trafficserver-commits mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From iga...@apache.org
Subject [2/4] git commit: backport: r1197133 / c5d697d6a775ad7b8b1ce6cf19661a31895f3515 TS-1004 Transformation plugins cause connection close when content length is not known ahead.
Date Sat, 11 Feb 2012 00:55:23 GMT
backport: r1197133 / c5d697d6a775ad7b8b1ce6cf19661a31895f3515
TS-1004 Transformation plugins cause connection close when content
length is not known ahead.

Author: Otto van der Schaaf.
review/test: briang, zwoop, manjesh
backport: igalic


Project: http://git-wip-us.apache.org/repos/asf/trafficserver/repo
Commit: http://git-wip-us.apache.org/repos/asf/trafficserver/commit/d0bf1927
Tree: http://git-wip-us.apache.org/repos/asf/trafficserver/tree/d0bf1927
Diff: http://git-wip-us.apache.org/repos/asf/trafficserver/diff/d0bf1927

Branch: refs/heads/3.0.x
Commit: d0bf1927afdd661f8df21731bd70cf6c11b30b1f
Parents: 6fd0aca
Author: Igor Galić <igalic@apache.org>
Authored: Sat Feb 11 01:45:46 2012 +0100
Committer: Igor Galić <igalic@apache.org>
Committed: Sat Feb 11 01:45:46 2012 +0100

----------------------------------------------------------------------
 CHANGES                    |    4 ++++
 STATUS                     |    5 -----
 proxy/http/HttpSM.cc       |    4 ++++
 proxy/http/HttpTransact.cc |    2 +-
 4 files changed, 9 insertions(+), 6 deletions(-)
----------------------------------------------------------------------


http://git-wip-us.apache.org/repos/asf/trafficserver/blob/d0bf1927/CHANGES
----------------------------------------------------------------------
diff --git a/CHANGES b/CHANGES
index b8b3419..c94bf4f 100644
--- a/CHANGES
+++ b/CHANGES
@@ -1,5 +1,9 @@
                                                          -*- coding: utf-8 -*-
 Changes with Apache Traffic Server 3.0.3
+
+  *) [TS-1004] Transformation plugins cause connection close when content
+   length is not known ahead. Author: Otto van der Schaaf.
+
   *) [TS-1055]: Wrong implementation of TSHttpSsnArgGet().
     Author: Yakov Kopel
 

http://git-wip-us.apache.org/repos/asf/trafficserver/blob/d0bf1927/STATUS
----------------------------------------------------------------------
diff --git a/STATUS b/STATUS
index 221b97e..68702ff 100644
--- a/STATUS
+++ b/STATUS
@@ -40,11 +40,6 @@ A list of all bugs open for the next v3.0.2 release can be found at
 
 PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
 
-  *) Transformation plugins cause connection close when content length is not known ahead
-   Trunk patch: http://svn.apache.org/viewvc?view=revision&revision=1197133
-   Jira: https://issues.apache.org/jira/browse/TS-1004
-   +1: briang, zwoop, manjesh
-
   *) forward map based on request receive port
    Trunk patch: (see TS876.fixed.patch in JIRA)
    Jira: https://issues.apache.org/jira/browse/TS-876

http://git-wip-us.apache.org/repos/asf/trafficserver/blob/d0bf1927/proxy/http/HttpSM.cc
----------------------------------------------------------------------
diff --git a/proxy/http/HttpSM.cc b/proxy/http/HttpSM.cc
index 3f487c4..6fec34f 100644
--- a/proxy/http/HttpSM.cc
+++ b/proxy/http/HttpSM.cc
@@ -5637,6 +5637,10 @@ HttpSM::setup_transfer_from_transform()
   transform_info.entry->in_tunnel = true;
   ua_entry->in_tunnel = true;
 
+  if ( t_state.client_info.receive_chunked_response ) {
+    tunnel.set_producer_chunking_action(p, client_response_hdr_bytes, TCA_CHUNK_CONTENT);
+  }
+
   return p;
 }
 

http://git-wip-us.apache.org/repos/asf/trafficserver/blob/d0bf1927/proxy/http/HttpTransact.cc
----------------------------------------------------------------------
diff --git a/proxy/http/HttpTransact.cc b/proxy/http/HttpTransact.cc
index badbae7..dc86d2d 100644
--- a/proxy/http/HttpTransact.cc
+++ b/proxy/http/HttpTransact.cc
@@ -7016,7 +7016,7 @@ HttpTransact::handle_response_keep_alive_headers(State* s, HTTPVersion
ver, HTTP
         !is_response_body_precluded(s->hdr_info.client_response.status_get(), s->method)
&&
          // we do not need chunked encoding for internal error messages
          // that are sent to the client if the server response is not valid.
-         ((s->source == SOURCE_HTTP_ORIGIN_SERVER &&
+         (( (s->source == SOURCE_HTTP_ORIGIN_SERVER || s->source == SOURCE_TRANSFORM)
&&
          s->hdr_info.server_response.valid() &&
          // if we receive a 304, we will serve the client from the
          // cache and thus do not need chunked encoding.


Mime
View raw message