[prev in list] [next in list] [prev in thread] [next in thread]
List: squid-cvs
Subject: /bzr/squid3/trunk/ r12123: Bug 3258: Requests hang when Host forgery verify fails
From: Amos Jeffries <squid3 () treenet ! co ! nz>
Date: 2012-04-25 22:32:00
Message-ID: 20120425224016.86094.qmail () squid-cache ! org
[Download RAW message or body]
--===============1448681919==
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
------------------------------------------------------------
revno: 12123
fixes bug(s): http://bugs.squid-cache.org/show_bug.cgi?id=3258
author: Guy Helmer <ghelmer@palisadesys.com>, Amos Jeffries \
<jeffries@squid-cache.org>
committer: Amos Jeffries <squid3@treenet.co.nz>
branch nick: trunk
timestamp: Thu 2012-04-26 10:32:00 +1200
message:
Bug 3258: Requests hang when Host forgery verify fails
modified:
src/client_side_request.cc
--===============1448681919==
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; name="r12123.diff"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline
=== modified file 'src/client_side_request.cc'
--- a/src/client_side_request.cc 2012-04-25 05:29:20 +0000
+++ b/src/client_side_request.cc 2012-04-25 22:32:00 +0000
@@ -566,6 +566,7 @@
// XXX: when we have updated the cache key to base on raw-IP + URI this \
cacheable limit can go.
http->request->flags.hierarchical = 0; // MUST NOT pass to peers (for now)
// XXX: when we have sorted out the best way to relay requests properly to \
peers this hierarchical limit can go. + http->doCallouts();
return;
}
--===============1448681919==--
[prev in list] [next in list] [prev in thread] [next in thread]
Configure |
About |
News |
Add a list |
Sponsored by KoreLogic