTLM
Amos Jeffries [Sat, 27 Aug 2011 09:49:09 +0000 (03:49 -0600)] 
Bug 3213: https sites (CONNECT) not open when using NTLM

13 years agoPortability: use code instead of static initialization
Francesco Chemolli [Sat, 27 Aug 2011 07:46:07 +0000 (01:46 -0600)] 
Portability: use code instead of static initialization

g++ 4.4.5 on ARM mis-detects an inizializer's variable size. Give it a hint.