View Bazaar branches
Get this repository:
git clone https://git.launchpad.net/squid

Squid has 4 active reviews. See all merge proposals.

Import details

Import Status: Reviewed

This repository is an import of the Git repository at https://github.com/squid-cache/squid.git.

The next import is scheduled to run .

Last successful import was .

Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 1 minute — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-2 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-4 and finished taking 2 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-3 and finished taking 3 minutes — see the log
Import started on juju-98ee42-prod-launchpad-codeimport-5 and finished taking 1 minute — see the log

Branches

Name Last Modified Last Commit
auto 2024-06-23 01:23:28 UTC
Set SSL_OP_LEGACY_SERVER_CONNECT when peeking at servers (#1839)

Author: Alex Rousskov
Author Date: 2024-06-23 01:23:23 UTC

Set SSL_OP_LEGACY_SERVER_CONNECT when peeking at servers (#1839)

Squid TLS Server Hello parser does not treat legacy servers specially,
but enabling legacy server support in OpenSSL allows OpenSSL to advance
enough in its Server Hello processing to provide SslBump code with the
server certificate (that Squid then validates). Successful certificate
validation, in turn, may result in Squid splicing the connection, even
if OpenSSL detected other errors:

    noteNegotiationError: hold TLS write on FD 15 despite
    SQUID_TLS_ERR_CONNECT+TLS_LIB_ERR=2000068+TLS_IO_ERR=1

This change assumes that admins should not expect a peeking Squid to
_automatically_ enforce a particular set of handshake conditions (e.g.,
"no legacy TLS servers"). Peeking is interpreted as "get as much
handshake information as possible without breaking things" rather than
"automatically validate handshake, even if it risks breaking things". A
peeking Squid still validates the received origin certificate (where
available). If that assumption is proven wrong, we will need to make the
choice configurable.

TODO: When staring, apply tls_outgoing_options.

master 2024-06-22 21:00:23 UTC
CI: Upgrade GitHub Setup Node and CodeQL actions to Node 20 (#1845)

Author: Alex Rousskov
Author Date: 2024-06-22 02:49:41 UTC

CI: Upgrade GitHub Setup Node and CodeQL actions to Node 20 (#1845)

These major action version upgrades are recommended by GitHub that is
deprecating Node 16: Node 16 stopped receiving security updates in
September 2023. Node 20 will reach that state around April 2026.

* actions/setup-node@v4: The primary difference is that Setup Node
  action v4 uses Node 20, while v3 uses Node 16. Also, Setup Node v4
  adds support for arm64 Windows and other secondary improvements.

* github/codeql-action@v3: The only difference is that CodeQL Action v3
  runs on Node 20, while CodeQL Action v2 runs on Node 16.

This change is necessary but not sufficient to address current GitHub
Actions upgrade warnings. We also need to upgrade upload-artifact@v3,
but that upgrade has side effects that deserve a dedicate change.

v6 2024-06-19 19:45:26 UTC
Remove unnecessary net compatibility workarounds (#1404)

Author: Francesco Chemolli
Author Date: 2023-07-03 20:02:33 UTC

Remove unnecessary net compatibility workarounds (#1404)

All modern network stacks provide inet_ntop(), inet_pton(),
getaddrinfo(), and getnameinfo() APIs.

Also removed related Solaris 9 hacks, effectively discontinuing support
for that platform. Solaris 9 is no longer supported by Oracle.

v5 2024-05-23 21:14:57 UTC
Docs: REQUIRED in ident_regex, proxy_auth_regex, ext_user_regex (#1818)

Author: Alex Rousskov
Author Date: 2024-05-20 14:50:19 UTC

Docs: REQUIRED in ident_regex, proxy_auth_regex, ext_user_regex (#1818)

The three ACLs were documented as matching any username when configured
with a parameter spelled "REQUIRED". Neither actually treated that
parameter specially -- all interpreted it as an ordinary regex.

This dangerous documentation bug was introduced in 2000 commit 145cf92
that added ident_regex and proxy_auth_regex support. It was then
duplicated in 2003 commit abb929f that added ext_user_regex support.

This minimal documentation fix does not imply that these ACLs should not
treat REQUIRED values specially. Enabling such special treatment
requires significant code changes, especially if we want to do that well
and without duplicating the corresponding code.

SQUID-111-bug5343-cannot-find-find 2024-02-13 11:10:12 UTC
include header across the board

Author: Francesco Chemolli
Author Date: 2024-02-13 11:10:12 UTC

include header across the board

v5-next-backports 2023-12-02 07:01:31 UTC
FTP: Ignore credentials with a NUL-prefixed username (#1557)

Author: Andreas Weigel
Author Date: 2023-11-14 15:17:09 UTC

FTP: Ignore credentials with a NUL-prefixed username (#1557)

    FATAL: FTP login parsing destroyed username info

This bug was discovered and detailed by Joshua Rogers at
https://megamansec.github.io/Squid-Security-Audit/ftp-fatal.html
where it was filed as "FTP Authentication Crash".

v6-maintenance 2023-10-11 08:52:08 UTC
typo fix

Author: SquidAdm
Author Date: 2023-10-11 08:52:08 UTC

typo fix

v4 2022-09-22 07:39:23 UTC
Bug 3193 pt2: NTLM decoder truncating strings (#1114)

Author: Amos Jeffries
Author Date: 2022-08-09 23:34:54 UTC

Bug 3193 pt2: NTLM decoder truncating strings (#1114)

The initial bug fix overlooked large 'offset' causing integer
wrap to extract a too-short length string.

Improve debugs and checks sequence to clarify cases and ensure
that all are handled correctly.

v3.5 2020-02-04 23:13:24 UTC
fix security patch

Author: Armin Wolfermann
Author Date: 2020-02-04 20:15:00 UTC

fix security patch

mingw-fixes 2018-10-21 13:06:33 UTC
Mingw build fixes

Author: Francesco Chemolli
Author Date: 2018-10-21 13:06:33 UTC

Mingw build fixes

There are type errors and data access errors in windows-specific bits of
code.

v3.1 2016-12-17 13:56:49 UTC
Bug 4169: HIT marked as MISS when If-None-Match does not match

Author: Garri Djavadyan
Author Date: 2016-12-17 13:56:49 UTC

Bug 4169: HIT marked as MISS when If-None-Match does not match

v3.2 2016-12-17 12:59:41 UTC
Bug 4169: HIT marked as MISS when If-None-Match does not match

Author: Garri Djavadyan
Author Date: 2016-12-17 12:59:41 UTC

Bug 4169: HIT marked as MISS when If-None-Match does not match

v3.3 2016-12-17 10:04:42 UTC
Bug 4169: HIT marked as MISS when If-None-Match does not match

Author: Garri Djavadyan
Author Date: 2016-12-17 10:04:42 UTC

Bug 4169: HIT marked as MISS when If-None-Match does not match

v3.4 2016-12-17 06:37:44 UTC
Do not override user defined -std option

Author: Amos Jeffries
Author Date: 2016-12-17 06:37:44 UTC

Do not override user defined -std option

v3.0 2015-04-23 13:02:10 UTC
Docs: Update CONTRIBUTORS

Author: Source Maintenance
Author Date: 2015-04-23 13:02:10 UTC

Docs: Update CONTRIBUTORS

mswin 2012-08-08 08:16:36 UTC
merged from trunk

Author: Amos Jeffries
Author Date: 2012-08-08 08:16:36 UTC

merged from trunk

SQUID_NT_3_0 2008-03-02 23:54:50 UTC
Windows port: Add reconfigure action to cachemgr.

Author: serassio <>
Author Date: 2008-03-02 23:54:50 UTC

Windows port: Add reconfigure action to cachemgr.

cbdatahistory 2002-10-24 20:53:10 UTC
cbdata debug history

Author: robertc <>
Author Date: 2002-10-24 20:53:10 UTC

cbdata debug history

118 of 18 results

Other repositories

Name Last Modified
lp:squid 10 hours ago
11 of 1 result
You can't create new repositories for Squid.