From ed96956e7cb5d3daae9530496cc4bfab2cc1a73e Mon Sep 17 00:00:00 2001 From: Amos Jeffries Date: Fri, 6 May 2011 23:57:04 -0600 Subject: [PATCH] Only ssl-bump CONNECT requests if they are about to be tunneled. Currently all CONNECT requests are bumped, even if the redirectors have determined a 3xx, 4xx or 5xx reply should happen. Adapters and access controls use their own duplicated reply paths unaffected by this bug at present. --- src/client_side_request.cc | 11 +++++------ 1 file changed, 5 insertions(+), 6 deletions(-) diff --git a/src/client_side_request.cc b/src/client_side_request.cc index 56e935a27f..f4c03211e5 100644 --- a/src/client_side_request.cc +++ b/src/client_side_request.cc @@ -1110,14 +1110,13 @@ ClientHttpRequest::processRequest() { debugs(85, 4, "clientProcessRequest: " << RequestMethodStr(request->method) << " '" << uri << "'"); + if (request->method == METHOD_CONNECT && !redirect.status) { #if USE_SSL - if (request->method == METHOD_CONNECT && sslBumpNeeded()) { - sslBumpStart(); - return; - } + if (sslBumpNeeded()) { + sslBumpStart(); + return; + } #endif - - if (request->method == METHOD_CONNECT && !redirect.status) { logType = LOG_TCP_MISS; getConn()->stopReading(); // tunnels read for themselves tunnelStart(this, &out.size, &al.http.code); -- 2.47.3