[jira] [Assigned] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Yunkai Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yunkai Zhang reassigned TS-2610:


Assignee: Yunkai Zhang

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Assigned] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2611?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom reassigned TS-2611:
-

Assignee: Leif Hedstrom

 AddS3 Auth plugin
 -

 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 This adds some basic v2 S3 Auth features, we can extend later with more 
 features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread Leif Hedstrom (JIRA)
Leif Hedstrom created TS-2611:
-

 Summary: AddS3 Auth plugin
 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom


This adds some basic v2 S3 Auth features, we can extend later with more 
features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2611?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2611:
--

Fix Version/s: 5.0.0

 AddS3 Auth plugin
 -

 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom
 Fix For: 5.0.0


 This adds some basic v2 S3 Auth features, we can extend later with more 
 features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2522) Rewrite header_rewrite hook management

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2522?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919126#comment-13919126
 ] 

ASF subversion and git services commented on TS-2522:
-

Commit 4f0b0b447ed76244287ae5385719fc56b3385a24 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=4f0b0b4 ]

TS-2522 Update the docs with new default conf dir


 Rewrite header_rewrite hook management
 --

 Key: TS-2522
 URL: https://issues.apache.org/jira/browse/TS-2522
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 Right now, we use a transaction slot to pass information from remap state 
 over to one of the normal hooks. Because of the way this plugin works, I 
 think this can be optimized away. What we should do is to have one global 
 continuation for each remap rule, and schedule it from the remap plugin.
 This avoids having all the global hooks checking the transaction state (slot) 
 every time. It's also very cheap to schedule a transaction hook, it's O(1) 
 simply appending it to a linked list of hooks. If the hook doesn't get 
 invoked, it's mostly a no-op.
 Finally, this avoids consuming one of the limited transaction hooks, and at 
 the same time reduces overhead by only executing hooks when necessary.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2522) Rewrite header_rewrite hook management

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2522?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919125#comment-13919125
 ] 

ASF subversion and git services commented on TS-2522:
-

Commit 31792d2aae9519e0feb66ab9e80b1a9d5d51d7de in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=31792d2 ]

TS-2522 Better hook management, and cleanup

This also does

 - Add support for system wide config directory as default
 - Better debug messages (textual hook names etc.)
 - Less overhead on creating TXN hooks


 Rewrite header_rewrite hook management
 --

 Key: TS-2522
 URL: https://issues.apache.org/jira/browse/TS-2522
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 Right now, we use a transaction slot to pass information from remap state 
 over to one of the normal hooks. Because of the way this plugin works, I 
 think this can be optimized away. What we should do is to have one global 
 continuation for each remap rule, and schedule it from the remap plugin.
 This avoids having all the global hooks checking the transaction state (slot) 
 every time. It's also very cheap to schedule a transaction hook, it's O(1) 
 simply appending it to a linked list of hooks. If the hook doesn't get 
 invoked, it's mostly a no-op.
 Finally, this avoids consuming one of the limited transaction hooks, and at 
 the same time reduces overhead by only executing hooks when necessary.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2611?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919137#comment-13919137
 ] 

ASF subversion and git services commented on TS-2611:
-

Commit 1c948c38045f41dd69ca2e1356b96dc0135f4f00 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=1c948c3 ]

TS-2611 Add a new S3 auth plugin, experimental/s3_auth


 AddS3 Auth plugin
 -

 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 This adds some basic v2 S3 Auth features, we can extend later with more 
 features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919139#comment-13919139
 ] 

Leif Hedstrom commented on TS-2610:
---

This feels a little weird, is this tied to some (yet to be committed) SPDY 
features of the core? What I'm saying is, it feels the log tag values should 
not be hardcoded like this, but should come from the ALPN / NPN negotiation. 
Otherwise, how do we intend for this to work generically, and particularly, for 
HTTP/2 once we support that ?


 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2610:
--

Fix Version/s: 5.0.0

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919142#comment-13919142
 ] 

Leif Hedstrom commented on TS-2610:
---

Alright, I now see that the 0001 patch provides some special cases used for 
these log tags. At a minimum, I feel these two commits should be on two 
different Jira tickets, since they are different issues. One can be linked to 
the other though.

I still feel that the log values ought to be tied to the ALPN negotiation 
though, which perhaps also affects both of these patches ? I guess I have to 
defer to [~jamespeach] here, he's the SSL guru.

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2609:
--

Fix Version/s: 5.0.0

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Yunkai Zhang (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919146#comment-13919146
 ] 

Yunkai Zhang commented on TS-2610:
--

For SSL, we can make the log values to be tied to the ALPN negotiation.

But for SPDY + HTTP without SSL, there is not negotiation:(

If you have any good idea, I'm ok to change these log values.

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919156#comment-13919156
 ] 

Leif Hedstrom commented on TS-2609:
---

I'm not against this patch, but I do have a question. Is this fundamental 
different than doing e.g.

{code}
cond %{CLIENT-HEADER:Host} =www.ogre.com
{code}

My preference is probably to not have more than one way to achieve the same 
thing (*cough* Perl *cough*), but if there are good reasons to add the TOHOST 
directive, I'd be ok with that. Fwiw, I feel it ought to be named TO-HOST or 
CLIENT-HOST or even just HOST if we go this path :).

Also, if you look at how we have an adaptive HEADER condition, a 
functionality like %{HOST} would similarly adapt to the hook it's in, whereas 
CLIENT-HOST would be anchored to the client request header.

What do you think?

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919156#comment-13919156
 ] 

Leif Hedstrom edited comment on TS-2609 at 3/4/14 9:03 AM:
---

I'm not against this patch, but I do have a question. Is this fundamentally 
different than doing e.g.

{code}
cond %{CLIENT-HEADER:Host} =www.ogre.com
{code}

My preference is probably to not have more than one way to achieve the same 
thing (*cough* Perl *cough*), but if there are good reasons to add the TOHOST 
directive, I'd be ok with that. Fwiw, I feel it ought to be named TO-HOST or 
CLIENT-HOST or even just HOST if we go this path :).

Also, if you look at how we have an adaptive HEADER condition, a 
functionality like %{HOST} would similarly adapt to the hook it's in, whereas 
CLIENT-HOST would be anchored to the client request header.

What do you think?


was (Author: zwoop):
I'm not against this patch, but I do have a question. Is this fundamental 
different than doing e.g.

{code}
cond %{CLIENT-HEADER:Host} =www.ogre.com
{code}

My preference is probably to not have more than one way to achieve the same 
thing (*cough* Perl *cough*), but if there are good reasons to add the TOHOST 
directive, I'd be ok with that. Fwiw, I feel it ought to be named TO-HOST or 
CLIENT-HOST or even just HOST if we go this path :).

Also, if you look at how we have an adaptive HEADER condition, a 
functionality like %{HOST} would similarly adapt to the hook it's in, whereas 
CLIENT-HOST would be anchored to the client request header.

What do you think?

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Anil Kumar Myla (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919164#comment-13919164
 ] 

Anil Kumar Myla commented on TS-2609:
-

It is indeed different from CLIENT-HEADER:Host

Let's say we have this remap rule which preserves the Host header to the origin 
server
map x.y.com origin.x.y.com @pristine_host_hdr=1 . header_rewrite plugin

Then
CLIENT-HEADER:Host = x.y.com
TOHOST = origin.x.y.com

Let me know if I'm wrong in my understanding

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919162#comment-13919162
 ] 

Leif Hedstrom commented on TS-2609:
---

[~bcall] pointed out that the TOHOST is already documented, but not 
implemented. I claim ignorance, but I suspect when we first wrote this, we 
intended to implement TOHOST, but then realized HEADER / CLIENT-HEADER would 
suffice ?

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2611?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919166#comment-13919166
 ] 

ASF subversion and git services commented on TS-2611:
-

Commit 6dfc1312399df84df8d83c97913e04bc901a5732 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6dfc131 ]

TS-2611 Fix build bustage, thanks Jenkins for being my best friend


 AddS3 Auth plugin
 -

 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 This adds some basic v2 S3 Auth features, we can extend later with more 
 features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2608) API to introspect metric semantics

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2608?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2608:
--

Fix Version/s: 5.0.0

 API to introspect metric semantics
 --

 Key: TS-2608
 URL: https://issues.apache.org/jira/browse/TS-2608
 Project: Traffic Server
  Issue Type: New Feature
  Components: Management API, Stats
Reporter: James Peach
  Labels: api-addition, api-change
 Fix For: 5.0.0


 We ought to have an API that apps can use to query the semantics of a metric. 
  For example, there's no way to know whether a metric is a counter or an 
 instantaneous value. {{traffic_top}} hard-codes a number of these, and I've 
 taken the same approach for my [epic|https://code.google.com/p/epicnms/] 
 plugin.
 As an extension, it would also be helpful to know the units (e.g., bytes, 
 seconds, count).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2608) API to introspect metric semantics

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2608?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2608:
--

Labels: api-addition api-change  (was: )

 API to introspect metric semantics
 --

 Key: TS-2608
 URL: https://issues.apache.org/jira/browse/TS-2608
 Project: Traffic Server
  Issue Type: New Feature
  Components: Management API, Stats
Reporter: James Peach
  Labels: api-addition, api-change
 Fix For: 5.0.0


 We ought to have an API that apps can use to query the semantics of a metric. 
  For example, there's no way to know whether a metric is a counter or an 
 instantaneous value. {{traffic_top}} hard-codes a number of these, and I've 
 taken the same approach for my [epic|https://code.google.com/p/epicnms/] 
 plugin.
 As an extension, it would also be helpful to know the units (e.g., bytes, 
 seconds, count).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2608) API to introspect metric semantics

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2608?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919182#comment-13919182
 ] 

Leif Hedstrom commented on TS-2608:
---

Isn't this really a fundamentally missing piece in librecords?  It feels that 
we ought to add something to RecordsConfig.cc, which then could get passed 
along into various APIs etc.

One easy thing could be to update this:

enum RecAccessT
{
  RECA_NULL,
  RECA_NO_ACCESS,
  RECA_READ_ONLY
};


Although the overlay of semantics there could be wonky. But, e.g.

enum RecAccessT
{
  RECA_NULL,
  RECA_NO_ACCESS,
  RECA_READ_ONLY,
  RECA_READ_ONLY_GAUGE,
};

Alternatively, we add another member to struct RecordElement, but that means 
changing a lot of APIs such that the GAUGE vs not-Gauge info is passed in and 
out properly.


 API to introspect metric semantics
 --

 Key: TS-2608
 URL: https://issues.apache.org/jira/browse/TS-2608
 Project: Traffic Server
  Issue Type: New Feature
  Components: Management API, Stats
Reporter: James Peach
  Labels: api-addition, api-change
 Fix For: 5.0.0


 We ought to have an API that apps can use to query the semantics of a metric. 
  For example, there's no way to know whether a metric is a counter or an 
 instantaneous value. {{traffic_top}} hard-codes a number of these, and I've 
 taken the same approach for my [epic|https://code.google.com/p/epicnms/] 
 plugin.
 As an extension, it would also be helpful to know the units (e.g., bytes, 
 seconds, count).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2606) Clarify ssl_multicert.config parameters

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2606?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919183#comment-13919183
 ] 

Leif Hedstrom commented on TS-2606:
---

Ask: We'll be stoked to get a diff on these docs updates! :-).

 Clarify ssl_multicert.config parameters
 ---

 Key: TS-2606
 URL: https://issues.apache.org/jira/browse/TS-2606
 Project: Traffic Server
  Issue Type: Improvement
  Components: Documentation
Reporter: Ask Bjørn Hansen
 Fix For: Docs


 It'd be nice if the ssl_multicert.config documentation included a SNI-only 
 example (no dest_ip=...).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2606) Clarify ssl_multicert.config parameters

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2606?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2606:
--

Fix Version/s: Docs

 Clarify ssl_multicert.config parameters
 ---

 Key: TS-2606
 URL: https://issues.apache.org/jira/browse/TS-2606
 Project: Traffic Server
  Issue Type: Improvement
  Components: Documentation
Reporter: Ask Bjørn Hansen
 Fix For: Docs


 It'd be nice if the ssl_multicert.config documentation included a SNI-only 
 example (no dest_ip=...).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2604) Collapsed connection plugin

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2604?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2604:
--

Assignee: Bryan Call

 Collapsed connection plugin
 ---

 Key: TS-2604
 URL: https://issues.apache.org/jira/browse/TS-2604
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Ethan Lai
Assignee: Bryan Call
 Fix For: 5.0.0


 This plugin collapses connections with identical CacheUrl/EffectiveUrl.
 Please find more detail from README and state.png (State Diagram)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2604) Collapsed connection plugin

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2604?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2604:
--

Fix Version/s: 5.0.0

 Collapsed connection plugin
 ---

 Key: TS-2604
 URL: https://issues.apache.org/jira/browse/TS-2604
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 5.0.0


 This plugin collapses connections with identical CacheUrl/EffectiveUrl.
 Please find more detail from README and state.png (State Diagram)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2598) Expose HttpDebugNames to public plugin APIs

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2598?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2598:
--

Labels: api-addition  (was: )

 Expose HttpDebugNames to public plugin APIs
 ---

 Key: TS-2598
 URL: https://issues.apache.org/jira/browse/TS-2598
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Leif Hedstrom
  Labels: api-addition
 Fix For: 5.0.0


 It'd be really useful to expose all the HttpDebugNames:: functions into one 
 (or several?) API calls.
 Either
 {code}
 const char* TSGetDebugName(type, ID);
 {code}
 where type would be a new enum of e.g.
 typedef enum
 {
 TS_DEBUG_STATE_NAME,
 TS_DEBUG_METHOD_NAME,
 TS_DEBUG_EVENT_NAME,
 ...
 } TSDebugNameID;
 or perhaps
 {code}
 const char* TSGetDebugStateName(id);
 const char* TSGetDebugMethodName(id);
 ...
 {code}
 I personally favor the former, it's more easily extended with future 
 additions.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2598) Expose HttpDebugNames to public plugin APIs

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2598?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2598:
--

Fix Version/s: 5.0.0

 Expose HttpDebugNames to public plugin APIs
 ---

 Key: TS-2598
 URL: https://issues.apache.org/jira/browse/TS-2598
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Leif Hedstrom
  Labels: api-addition
 Fix For: 5.0.0


 It'd be really useful to expose all the HttpDebugNames:: functions into one 
 (or several?) API calls.
 Either
 {code}
 const char* TSGetDebugName(type, ID);
 {code}
 where type would be a new enum of e.g.
 typedef enum
 {
 TS_DEBUG_STATE_NAME,
 TS_DEBUG_METHOD_NAME,
 TS_DEBUG_EVENT_NAME,
 ...
 } TSDebugNameID;
 or perhaps
 {code}
 const char* TSGetDebugStateName(id);
 const char* TSGetDebugMethodName(id);
 ...
 {code}
 I personally favor the former, it's more easily extended with future 
 additions.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Assigned] (TS-2598) Expose HttpDebugNames to public plugin APIs

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2598?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom reassigned TS-2598:
-

Assignee: Leif Hedstrom

 Expose HttpDebugNames to public plugin APIs
 ---

 Key: TS-2598
 URL: https://issues.apache.org/jira/browse/TS-2598
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
  Labels: api-addition
 Fix For: 5.0.0


 It'd be really useful to expose all the HttpDebugNames:: functions into one 
 (or several?) API calls.
 Either
 {code}
 const char* TSGetDebugName(type, ID);
 {code}
 where type would be a new enum of e.g.
 typedef enum
 {
 TS_DEBUG_STATE_NAME,
 TS_DEBUG_METHOD_NAME,
 TS_DEBUG_EVENT_NAME,
 ...
 } TSDebugNameID;
 or perhaps
 {code}
 const char* TSGetDebugStateName(id);
 const char* TSGetDebugMethodName(id);
 ...
 {code}
 I personally favor the former, it's more easily extended with future 
 additions.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2565) ALPN: configure protocol selection

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2565?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2565:
--

Fix Version/s: sometime

 ALPN: configure protocol selection
 --

 Key: TS-2565
 URL: https://issues.apache.org/jira/browse/TS-2565
 Project: Traffic Server
  Issue Type: New Feature
  Components: Configuration, SSL
Reporter: James Peach
 Fix For: sometime


 Once there is a meaningful set of protocols that uses ALPN, we should have a 
 way for operators to configure the ALP protocol selection. For example, some 
 sites might want to prefer HTTP1 to HTTP2, some sites might want the reverse.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2603) Do not update hostdb if intercept exists

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2603?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2603:
--

Fix Version/s: 5.0.0

 Do not update hostdb if intercept exists
 

 Key: TS-2603
 URL: https://issues.apache.org/jira/browse/TS-2603
 Project: Traffic Server
  Issue Type: Bug
  Components: HTTP
Affects Versions: 5.0.0
Reporter: portl4t
  Labels: Review
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2603-Do-not-update-hostdb-if-intercept-exists.patch


 We should not update hostdb if a HttpSM was intercepted, as the HttpSM did 
 not really connect to the origin server. Otherwise we may set the hostdb 
 address to zero if timeout occurs.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2588) Parent proxy to self fails to loop detect

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2588?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2588:
--

Fix Version/s: sometime

 Parent proxy to self fails to loop detect
 ---

 Key: TS-2588
 URL: https://issues.apache.org/jira/browse/TS-2588
 Project: Traffic Server
  Issue Type: Improvement
  Components: Configuration, HTTP
Reporter: Leif Hedstrom
 Fix For: sometime


 As a safety measure, I think it'd be a good idea to not proxy to self in a 
 parent proxy setup. If such a loop is detected, it should instead go to 
 origin directly (bypass parent).



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (TS-2600) HTTPS statistics

2014-03-04 Thread Bryan Call (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919229#comment-13919229
 ] 

Bryan Call edited comment on TS-2600 at 3/4/14 10:35 AM:
-

What is the issue with the HTTPS metrics?  I didn't see the discussion on the 
IRC.


was (Author: bcall):
What is the issue with the HTTPS metrics.  I didn't see the discussion on the 
IRC.

 HTTPS statistics
 

 Key: TS-2600
 URL: https://issues.apache.org/jira/browse/TS-2600
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL, Stats
Reporter: David Carlin
Assignee: Ron Barber
  Labels: Review
 Fix For: 5.2.0


 It would be swell if there were some traffic_line SSL statistic variables.
 For instance, number of SSL connections and SSL bytes.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2600) HTTPS statistics

2014-03-04 Thread Bryan Call (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919229#comment-13919229
 ] 

Bryan Call commented on TS-2600:


What is the issue with the HTTPS metrics.  I didn't see the discussion on the 
IRC.

 HTTPS statistics
 

 Key: TS-2600
 URL: https://issues.apache.org/jira/browse/TS-2600
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL, Stats
Reporter: David Carlin
Assignee: Ron Barber
  Labels: Review
 Fix For: 5.2.0


 It would be swell if there were some traffic_line SSL statistic variables.
 For instance, number of SSL connections and SSL bytes.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (TS-2344) 404 error was logged while url redirect request was processed corrctly

2014-03-04 Thread Bryan Call (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2344?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13917889#comment-13917889
 ] 

Bryan Call edited comment on TS-2344 at 3/4/14 10:37 AM:
-

[~yzlai]
Is there are reason you are copying the url string out of the url object and 
having to deal with memory allocation yourself?
Why do you delay setting the location header until the build_error_response()?
Can you please describe the logic with the changes?

Thank you...



was (Author: bcall):
Is there are reason you are copying the url string out of the url object and 
having to deal with memory allocation yourself?
Why do you delay setting the location header until the build_error_response()?
Can you please describe the logic with the changes?

Thank you...


 404 error was logged while url redirect request was processed corrctly
 --

 Key: TS-2344
 URL: https://issues.apache.org/jira/browse/TS-2344
 Project: Traffic Server
  Issue Type: Bug
  Components: Logging
Reporter: Eddie
Assignee: Bryan Call
  Labels: Review
 Fix For: 5.2.0


 I am seeing a lot of entries in the error log for my url redirect request. 
 The request was processed correctly and I could see the expected response in 
 log as below:
   2013-11-08 18:23:37 IP  301 FIN http://yahoo.com 
 http://www.yahoo.com/
 But log messages like following were printed in the error log too, which 
 generates a  lot of error logs (log rotation configured) and filling up disk 
 space pretty fast.
   20131108.18h23m37s RESPONSE: sent IP status 404 (Not Found on 
 Accelerator) for 'http:///'
   20131108.18h23m37s RESPONSE: sent IP status 301 (Redirect) 
 for 'http:///'
 I watched my tcpdump log and did not see that the 404 error was sent out at 
 all. I am using ATS/3.2.4 (also checked with I am seeing a lot of entries in 
 the error log for my url redirect request. The request was processed correctly
 I could see the expected response in log as well:
   2013-11-08 18:23:37 IP  301 FIN http://yahoo.com 
 http://www.yahoo.com/
 But log messages like following were printed too:
   20131108.18h23m37s RESPONSE: sent IP status 404 (Not Found on 
 Accelerator) for 'http:///'
   20131108.18h23m37s RESPONSE: sent IP status 301 (Redirect) 
 for 'http:///'
 I watched my tcpdump log and did not see that the 404 error was sent out at 
 all. I am using ATS/3.2.4 and following
 is the log configuration.
 CONFIG proxy.config.log.logging_enabled INT 3
 CONFIG proxy.config.log.max_secs_per_buffer INT 1
 CONFIG proxy.config.log.max_space_mb_for_logs INT 25000
 CONFIG proxy.config.log.max_space_mb_for_orphan_logs INT 25
 CONFIG proxy.config.log.max_space_mb_headroom INT 1000
 CONFIG proxy.config.log.hostname STRING localhost
 CONFIG proxy.config.log.logfile_dir STRING var/log/trafficserver
 CONFIG proxy.config.log.logfile_perm STRING rw-r--r--
 CONFIG proxy.config.log.custom_logs_enabled INT 1
 CONFIG proxy.config.log.squid_log_enabled INT 0
 CONFIG proxy.config.log.squid_log_is_ascii INT 0
 CONFIG proxy.config.log.squid_log_name STRING squid
 CONFIG proxy.config.log.squid_log_header STRING NULL
 CONFIG proxy.config.log.common_log_enabled INT 0
 CONFIG proxy.config.log.common_log_is_ascii INT 1
 CONFIG proxy.config.log.common_log_name STRING common
 CONFIG proxy.config.log.common_log_header STRING NULL
 CONFIG proxy.config.log.extended_log_enabled INT 0
 CONFIG proxy.config.log.extended_log_is_ascii INT 0
 CONFIG proxy.config.log.extended_log_name STRING extended
 CONFIG proxy.config.log.extended_log_header STRING NULL
 CONFIG proxy.config.log.extended2_log_enabled INT 0
 CONFIG proxy.config.log.extended2_log_is_ascii INT 1
 CONFIG proxy.config.log.extended2_log_name STRING extended2
 CONFIG proxy.config.log.extended2_log_header STRING NULL
 CONFIG proxy.config.log.separate_icp_logs INT 0
 CONFIG proxy.config.log.separate_host_logs INT 0
 Is this a bug or is this a misconfiguration? Does anyone have any idea?) and 
 following is the log configuration.
 CONFIG proxy.config.log.logging_enabled INT 3
 CONFIG proxy.config.log.max_secs_per_buffer INT 1
 CONFIG proxy.config.log.max_space_mb_for_logs INT 25000
 CONFIG proxy.config.log.max_space_mb_for_orphan_logs INT 25
 CONFIG proxy.config.log.max_space_mb_headroom INT 1000
 CONFIG proxy.config.log.hostname STRING localhost
 CONFIG proxy.config.log.logfile_dir STRING var/log/trafficserver
 CONFIG proxy.config.log.logfile_perm STRING rw-r--r--
 CONFIG proxy.config.log.custom_logs_enabled INT 1
 CONFIG proxy.config.log.squid_log_enabled INT 0
 CONFIG proxy.config.log.squid_log_is_ascii INT 0
 CONFIG proxy.config.log.squid_log_name STRING squid
 CONFIG proxy.config.log.squid_log_header STRING NULL
 

[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919230#comment-13919230
 ] 

Leif Hedstrom commented on TS-2609:
---

Hmmm, I see what you are getting at. However, the patch does not do that I'm 
pretty sure:

{code}
+  const char *to_host = TSUrlHostGet(res._rri-requestBufp, 
res._rri-requestUrl, to_host_len);
{code}

In your case, with pristine host headers, the requestUrl's Host would still be 
x.y.com. To do what you are saying, I believe you would have to change this 
code to _rri-mapToUrl. Now, we also have the URL and CLIENT-URL directives, 
that might overlap here ? E.g.

{code}
%{URL:Host}
{code}

However, looking at the code, it seems the URL conditions are not implemented 
at all. We'll happy take patches here too! :-).

Also, as the patch is written, the TOHOST condition would only work as a remap 
rule.  That is fine, but would need to be properly documented. And if possible, 
we should make conditions and operators generic. But, the more I look at this, 
maybe the answer is to finish the URL / CLIENT-URL (and perhaps TO-URL and 
FROM-URL ?) conditions ?

What do you think?


 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (TS-2612) Indroduce TSHttpConnectWithProtoType() API

2014-03-04 Thread Yunkai Zhang (JIRA)
Yunkai Zhang created TS-2612:


 Summary: Indroduce TSHttpConnectWithProtoType() API
 Key: TS-2612
 URL: https://issues.apache.org/jira/browse/TS-2612
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Yunkai Zhang


This ticket was split from SPDY ticket(TS-2431).

For some plugins that using TSHttpConnect() API to do request, the Logging 
module can't know which protocol type is used, so I add a new API: 
{code}
tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
TSNetProtoType proto_type);
{code}

After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
be a special case of it:
{code}
TSVConn
TSHttpConnect(sockaddr const* addr)
{
  return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
}
{code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Yunkai Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yunkai Zhang updated TS-2610:
-

Description: 
This ticket was split from SPDY ticket(TS-2431).

Add %cqpt field into LogFormat, so that we can distinguish the protocol type 
of each log record, it can help us to to do some analysis and statistic.

Here are the available values of %cqpt:
{code}
  HTTP  -- HTTP protocol
  HTTP_SSL  -- HTTP with SSL protocol
  HTTP_SPDY -- HTTP with SPDY protocol
  HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
{code}



  was:
This ticket was split from SPDY ticket(TS-2431).

Add %cqpt field into LogFormat, so that we can distinguish the protocol type 
of each log record, it can help us to to do some analysis and statistic.

Here are the available values of %cqpt:
{code}
  HTTP  -- HTTP protocol
  HTTP_SSL  -- HTTP with SSL protocol
  HTTP_SPDY -- HTTP with SPDY protocol
  HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
{code}

For some plugins that using TSHttpConnect() API to do request, the Logging 
module can't know which protocol type is used, so I add a new API: 
{code}
tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
TSNetProtoType proto_type);
{code}

After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
be a special case of it:
{code}
TSVConn
TSHttpConnect(sockaddr const* addr)
{
  return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
}
{code}





 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch, 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431).
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2612) Indroduce TSHttpConnectWithProtoType() API

2014-03-04 Thread Yunkai Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yunkai Zhang updated TS-2612:
-

Attachment: 0001-TS-2612-Indroduce-TSHttpConnectWithProtoType-API.patch

 Indroduce TSHttpConnectWithProtoType() API
 --

 Key: TS-2612
 URL: https://issues.apache.org/jira/browse/TS-2612
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Yunkai Zhang
 Attachments: 
 0001-TS-2612-Indroduce-TSHttpConnectWithProtoType-API.patch


 This ticket was split from SPDY ticket(TS-2431).
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread Yunkai Zhang (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Yunkai Zhang updated TS-2610:
-

Attachment: (was: 
0001-TS-2610-Indroduce-TSHttpConnectWithProtoType-API.patch)

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431), and it relys on the patch of 
 TS-2612.
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (TS-2613) Can't turn on attach server session to client from records.config

2014-03-04 Thread Bryan Call (JIRA)
Bryan Call created TS-2613:
--

 Summary: Can't turn on attach server session to client from 
records.config
 Key: TS-2613
 URL: https://issues.apache.org/jira/browse/TS-2613
 Project: Traffic Server
  Issue Type: Bug
Reporter: Bryan Call


the proxy.config.http.attach_server_session_to_client value is not set in the 
http config



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Resolved] (TS-2613) Can't turn on attach server session to client from records.config

2014-03-04 Thread Bryan Call (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2613?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Bryan Call resolved TS-2613.


Resolution: Fixed
  Assignee: Bryan Call

Added code to set the value in http config from the config setting.  Added a 
debug message to see that it is attaching the server setting to the client 
session (debug tag: http).

 Can't turn on attach server session to client from records.config
 -

 Key: TS-2613
 URL: https://issues.apache.org/jira/browse/TS-2613
 Project: Traffic Server
  Issue Type: Bug
Reporter: Bryan Call
Assignee: Bryan Call

 the proxy.config.http.attach_server_session_to_client value is not set in the 
 http config



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2612) Indroduce TSHttpConnectWithProtoType() API

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2612:
--

Fix Version/s: 5.0.0

 Indroduce TSHttpConnectWithProtoType() API
 --

 Key: TS-2612
 URL: https://issues.apache.org/jira/browse/TS-2612
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Yunkai Zhang
  Labels: api-addition, review
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2612-Indroduce-TSHttpConnectWithProtoType-API.patch


 This ticket was split from SPDY ticket(TS-2431).
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2612) Indroduce TSHttpConnectWithProtoType() API

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2612?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-2612:
--

Labels: api-addition review  (was: review)

 Indroduce TSHttpConnectWithProtoType() API
 --

 Key: TS-2612
 URL: https://issues.apache.org/jira/browse/TS-2612
 Project: Traffic Server
  Issue Type: New Feature
  Components: TS API
Reporter: Yunkai Zhang
  Labels: api-addition, review
 Fix For: 5.0.0

 Attachments: 
 0001-TS-2612-Indroduce-TSHttpConnectWithProtoType-API.patch


 This ticket was split from SPDY ticket(TS-2431).
 For some plugins that using TSHttpConnect() API to do request, the Logging 
 module can't know which protocol type is used, so I add a new API: 
 {code}
 tsapi TSVConn TSHttpConnectWithProtoType(struct sockaddr const* addr, 
 TSNetProtoType proto_type);
 {code}
 After introducing TSHttpConnectWithProtoType() API, TSHttpConnect() API would 
 be a special case of it:
 {code}
 TSVConn
 TSHttpConnect(sockaddr const* addr)
 {
   return TSHttpConnectWithProtoType(addr, TS_NET_PROTO_HTTP);
 }
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Assigned] (TS-2605) delete unused code

2014-03-04 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2605?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom reassigned TS-2605:
-

Assignee: Leif Hedstrom

 delete unused code
 --

 Key: TS-2605
 URL: https://issues.apache.org/jira/browse/TS-2605
 Project: Traffic Server
  Issue Type: Improvement
  Components: Core, TProxy
Reporter: sherlockhua
Assignee: Leif Hedstrom
 Fix For: 5.0.0

 Attachments: 0001-TS-2605-delete-unused-code-from-proxy-Main.cc.patch


 I'm newer to the traffic server project, when I read the source code, I found 
 this code snippets have not used. in proxy/Main.cc, 1350 line. the code 
 sippnets is like follow:
 1347   // This call is required for win_9xMe
 1348   //without this this_ethread() is failing when
 1349   //start_HttpProxyServer is called from main thread
 1350   Thread *main_thread = NEW(new EThread);
   
 
 1351   main_thread-set_specific();
 but I found when  eventProcessor.start(num_of_net_threads, stacksize) is 
 execute, in function start of  eventProcessor will overwrite the thread 
 specific data which set above, here is the code snippets:
 130 EventProcessor::start(int n_event_threads, size_t stacksize)
 131 {
 132   char thr_name[MAX_THREAD_NAME_LENGTH];
 133   int i;
 134 
 135   // do some sanity checking.
 136   static int started = 0;
 137   ink_release_assert(!started);
 138   ink_release_assert(n_event_threads  0  n_event_threads = 
 MAX_EVENT_THREADS);
 139   started = 1;
 140 
 141   n_ethreads = n_event_threads;
 142   n_thread_groups = 1;
 143 
 144   int first_thread = 1;
 145 
 146   for (i = 0; i  n_event_threads; i++) {
 147 EThread *t = NEW(new EThread(REGULAR, i));
 148 if (first_thread  !i) {
 149   ink_thread_setspecific(Thread::thread_data_key, t); //overwrite
 150   global_mutex = t-mutex;
 151   t-cur_time = ink_get_based_hrtime_internal();
 152 }
 153 all_ethreads[i] = t;
 154 
 155 eventthread[ET_CALL][i] = t;
 156 t-set_event_type((EventType) ET_CALL);
 157   }
 so I think the main_thread should discarded, and make code more clear to 
 read, thank you. 



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-1521) Enable compression for binary log format

2014-03-04 Thread bettydramit (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-1521?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

bettydramit updated TS-1521:


Attachment: logcompress.patch

compress ascii log 

 Enable compression for binary log format
 

 Key: TS-1521
 URL: https://issues.apache.org/jira/browse/TS-1521
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
 Environment: RHEL 6+
Reporter: Lans Carstensen
Assignee: Yunkai Zhang
 Fix For: 6.0.0

 Attachments: logcompress.patch


 As noted by in a discussion on #traffic-server, gzip can result in 90%+ 
 compression on the binary access logs.  By adding a reasonable streaming 
 compression algorithm to the binary format you could significantly reduce 
 logging-related IOPS.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-1521) Enable compression for binary log format

2014-03-04 Thread Zhao Yongming (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1521?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919388#comment-13919388
 ] 

Zhao Yongming commented on TS-1521:
---

[~bettydreamit] submit thire gzipping patch for the ascii loging, please 
consider accept this feature too.

 Enable compression for binary log format
 

 Key: TS-1521
 URL: https://issues.apache.org/jira/browse/TS-1521
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
 Environment: RHEL 6+
Reporter: Lans Carstensen
Assignee: Yunkai Zhang
 Fix For: 6.0.0

 Attachments: logcompress.patch


 As noted by in a discussion on #traffic-server, gzip can result in 90%+ 
 compression on the binary access logs.  By adding a reasonable streaming 
 compression algorithm to the binary format you could significantly reduce 
 logging-related IOPS.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2344) 404 error was logged while url redirect request was processed corrctly

2014-03-04 Thread Ethan Lai (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2344?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919467#comment-13919467
 ] 

Ethan Lai commented on TS-2344:
---

[~bcall]
1. Class URL(redirect_url) is not holding a NULL terminated string, just get 
its reference might cause thereafter MIME_FIELD_LOCATION length, 
strlen(s-remap_redirect), mis-counted.
2. s-hdr_info.client_response is not built till build_response() call, #8111, 
inside build_error_response().  If set MIME_FIELD_LOCATION before calling 
build_error_response(), it causes segfault.
3.
  Current implementation will lookup with no mappings and build Not Found on 
Accelerator(#915) error response first, then call handleIfRedirect().  This is 
why there are 2 error logs which 404 first and 30x followed.
  My patch will call handleIfRedirect() right after !s-url_remap_success.  If 
this is a redirect request, the Not Found case will not be reached.  This 
prevents producing 404 error log.  Furthermore, since the error logs were 
produced inside build_error_response(), I thought redirect responses were not 
errors and error logs are not needed.
  About the MIME_FIELD_LOCATION setting, this MIME field must be set before 
calling body_factory-fabricate_with_old_api(), #8176.  Or the %{Location}psh 
field in response body will be empty.  This is another reason I move setting 
the location header into build_error_response().

Thanks,
-Ethan

 404 error was logged while url redirect request was processed corrctly
 --

 Key: TS-2344
 URL: https://issues.apache.org/jira/browse/TS-2344
 Project: Traffic Server
  Issue Type: Bug
  Components: Logging
Reporter: Eddie
Assignee: Bryan Call
  Labels: Review
 Fix For: 5.2.0


 I am seeing a lot of entries in the error log for my url redirect request. 
 The request was processed correctly and I could see the expected response in 
 log as below:
   2013-11-08 18:23:37 IP  301 FIN http://yahoo.com 
 http://www.yahoo.com/
 But log messages like following were printed in the error log too, which 
 generates a  lot of error logs (log rotation configured) and filling up disk 
 space pretty fast.
   20131108.18h23m37s RESPONSE: sent IP status 404 (Not Found on 
 Accelerator) for 'http:///'
   20131108.18h23m37s RESPONSE: sent IP status 301 (Redirect) 
 for 'http:///'
 I watched my tcpdump log and did not see that the 404 error was sent out at 
 all. I am using ATS/3.2.4 (also checked with I am seeing a lot of entries in 
 the error log for my url redirect request. The request was processed correctly
 I could see the expected response in log as well:
   2013-11-08 18:23:37 IP  301 FIN http://yahoo.com 
 http://www.yahoo.com/
 But log messages like following were printed too:
   20131108.18h23m37s RESPONSE: sent IP status 404 (Not Found on 
 Accelerator) for 'http:///'
   20131108.18h23m37s RESPONSE: sent IP status 301 (Redirect) 
 for 'http:///'
 I watched my tcpdump log and did not see that the 404 error was sent out at 
 all. I am using ATS/3.2.4 and following
 is the log configuration.
 CONFIG proxy.config.log.logging_enabled INT 3
 CONFIG proxy.config.log.max_secs_per_buffer INT 1
 CONFIG proxy.config.log.max_space_mb_for_logs INT 25000
 CONFIG proxy.config.log.max_space_mb_for_orphan_logs INT 25
 CONFIG proxy.config.log.max_space_mb_headroom INT 1000
 CONFIG proxy.config.log.hostname STRING localhost
 CONFIG proxy.config.log.logfile_dir STRING var/log/trafficserver
 CONFIG proxy.config.log.logfile_perm STRING rw-r--r--
 CONFIG proxy.config.log.custom_logs_enabled INT 1
 CONFIG proxy.config.log.squid_log_enabled INT 0
 CONFIG proxy.config.log.squid_log_is_ascii INT 0
 CONFIG proxy.config.log.squid_log_name STRING squid
 CONFIG proxy.config.log.squid_log_header STRING NULL
 CONFIG proxy.config.log.common_log_enabled INT 0
 CONFIG proxy.config.log.common_log_is_ascii INT 1
 CONFIG proxy.config.log.common_log_name STRING common
 CONFIG proxy.config.log.common_log_header STRING NULL
 CONFIG proxy.config.log.extended_log_enabled INT 0
 CONFIG proxy.config.log.extended_log_is_ascii INT 0
 CONFIG proxy.config.log.extended_log_name STRING extended
 CONFIG proxy.config.log.extended_log_header STRING NULL
 CONFIG proxy.config.log.extended2_log_enabled INT 0
 CONFIG proxy.config.log.extended2_log_is_ascii INT 1
 CONFIG proxy.config.log.extended2_log_name STRING extended2
 CONFIG proxy.config.log.extended2_log_header STRING NULL
 CONFIG proxy.config.log.separate_icp_logs INT 0
 CONFIG proxy.config.log.separate_host_logs INT 0
 Is this a bug or is this a misconfiguration? Does anyone have any idea?) and 
 following is the log configuration.
 CONFIG proxy.config.log.logging_enabled INT 3
 CONFIG 

[jira] [Commented] (TS-2169) SSL statistics

2014-03-04 Thread Ron Barber (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2169?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919509#comment-13919509
 ] 

Ron Barber commented on TS-2169:


I assume you are referring to the loop below?  This get executed by, what I 
will call, a stats collector thread so I guess stats collection could get 
delayed..if this turns out to be an issue we may want to add an option to 
provide the ability to granularly disable portions of ssl stats collection.
+for (size_t i = 0; i  ctxCount; i++) {
+  SSL_CTX * ctx = certLookup-get(i);
+
+  sessions += SSL_CTX_sess_accept_good(ctx);
+  hits += SSL_CTX_sess_hits(ctx);
+  misses += SSL_CTX_sess_misses(ctx);
+  timeouts += SSL_CTX_sess_timeouts(ctx);
+}


 SSL statistics
 --

 Key: TS-2169
 URL: https://issues.apache.org/jira/browse/TS-2169
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL, Stats
Reporter: David Carlin
Assignee: James Peach
  Labels: Review
 Fix For: 5.2.0


 It would be swell if there were some traffic_line SSL statistic variables.
 For instance, number of SSL connections and SSL bytes.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2600) HTTPS statistics

2014-03-04 Thread Ron Barber (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2600?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919526#comment-13919526
 ] 

Ron Barber commented on TS-2600:


James summarized the issue as follows:
The discussion around the HTTPS stats needs to address whether HTTPS requests 
should increment both the HTTP and the HTTPS metric, and how the HTTPS-ness of 
a session is tracked. The latter is very similar to Yunkai Zhang's NetProtoType 
patches over in TS-2431.

1.  In order to not impact existing stats, I think the current http metrics 
should stay the same (e.g. they count *every* http (and https) request).  Based 
on that we would essentially double count https requests (once for http and 
again for https)
2.  Yunkai Zhang's patch adds a NetProtoType as a data member for connections 
and my change also add a type, although not as granular as TS-2431.  We should 
probably take TS-2431 first, then SSL stats can use the NetProtoType as 
necessary.

 HTTPS statistics
 

 Key: TS-2600
 URL: https://issues.apache.org/jira/browse/TS-2600
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL, Stats
Reporter: David Carlin
Assignee: Ron Barber
  Labels: Review
 Fix For: 5.2.0


 It would be swell if there were some traffic_line SSL statistic variables.
 For instance, number of SSL connections and SSL bytes.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-1521) Enable compression for binary log format

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1521?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919547#comment-13919547
 ] 

Leif Hedstrom commented on TS-1521:
---

Couple of thoughts:

1. This needs to be configurable, per log object.
2. Is this for ascii logs only? If so, why ?
3. There's a delete[] added in the patch, why is that ? Presumably there's 
another delete[] then that's superfluous ??
4. The code uses tab's. Don't do that :).
5. Who is reggie ?

 Enable compression for binary log format
 

 Key: TS-1521
 URL: https://issues.apache.org/jira/browse/TS-1521
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
 Environment: RHEL 6+
Reporter: Lans Carstensen
Assignee: Yunkai Zhang
 Fix For: 6.0.0

 Attachments: logcompress.patch


 As noted by in a discussion on #traffic-server, gzip can result in 90%+ 
 compression on the binary access logs.  By adding a reasonable streaming 
 compression algorithm to the binary format you could significantly reduce 
 logging-related IOPS.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Anil Kumar Myla (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919558#comment-13919558
 ] 

Anil Kumar Myla commented on TS-2609:
-

When we have plugin chaining mapToUrl can be different from requestUrl. Let's 
say we have a regex plugin before the header rewrite plugin, and the regex 
plugin rewrites it to regex.x.y.com instead of the origin.x.y.com

map x.y.com origin.x.y.com regex plugin header rewrite plugin

_rri-mapToUrl = origin.x.y.com/request_url
_rri-requestUrl = regex.x.y.com/regex_modified_url

You are right, these would ideally be
%{URL:Host}
%{CLIENT-URL:Host}

But from the plugin documentation, I'm thinking the URL/CLIENT-URL conditions 
have already been broken down into SCHEME (unimplemented), HOST, PORT 
(unimplemented), PATH ,QUERY conditions. Do we really need the URL/CLIENT-URL 
conditions ? :)

Let me know what you think.

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Anil Kumar Myla (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919588#comment-13919588
 ] 

Anil Kumar Myla commented on TS-2609:
-

To add to your comments, in a remap rule, URL:Host is pretty much equal to 
HEADER:Host (let me know if you think otherwise) while the CLIENT-URL:Host can 
be the origin server.

But we need to justify implementing URL/CLIENT-URL conditions because of the 
following replacements that we can use (in the context of a remap rule)
URL:Scheme == SCHEME (unimplemented)
URL:Host == HEADER:Host (?correct?)
URL:Port == PORT (unimplemented)
URL:Path == PATH
URL:Query== QUERY

CLIENT-URL:Scheme == SCHEME (unimplemented)
CLIENT-URL:Host == ? (unimplemented) -- TOHOST (patch)
CLIENT-URL:Port == PORT (unimplemented)
CLIENT-URL:Path == URL:Path == PATH
CLIENT-URL:Query== URL:Query == QUERY

We need to implement SCHEME or PORT (add CLIENT-SCHEME / CLIENT-PORT for remap 
rules) for this to be complete.

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919680#comment-13919680
 ] 

Leif Hedstrom commented on TS-2609:
---

Right, significant portions of the URL / CLIENT-URL features are not 
implemented.

Also, looking at the docs, it seems the intent was to implement these three:

{code}
header_rewrite.en.rst:  cond %{HOST} operand  
[condition_flags]
header_rewrite.en.rst:  cond %{FROMHOST} operand   [condition_flags]
header_rewrite.en.rst:  cond %{TOHOST} operand 
[condition_flags]
{code}

I'm pretty sure each of those would correlate (in remap plugins) to each of 
these from the RRI struct:

{code}
TSMLoc requestUrl;
TSMLoc mapFromUrl;
TSMLoc mapToUrl;
{code}


So, your original patch, the condition would be named HOST I think? Also, I 
feel that to be consistent, the three conditions ought to be be named

{code}
HOST
FROM-HOST
TO-HOST
{code}

That seems more in line with how we do this for e.g. HEADER / CLIENT-HEADER and 
URL / CLIENT-URL.

Finally, the intent probably also was (just as with URL / CLIENT-URL) that we'd 
have one class implementing HOST, and have it use a flag to indicate which 
type of HOST it would use.

Wdyt ?

Oh, and thanks for all the input, this is a good discussion!


 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (TS-2169) SSL statistics

2014-03-04 Thread Ron Barber (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2169?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919509#comment-13919509
 ] 

Ron Barber edited comment on TS-2169 at 3/4/14 6:14 PM:


I assume you are referring to the loop below?  This get executed by, what I 
will call, a stats collector thread so I guess stats collection could get 
delayed..if this turns out to be an issue we may want to add an option to 
provide the ability to granularly disable portions of ssl stats collection.
{code}
+for (size_t i = 0; i  ctxCount; i++) {
+  SSL_CTX * ctx = certLookup-get(i);
+
+  sessions += SSL_CTX_sess_accept_good(ctx);
+  hits += SSL_CTX_sess_hits(ctx);
+  misses += SSL_CTX_sess_misses(ctx);
+  timeouts += SSL_CTX_sess_timeouts(ctx);
+}
{code}


was (Author: rwbarber2):
I assume you are referring to the loop below?  This get executed by, what I 
will call, a stats collector thread so I guess stats collection could get 
delayed..if this turns out to be an issue we may want to add an option to 
provide the ability to granularly disable portions of ssl stats collection.
+for (size_t i = 0; i  ctxCount; i++) {
+  SSL_CTX * ctx = certLookup-get(i);
+
+  sessions += SSL_CTX_sess_accept_good(ctx);
+  hits += SSL_CTX_sess_hits(ctx);
+  misses += SSL_CTX_sess_misses(ctx);
+  timeouts += SSL_CTX_sess_timeouts(ctx);
+}


 SSL statistics
 --

 Key: TS-2169
 URL: https://issues.apache.org/jira/browse/TS-2169
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL, Stats
Reporter: David Carlin
Assignee: James Peach
  Labels: Review
 Fix For: 5.2.0


 It would be swell if there were some traffic_line SSL statistic variables.
 For instance, number of SSL connections and SSL bytes.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2604) Collapsed connection plugin

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2604?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13919734#comment-13919734
 ] 

Leif Hedstrom commented on TS-2604:
---

[~yzlai] Curious, how is this different than the existing read-while-writer 
feature? I'm not arguing against the value of this plugin, but would like to 
understand where they differ, and why?

https://trafficserver.readthedocs.org/en/latest/admin/http-proxy-caching.en.html#reducing-origin-server-requests-avoiding-the-thundering-herd

 Collapsed connection plugin
 ---

 Key: TS-2604
 URL: https://issues.apache.org/jira/browse/TS-2604
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Ethan Lai
Assignee: Bryan Call
 Fix For: 5.0.0


 This plugin collapses connections with identical CacheUrl/EffectiveUrl.
 Please find more detail from README and state.png (State Diagram)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (TS-2614) Response to invalid Content-Length for POST should be a 400 error

2014-03-04 Thread Ron Barber (JIRA)
Ron Barber created TS-2614:
--

 Summary: Response to invalid Content-Length for POST should be a 
400 error
 Key: TS-2614
 URL: https://issues.apache.org/jira/browse/TS-2614
 Project: Traffic Server
  Issue Type: Bug
  Components: HTTP
Reporter: Ron Barber



We have some users attempting to POST where the content length is -1.
POST /services/rest HTTP/1.1\r\n
Host: api.flickr.com\r\n
Accept: */*\r\n
Content-Length: -1\r\n
Content-Type: application/x-www-form-urlencoded\r\n
Expect: 100-continue\r\n

ATS goes ahead with this request and connects to the origin and passes the 
invalid content length.  

Preferable, and consistent with the spec, ATS should immediately respond to the 
client with an error.

RFC-2616 Section 14.13 says 'Any Content-Length greater than or equal to zero 
is a valid value.'  I interpret that as a negative content length value is 
invalid.

I propose that ATS respond with a '400 Invalid Request' for PUT/POST/PUSH 
requests when the user provided content-length is less than 0.




--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Comment Edited] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920232#comment-13920232
 ] 

Leif Hedstrom edited comment on TS-2609 at 3/4/14 11:49 PM:


Sounds good. We should do something similar for URL too I think: TO-URL, 
FROM-URL and ORIGIN-URL. If we do that, do we still want the HOST shortcuts? 
I'm fine with that, since it makes it easier, but there would be some potential 
overlap.


was (Author: zwoop):
Sounds good.

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2609) Header rewrite plugin TOHOST condition

2014-03-04 Thread Anil Kumar Myla (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920284#comment-13920284
 ] 

Anil Kumar Myla commented on TS-2609:
-

TO-URL FROM-URL and ORIGIN-URL are too generic in the sense, that they can be 
broken down into respective components like scheme, host, port, path, query as 
I explained before. Does it make sense to get rid of the URL condition since it 
is not implemented yet?

 Header rewrite plugin TOHOST condition
 --

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support TOHOST condition. Header rewrites 
 conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2604) Collapsed connection plugin

2014-03-04 Thread Ethan Lai (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2604?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920310#comment-13920310
 ] 

Ethan Lai commented on TS-2604:
---

[~zwoop] As the doc mentioned, ATS could not start serving other clients until 
it get the complete response header.
Think about a request case with long response time, the read-while-writer 
feature would not collapse further requests with same cacheUrl before receiving 
the complete response header of 1st request.  That means if origin server takes 
N secs before sending response header, other concurrent requests within the 
first N sec will also do connect to origin server.

 Collapsed connection plugin
 ---

 Key: TS-2604
 URL: https://issues.apache.org/jira/browse/TS-2604
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Ethan Lai
Assignee: Bryan Call
 Fix For: 5.0.0


 This plugin collapses connections with identical CacheUrl/EffectiveUrl.
 Please find more detail from README and state.png (State Diagram)



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Updated] (TS-2609) Header rewrite plugin ORIGIN-HOST condition

2014-03-04 Thread Anil Kumar Myla (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2609?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Anil Kumar Myla updated TS-2609:


Description: Enhance header rewrite plugin to support ORIGIN-HOST 
condition. Header rewrites conditioned on the final origin server will be 
supported.  (was: Enhance header rewrite plugin to support TOHOST condition. 
Header rewrites conditioned on the final origin server will be supported.)

 Header rewrite plugin ORIGIN-HOST condition
 ---

 Key: TS-2609
 URL: https://issues.apache.org/jira/browse/TS-2609
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Anil Kumar Myla
Assignee: Leif Hedstrom
Priority: Minor
 Fix For: 5.0.0


 Enhance header rewrite plugin to support ORIGIN-HOST condition. Header 
 rewrites conditioned on the final origin server will be supported.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2610) Add client_req_proto_type, %cqpt field into LogFormat

2014-03-04 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2610?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920481#comment-13920481
 ] 

James Peach commented on TS-2610:
-

This is also related to TS-2600. [~rwbarber2]'s patch over there introduces a 
similar mechanism to track statistics for requests made over HTTPS.

 Add client_req_proto_type, %cqpt field into LogFormat
 -

 Key: TS-2610
 URL: https://issues.apache.org/jira/browse/TS-2610
 Project: Traffic Server
  Issue Type: New Feature
  Components: Logging
Reporter: Yunkai Zhang
Assignee: Yunkai Zhang
 Fix For: 5.0.0

 Attachments: 
 0002-TS-2610-Add-client_req_proto_type-cqpt-field-into-Lo.patch


 This ticket was split from SPDY ticket(TS-2431), and it relys on the patch of 
 TS-2612.
 Add %cqpt field into LogFormat, so that we can distinguish the protocol 
 type of each log record, it can help us to to do some analysis and statistic.
 Here are the available values of %cqpt:
 {code}
   HTTP  -- HTTP protocol
   HTTP_SSL  -- HTTP with SSL protocol
   HTTP_SPDY -- HTTP with SPDY protocol
   HTTP_SPDY_SSL -- HTTP with SPDY with SSL protocol
 {code}



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Created] (TS-2615) better logging for SSL client misconfiguration

2014-03-04 Thread James Peach (JIRA)
James Peach created TS-2615:
---

 Summary: better logging for SSL client misconfiguration
 Key: TS-2615
 URL: https://issues.apache.org/jira/browse/TS-2615
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: James Peach


From TS-346, we should not crash when the SSL client is not configured 
correctly.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2615) better logging for SSL client misconfiguration

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2615?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920502#comment-13920502
 ] 

ASF subversion and git services commented on TS-2615:
-

Commit 705a1d80002de0406e4da59892f36d05a11eb849 in trafficserver's branch 
refs/heads/master from [~jpe...@apache.org]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=705a1d8 ]

TS-2615: handle errors in creating a SSL client session


 better logging for SSL client misconfiguration
 --

 Key: TS-2615
 URL: https://issues.apache.org/jira/browse/TS-2615
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: James Peach
 Fix For: 5.0.0


 From TS-346, we should not crash when the SSL client is not configured 
 correctly.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Resolved] (TS-2615) better logging for SSL client misconfiguration

2014-03-04 Thread James Peach (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2615?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

James Peach resolved TS-2615.
-

   Resolution: Fixed
Fix Version/s: 5.0.0
 Assignee: James Peach

 better logging for SSL client misconfiguration
 --

 Key: TS-2615
 URL: https://issues.apache.org/jira/browse/TS-2615
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: James Peach
Assignee: James Peach
 Fix For: 5.0.0


 From TS-346, we should not crash when the SSL client is not configured 
 correctly.



--
This message was sent by Atlassian JIRA
(v6.2#6252)


[jira] [Commented] (TS-2611) AddS3 Auth plugin

2014-03-04 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2611?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=13920549#comment-13920549
 ] 

ASF subversion and git services commented on TS-2611:
-

Commit 15e2bbd2810b8cad9984c1a588ce14cdb025ce40 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=15e2bbd ]

TS-2611 Fix getopt usage for OmniOS


 AddS3 Auth plugin
 -

 Key: TS-2611
 URL: https://issues.apache.org/jira/browse/TS-2611
 Project: Traffic Server
  Issue Type: New Feature
  Components: Plugins
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.0.0


 This adds some basic v2 S3 Auth features, we can extend later with more 
 features.



--
This message was sent by Atlassian JIRA
(v6.2#6252)