31 const auto request = checklist->
request;
35 fatal (
"requiresRequest SHOULD have been true for this ACL!!");
37 }
else if (request->flags.sslBumped) {
38 debugs(28, 5,
"SslBumped request: It is an encapsulated request do not authenticate");
44 }
else if (request->flags.accelerated) {
47 }
else if (request->flags.intercepted || request->flags.interceptTproxy) {
48 debugs(28,
DBG_IMPORTANT,
"WARNING: Authentication not applicable on intercepted requests.");
86 fatal(
"unexpected authenticateAuthenticate reply\n");
@ AUTH_ACL_CANNOT_AUTHENTICATE
ACLFilledChecklist * Filled(ACLChecklist *checklist)
convenience and safety wrapper for dynamic_cast<ACLFilledChecklist*>
Acl::Answer AuthenticateAcl(ACLChecklist *ch, const Acl::Node &acl)
bool goAsync(AsyncStarter, const Acl::Node &)
ConnStateData * conn() const
The client connection manager.
AccessLogEntry::Pointer al
info for the future access.log, and external ACL
Auth::UserRequest::Pointer auth_user_request
HttpRequest::Pointer request
static void StartLookup(ACLFilledChecklist &, const Acl::Node &)
static AuthAclState tryToAuthenticateAndSetAuthUser(UserRequest::Pointer *aUR, Http::HdrType, HttpRequest *, ConnStateData *, Ip::Address &, AccessLogEntry::Pointer &)
const Auth::UserRequest::Pointer & getAuth() const
#define debugs(SECTION, LEVEL, CONTENT)
void fatal(const char *message)