[prev in list] [next in list] [prev in thread] [next in thread] 

List:       squid-cvs
Subject:    /bzr/squid3/trunk/ r12123: Bug 3258: Requests hang when Host forgery verify fails
From:       Amos Jeffries <squid3 () treenet ! co ! nz>
Date:       2012-04-25 22:32:00
Message-ID: 20120425224016.86094.qmail () squid-cache ! org
[Download RAW message or body]

--===============1448681919==
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

------------------------------------------------------------
revno: 12123
fixes bug(s): http://bugs.squid-cache.org/show_bug.cgi?id=3258
author: Guy Helmer <ghelmer@palisadesys.com>, Amos Jeffries \
                <jeffries@squid-cache.org>
committer: Amos Jeffries <squid3@treenet.co.nz>
branch nick: trunk
timestamp: Thu 2012-04-26 10:32:00 +1200
message:
  Bug 3258: Requests hang when Host forgery verify fails
modified:
  src/client_side_request.cc

--===============1448681919==
MIME-Version: 1.0
Content-Type: text/plain; charset="us-ascii"; name="r12123.diff"
Content-Transfer-Encoding: 7bit
Content-Disposition: inline

=== modified file 'src/client_side_request.cc'
--- a/src/client_side_request.cc	2012-04-25 05:29:20 +0000
+++ b/src/client_side_request.cc	2012-04-25 22:32:00 +0000
@@ -566,6 +566,7 @@
         // XXX: when we have updated the cache key to base on raw-IP + URI this \
                cacheable limit can go.
         http->request->flags.hierarchical = 0; // MUST NOT pass to peers (for now)
         // XXX: when we have sorted out the best way to relay requests properly to \
peers this hierarchical limit can go. +        http->doCallouts();
         return;
     }
 


--===============1448681919==--


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic