This is an automated email from the ASF dual-hosted git repository.
zwoop pushed a commit to branch 8.0.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git
The following commit(s) were added to refs/heads/8.0.x by this push:
new 2d30dac access_control: reduced some log errs to debug
2d30dac is described below
commit 2d30dac708fb2d441aa85593169023f4dfc254e4
Author: Gancho Tenev <[email protected]>
AuthorDate: Wed Nov 7 14:14:54 2018 -0800
access_control: reduced some log errs to debug
Reduced some errors to debug if they can happen during normal operation
and added some extra debugging info for the unexpected ones.
(cherry picked from commit b7b87850d9e39572741487dcdd3963c54bed45a9)
---
plugins/experimental/access_control/plugin.cc | 18 +++++++++++++-----
1 file changed, 13 insertions(+), 5 deletions(-)
diff --git a/plugins/experimental/access_control/plugin.cc
b/plugins/experimental/access_control/plugin.cc
index bcc68f9..5f003e3 100644
--- a/plugins/experimental/access_control/plugin.cc
+++ b/plugins/experimental/access_control/plugin.cc
@@ -32,6 +32,8 @@
#include "utils.h" /* cryptoBase64Decode.* functions */
#include "headers.h" /* getHeader, setHeader, removeHeader */
+static const std::string_view UNKNOWN{"unknown"};
+
static const char *
getEventName(TSEvent event)
{
@@ -415,12 +417,18 @@ contHandleAccessControl(const TSCont contp, TSEvent
event, void *edata)
TSHandleMLocRelease(serverRespBufp, TS_NULL_MLOC, serverRespHdrLoc);
} else {
- AccessControlError("failed to retrieve server response header");
+ int len;
+ char *url = TSHttpTxnEffectiveUrlStringGet(txnp, &len);
+ AccessControlError("failed to retrieve server response header for
request url:%.*s",
+ (len ? len : static_cast<int>(UNKNOWN.size())),
(url ? url : UNKNOWN.data()));
}
TSHandleMLocRelease(clientRespBufp, TS_NULL_MLOC, clientRespHdrLoc);
} else {
- AccessControlError("failed to retrieve client response header");
+ int len;
+ char *url = TSHttpTxnEffectiveUrlStringGet(txnp, &len);
+ AccessControlError("failed to retrieve client response header for
request url:%.*s",
+ (len ? len : static_cast<int>(UNKNOWN.size())),
(url ? url : UNKNOWN.data()));
}
}
} break;
@@ -583,7 +591,7 @@ TSRemapDoRemap(void *instance, TSHttpTxn txnp,
TSRemapRequestInfo *rri)
String pattern;
if (config->_uriPathScope.empty()) {
/* Scope match enforce access control */
- AccessControlError("no plugin scope specified, enforcing access
control");
+ AccessControlDebug("no plugin scope specified, enforcing access
control");
remapStatus = enforceAccessControl(txnp, rri, config);
} else {
if (true == config->_uriPathScope.matchAll(reqPath, filename,
pattern)) {
@@ -592,13 +600,13 @@ TSRemapDoRemap(void *instance, TSHttpTxn txnp,
TSRemapRequestInfo *rri)
/* Scope match enforce access control */
remapStatus = enforceAccessControl(txnp, rri, config);
} else {
- AccessControlError("not matching plugin scope (file: %s, pattern
%s), skipping access control for path '%s'",
+ AccessControlDebug("not matching plugin scope (file: %s, pattern
%s), skipping access control for path '%s'",
filename.c_str(), pattern.c_str(),
reqPath.c_str());
}
}
} else {
TSHttpTxnStatusSet(txnp, config->_invalidRequest);
- AccessControlError("https is the only allowed scheme (plugin should be
used only with TLS)");
+ AccessControlDebug("https is the only allowed scheme (plugin should be
used only with TLS)");
remapStatus = TSREMAP_DID_REMAP;
}
} else {