View | Details | Raw Unified | Return to bug 226139 | Differences between
and this patch

Collapse All | Expand All

(-)www/squid/Makefile (-1 / +1 lines)
Lines 2-8 Link Here
2
2
3
PORTNAME=	squid
3
PORTNAME=	squid
4
PORTVERSION=	3.5.27
4
PORTVERSION=	3.5.27
5
PORTREVISION=	2
5
PORTREVISION=	3
6
CATEGORIES=	www ipv6
6
CATEGORIES=	www ipv6
7
MASTER_SITES=	http://www.squid-cache.org/Versions/v3/${PORTVERSION:R}/ \
7
MASTER_SITES=	http://www.squid-cache.org/Versions/v3/${PORTVERSION:R}/ \
8
		http://www2.us.squid-cache.org/Versions/v3/${PORTVERSION:R}/ \
8
		http://www2.us.squid-cache.org/Versions/v3/${PORTVERSION:R}/ \
(-)www/squid/files/patch-src_client__side__request.cc (+23 lines)
Line 0 Link Here
1
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_2.patch
2
3
commit 8232b83d3fa47a1399f155cb829db829369fbae9 (refs/remotes/origin/v3.5)
4
Author: squidadm <squidadm@users.noreply.github.com>
5
Date:   2018-01-21 08:07:08 +1300
6
7
    Fix indirect IP logging for transactions without a client connection (#129) (#136)
8
9
--- src/client_side_request.cc.orig	2018-02-23 13:39:32 UTC
10
+++ src/client_side_request.cc
11
@@ -488,9 +488,9 @@ clientFollowXForwardedForCheck(allow_t answer, void *d
12
         * Ensure that the access log shows the indirect client
13
         * instead of the direct client.
14
         */
15
-        ConnStateData *conn = http->getConn();
16
-        conn->log_addr = request->indirect_client_addr;
17
-        http->al->cache.caddr = conn->log_addr;
18
+        http->al->cache.caddr = request->indirect_client_addr;
19
+        if (ConnStateData *conn = http->getConn())
20
+            conn->log_addr = request->indirect_client_addr;
21
     }
22
     request->x_forwarded_for_iterator.clean();
23
     request->flags.done_follow_x_forwarded_for = true;
(-)www/squid/files/patch-src_esi_CustomParser.cc (+28 lines)
Line 0 Link Here
1
http://www.squid-cache.org/Versions/v3/3.5/changesets/SQUID-2018_1.patch
2
3
commit eb2db98a676321b814fc4a51c4fb7928a8bb45d9 (refs/remotes/origin/v3.5)
4
Author: Amos Jeffries <yadij@users.noreply.github.com>
5
Date:   2018-01-19 13:54:14 +1300
6
7
    ESI: make sure endofName never exceeds tagEnd (#130)
8
9
--- src/esi/CustomParser.cc.orig	2018-02-23 13:37:52 UTC
10
+++ src/esi/CustomParser.cc
11
@@ -121,7 +121,7 @@ ESICustomParser::parse(char const *dataToParse, size_t
12
 
13
             char * endofName = strpbrk(const_cast<char *>(tag), w_space);
14
 
15
-            if (endofName > tagEnd)
16
+            if (!endofName || endofName > tagEnd)
17
                 endofName = const_cast<char *>(tagEnd);
18
 
19
             *endofName = '\0';
20
@@ -214,7 +214,7 @@ ESICustomParser::parse(char const *dataToParse, size_t
21
 
22
             char * endofName = strpbrk(const_cast<char *>(tag), w_space);
23
 
24
-            if (endofName > tagEnd)
25
+            if (!endofName || endofName > tagEnd)
26
                 endofName = const_cast<char *>(tagEnd);
27
 
28
             *endofName = '\0';

Return to bug 226139