[jira] [Created] (TS-3450) rename header_rewrite condition INTERNAL-TRANSACTION as INTERNAL-TXN

2015-03-17 Thread Sudheer Vinukonda (JIRA)
Sudheer Vinukonda created TS-3450:
-

 Summary: rename header_rewrite condition INTERNAL-TRANSACTION as 
INTERNAL-TXN 
 Key: TS-3450
 URL: https://issues.apache.org/jira/browse/TS-3450
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Reporter: Sudheer Vinukonda


TS-2834 adds a condition {{INTERNAL-TRANSACTION}}. To make it consistent with 
the general {{txn}} usage in the ATS source and make the condition shorter to 
type :), [~zwoop] suggested to duplicate the condition with {{INTERNAL-TXN}} 
and eventually retire the longer form condition.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3449) Create a dup TS API of TSHttpIsInternalRequest with name TSHttpIsInternalTransaction

2015-03-17 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3449?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3449:
--
Affects Version/s: 5.3.0
Fix Version/s: 5.3.0

 Create a dup TS API of TSHttpIsInternalRequest with name 
 TSHttpIsInternalTransaction
 

 Key: TS-3449
 URL: https://issues.apache.org/jira/browse/TS-3449
 Project: Traffic Server
  Issue Type: Improvement
  Components: TS API
Affects Versions: 5.3.0
Reporter: Sudheer Vinukonda
 Fix For: 5.3.0


 [~zwoop] noticed that the naming of the API TSHttpIsInternalRequest() is a 
 little bit confusing, since it takes in a txnp parameter. It would perhaps be 
 clearer if the API were called TSHttpIsInternalTransaction. (incidentally, 
 there's a condition in header_rewrite plugin that is also named 
 INTERNAL-TRANSACTION - TS-2834).
 To remove the confusion, Leif suggested to duplicate the existing TS API 
 TSHttpIsInternalRequest() as TSHttpIsInternalTransaction() and eventually 
 retire the TSHttpIsInternalRequest() API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3449) Create a dup TS API of TSHttpIsInternalRequest with name TSHttpIsInternalTransaction

2015-03-17 Thread Sudheer Vinukonda (JIRA)
Sudheer Vinukonda created TS-3449:
-

 Summary: Create a dup TS API of TSHttpIsInternalRequest with name 
TSHttpIsInternalTransaction
 Key: TS-3449
 URL: https://issues.apache.org/jira/browse/TS-3449
 Project: Traffic Server
  Issue Type: Improvement
  Components: TS API
Reporter: Sudheer Vinukonda


[~zwoop] noticed that the naming of the API TSHttpIsInternalRequest() is a 
little bit confusing, since it takes in a txnp parameter. It would perhaps be 
clearer if the API were called TSHttpIsInternalTransaction. (incidentally, 
there's a condition in header_rewrite plugin that is also named 
INTERNAL-TRANSACTION - TS-2834).

To remove the confusion, Leif suggested to duplicate the existing TS API 
TSHttpIsInternalRequest() as TSHttpIsInternalTransaction() and eventually 
retire the TSHttpIsInternalRequest() API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3450) rename header_rewrite condition INTERNAL-TRANSACTION as INTERNAL-TXN

2015-03-17 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3450?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3450:
--
Affects Version/s: 5.3.0
Fix Version/s: 5.3.0

 rename header_rewrite condition INTERNAL-TRANSACTION as INTERNAL-TXN 
 -

 Key: TS-3450
 URL: https://issues.apache.org/jira/browse/TS-3450
 Project: Traffic Server
  Issue Type: Improvement
  Components: Plugins
Affects Versions: 5.3.0
Reporter: Sudheer Vinukonda
 Fix For: 5.3.0


 TS-2834 adds a condition {{INTERNAL-TRANSACTION}}. To make it consistent with 
 the general {{txn}} usage in the ATS source and make the condition shorter to 
 type :), [~zwoop] suggested to duplicate the condition with {{INTERNAL-TXN}} 
 and eventually retire the longer form condition.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3443) Configure openssl 1.0.2 tls1.h detection faulty

2015-03-17 Thread Susan Hinrichs (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3443?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365314#comment-14365314
 ] 

Susan Hinrichs commented on TS-3443:


The fix looks fine to me as well.  It is odd that we don't see this issue with 
custom built openssl 1.0.2. 

 Configure openssl 1.0.2 tls1.h detection faulty
 ---

 Key: TS-3443
 URL: https://issues.apache.org/jira/browse/TS-3443
 Project: Traffic Server
  Issue Type: Bug
  Components: Build
Reporter: Felix Buenemann
 Fix For: 6.0.0


 The configure check for tls1.h fails, because at least on openssl 1.0.2 
 tls1.h depends on a macro from openssl/safestack.h.
 I've created [pull request #180 on 
 github|https://github.com/apache/trafficserver/pull/180] to fix the detection 
 by including openssl/ssl.h in the configure check, which in turn includes 
 safestack.h. Given that ssl.h is already required that solution should be 
 fully backwards compatible to older versions that might not require 
 safestack.h.
 This problem affects at least master and 5.2.0.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3427) compilation error of atscppapi when configured for a out-of-tree build

2015-03-17 Thread Bin (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3427?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366620#comment-14366620
 ] 

Bin commented on TS-3427:
-

It's been pretty crazy lately. atscppapi_out_of_tree_2.diff finally arrived.

 compilation error of atscppapi when configured for a out-of-tree build
 --

 Key: TS-3427
 URL: https://issues.apache.org/jira/browse/TS-3427
 Project: Traffic Server
  Issue Type: Bug
  Components: Build, CPP API
Reporter: Bin
Assignee: Brian Geffon
 Fix For: 6.0.0

 Attachments: atscppapi_3.diff, atscppapi_out_of_tree_2.diff, 
 unused_variables.diff


 Header file not found error when --enable-cppapi is enabled for an 
 out-of-tree build on RHEL 6.4. It has no complaints if it is a in-tree build. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3427) compilation error of atscppapi when configured for a out-of-tree build

2015-03-17 Thread Bin (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3427?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Bin updated TS-3427:

Attachment: atscppapi_out_of_tree_2.diff

 compilation error of atscppapi when configured for a out-of-tree build
 --

 Key: TS-3427
 URL: https://issues.apache.org/jira/browse/TS-3427
 Project: Traffic Server
  Issue Type: Bug
  Components: Build, CPP API
Reporter: Bin
Assignee: Brian Geffon
 Fix For: 6.0.0

 Attachments: atscppapi_3.diff, atscppapi_out_of_tree_2.diff, 
 unused_variables.diff


 Header file not found error when --enable-cppapi is enabled for an 
 out-of-tree build on RHEL 6.4. It has no complaints if it is a in-tree build. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (TS-3216) Add HPKP (Public Key Pinning Extension for HTTP) support

2015-03-17 Thread Masaori Koshiba (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3216?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364576#comment-14364576
 ] 

Masaori Koshiba edited comment on TS-3216 at 3/17/15 6:08 AM:
--

[~jpe...@apache.org], thanks for rewiew.

I agree with that I should avoid making {{ssl_multicert.config}} more complex.

{quote}
It assumes that there is only 1 backup pin, the backup pin is contained in a 
CSR, and that the CSR is available to ATS. All of these assumptions seem shaky 
to me.
{quote}
Do you mean even if there are 2 cert settings in {{ssl_multicert.config}}, only 
one backup pin is enough?

I thought adding HPKP setting in {{records.config}} like HSTS at first.
But, AFAIU, when we have 2 certs, each certs needs different CSRs to generate 
backup pins.
Because when current cert is expired, current pin and backup pin is cached in 
browser,
so we have to generate new cert from CSR which used to generate backup pin.
This is why I add HPKP settings in {{ssl_multicert.config}}.



was (Author: masaori):
[~jpe...@apache.org], thanks for rewiew.

I agree with that I should avoid making {{ssl_multicert.config}} more complex.

 It assumes that there is only 1 backup pin, the backup pin is contained in a 
 CSR,
 and that the CSR is available to ATS. All of these assumptions seem shaky to 
 me.
Do you mean even if there are 2 cert settings in {{ssl_multicert.config}}, only 
one backup pin is enough?

I thought adding HPKP setting in {{records.config}} like HSTS at first.
But, AFAIU, when we have 2 certs, each certs needs different CSRs to generate 
backup pins.
Because when current cert is expired, current pin and backup pin is cached in 
browser,
so we have to generate new cert from CSR which used to generate backup pin.
This is why I add HPKP settings in {{ssl_multicert.config}}.


 Add HPKP (Public Key Pinning Extension for HTTP) support
 

 Key: TS-3216
 URL: https://issues.apache.org/jira/browse/TS-3216
 Project: Traffic Server
  Issue Type: New Feature
  Components: SSL
Reporter: Masaori Koshiba
Assignee: James Peach
  Labels: review
 Fix For: 6.0.0

 Attachments: hpkp-001.patch, hpkp-002.patch


 Add Public Key Pinning Extension for HTTP Support in Traffic Server.
 Public Key Pinning Extension for HTTP (draft-ietf-websec-key-pinning-21)
 - https://tools.ietf.org/html/draft-ietf-websec-key-pinning-21



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3424) SSL error: SSL3_GET_RECORD:decryption failed or bad record mac

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3424?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365956#comment-14365956
 ] 

Brian Geffon commented on TS-3424:
--

Ok since [~shinrich] created TS-3451, let's close this guy out with the 
intention of backporting to 5.2.x, sound good?

 SSL error: SSL3_GET_RECORD:decryption failed or bad record mac
 --

 Key: TS-3424
 URL: https://issues.apache.org/jira/browse/TS-3424
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: ts-3424-2.diff, ts-3424-3.diff, ts-3424-for-52-2.diff, 
 ts-3424-for-52.diff, ts-3424.diff, undo-handshake-buffer-for-52.diff, 
 undo-handshake-buffer.diff


 Starting with 5.2.x we're seeing SSL_ERROR_SSL type errors in 
 {{ssl_read_from_net}}, when calling OpenSSL's {{ERR_error_string_n}} we see 
 the error is {{1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad 
 record mac}}. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3424) SSL error: SSL3_GET_RECORD:decryption failed or bad record mac

2015-03-17 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3424?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365958#comment-14365958
 ] 

Leif Hedstrom commented on TS-3424:
---

[~briang] Sounds good. Since there's a long thread here, can you summarize what 
git commits (just the UUID) should be back ported to 5.2.1 please?

 SSL error: SSL3_GET_RECORD:decryption failed or bad record mac
 --

 Key: TS-3424
 URL: https://issues.apache.org/jira/browse/TS-3424
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: ts-3424-2.diff, ts-3424-3.diff, ts-3424-for-52-2.diff, 
 ts-3424-for-52.diff, ts-3424.diff, undo-handshake-buffer-for-52.diff, 
 undo-handshake-buffer.diff


 Starting with 5.2.x we're seeing SSL_ERROR_SSL type errors in 
 {{ssl_read_from_net}}, when calling OpenSSL's {{ERR_error_string_n}} we see 
 the error is {{1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad 
 record mac}}. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366071#comment-14366071
 ] 

Dzmitry Markovich commented on TS-3312:
---

[~zwoop], [~briang] - i fixed the naming and attached a patch.

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366157#comment-14366157
 ] 

ASF subversion and git services commented on TS-3452:
-

Commit 49d0ef822c097c83b9714dfc7ef7c7932c1ed935 in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=49d0ef8 ]

TS-3452: Better debug messages for SSL_ERROR_SSL: update changes


 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread Brian Geffon (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brian Geffon reassigned TS-3452:


Assignee: Brian Geffon

 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366156#comment-14366156
 ] 

ASF subversion and git services commented on TS-3452:
-

Commit 6cd3e45c9d8cc579f0bdc4dbd99b10aeb6438e1a in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6cd3e45 ]

TS-3452: Better debug messages for SSL_ERROR_SSL


 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Build failed in Jenkins: out_of_tree-master #646

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/out_of_tree-master/646/changes

Changes:

[Leif Hedstrom] Fix indentation.

[Leif Hedstrom] Fix indentation.

[Thomas Jackson] Add tests for connect_attempts within (retries for connection 
to origin)

[Thomas Jackson] Add initial chunked encoding tests

[James Peach] tsqa: add basic regression tests wrapper

[James Peach] tsqa: add build tests for uncommon configuration options

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: update changes

--
[...truncated 631 lines...]
Detecting operating system...success [linux]
Detecting machine architecture...success [x86_64]
Finding dirname command..success [/bin/dirname]
Determining build directory..success 
[https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/lib/ck]
Finding gzip toolsuccess [/bin/gzip]
Finding suitable compilersuccess [/bin/cc]
Detecting VMA bits...success [48]
Checking header file usability...success [stdbool.h]
Checking header file usability...success [stddef.h]
Checking header file usability...success [stdint.h]
Checking header file usability...success [string.h]
Generating header files..success
Generating build files...success

   VERSION = 0.4.5
 BUILD_DIR = 
https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck
   SRC_DIR = 
https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/lib/ck
SYSTEM = linux
   PROFILE = x86_64
CC = /bin/cc
  COMPILER = gcc
CFLAGS = -D_XOPEN_SOURCE=600 -D_BSD_SOURCE -D_DEFAULT_SOURCE 
-std=gnu99 -pedantic -Wall -W -Wundef -Wendif-labels -Wshadow -Wpointer-arith 
-Wcast-align -Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes 
-Wnested-externs -Winline -Wdisabled-optimization -fstrict-aliasing -O2 -pipe 
-Wno-parentheses  -fPIC
PTHREAD_CFLAGS = -pthread
LD = /bin/cc
LDNAME = libck.so
LDNAME_VERSION = libck.so.0.4.5
  LDNAME_MAJOR = libck.so.0
   LDFLAGS = -Wl,-soname,libck.so.0 -m64  -shared -fPIC
  GZIP = /bin/gzip -c
 CORES = 2
  POINTER_PACK = CK_MD_POINTER_PACK_DISABLE
  VMA_BITS = 48
  MEMORY_MODEL = CK_MD_TSO
   RTM = CK_MD_RTM_DISABLE

Headers will be installed in /usr/local/include
Libraries will be installed in /usr/local/lib
Documentation will be installed in /usr/local/share/man
configure: Build option summary:
CC: ccache cc
CXX:ccache c++
CPP:cc -E
CFLAGS: -g -pipe -Wall -O3 -feliminate-unused-debug-symbols 
-fno-strict-aliasing -Werror -mcx16
CXXFLAGS:-std=c++11 -g -pipe -Wall -O3 
-feliminate-unused-debug-symbols -fno-strict-aliasing -Werror 
-Wno-invalid-offsetof -mcx16
CPPFLAGS:   -Dlinux -D_LARGEFILE64_SOURCE=1 
-D_COMPILE64BIT_SOURCE=1 -D_GNU_SOURCE -D_REENTRANT -D__STDC_LIMIT_MACROS=1 
-D__STDC_FORMAT_MACROS=1 -DOPENSSL_NO_SSL_INTERN -I/usr/include/libxml2
LDFLAGS:
SHARED_CFLAGS:  -fPIC
SHARED_CXXFLAGS:-fPIC
SHARED_CXXLINKFLAGS:
SHARED_LDFLAGS: -shared
OPENSSL_LDFLAGS:
OPENSSL_INCLUDES:   
EXTRA_CC_LDFLAGS:   
EXTRA_CXX_LDFLAGS:  -rdynamic
LIBTOOL_LINK_FLAGS: 


++ make -j5 V=1
Making all in lib/ck
make[1]: Entering directory 
`https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck'
make -C doc all || exit
make[2]: Entering directory 
`https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck/doc'
for target in CK_ARRAY_FOREACH ck_array_buffer ck_array_commit ck_array_deinit 
ck_array_init ck_array_initialized ck_array_length ck_array_put 
ck_array_put_unique ck_array_remove ck_array_deinit ck_brlock ck_ht_count 
ck_ht_destroy ck_ht_gc ck_ht_get_spmc ck_ht_grow_spmc ck_ht_hash 
ck_ht_hash_direct ck_ht_init ck_ht_put_spmc ck_ht_remove_spmc ck_ht_reset_spmc 
ck_ht_reset_size_spmc ck_ht_set_spmc ck_ht_entry_empty ck_ht_entry_key 
ck_ht_entry_key_direct ck_ht_entry_key_length ck_ht_entry_key_set 
ck_ht_entry_key_set_direct ck_ht_entry_set ck_ht_entry_set_direct 
ck_ht_entry_value_direct ck_ht_entry_value ck_ht_iterator_init ck_ht_next 
ck_ht_stat ck_bitmap_init ck_bitmap_reset ck_bitmap_set ck_bitmap_bts 
ck_bitmap_test ck_bitmap_base ck_bitmap_union ck_bitmap_size ck_bitmap_clear 
ck_bitmap_bits ck_bitmap_buffer ck_bitmap_next ck_bitmap_iterator_init ck_elide 
ck_epoch_barrier ck_epoch_begin ck_epoch_call ck_epoch_end ck_epoch_init 
ck_epoch_poll ck_epoch_recycle ck_epoch_register ck_epoch_reclaim 
ck_epoch_synchronize ck_epoch_unregister ck_hs_gc ck_hs_init ck_hs_destroy 
CK_HS_HASH ck_hs_apply ck_hs_iterator_init ck_hs_next ck_hs_get ck_hs_put 
ck_hs_set ck_hs_fas ck_hs_remove ck_hs_move ck_hs_grow ck_hs_rebuild 
ck_hs_count 

[jira] [Commented] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366167#comment-14366167
 ] 

ASF subversion and git services commented on TS-3452:
-

Commit a008a0a80cd9e32e6f45a404ffeb1619eb477fc7 in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=a008a0a ]

TS-3452: Better debug messages for SSL_ERROR_SSL: fixing format string warning


 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Build failed in Jenkins: out_of_tree-master #647

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/out_of_tree-master/647/changes

Changes:

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: fixing format string 
warning

--
[...truncated 627 lines...]
config.status: executing depfiles commands
config.status: executing libtool commands
=== configuring in lib/ck 
(https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck)
configure: running /bin/sh ../../../lib/ck/configure --disable-option-checking 
'--prefix=/usr/local'  '--enable-ccache' '--enable-werror' 
'--enable-experimental-plugins' '--enable-example-plugins' 
'--enable-test-tools' '--enable-reclaimable-freelist' '--enable-wccp' 'CORES=2' 
--cache-file=/dev/null --srcdir=../../../lib/ck
Detecting operating system...success [linux]
Detecting machine architecture...success [x86_64]
Finding dirname command..success [/bin/dirname]
Determining build directory..success 
[https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/lib/ck]
Finding gzip toolsuccess [/bin/gzip]
Finding suitable compilersuccess [/bin/cc]
Detecting VMA bits...success [48]
Checking header file usability...success [stdbool.h]
Checking header file usability...success [stddef.h]
Checking header file usability...success [stdint.h]
Checking header file usability...success [string.h]
Generating header files..success
Generating build files...success

   VERSION = 0.4.5
 BUILD_DIR = 
https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck
   SRC_DIR = 
https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/lib/ck
SYSTEM = linux
   PROFILE = x86_64
CC = /bin/cc
  COMPILER = gcc
CFLAGS = -D_XOPEN_SOURCE=600 -D_BSD_SOURCE -D_DEFAULT_SOURCE 
-std=gnu99 -pedantic -Wall -W -Wundef -Wendif-labels -Wshadow -Wpointer-arith 
-Wcast-align -Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes 
-Wnested-externs -Winline -Wdisabled-optimization -fstrict-aliasing -O2 -pipe 
-Wno-parentheses  -fPIC
PTHREAD_CFLAGS = -pthread
LD = /bin/cc
LDNAME = libck.so
LDNAME_VERSION = libck.so.0.4.5
  LDNAME_MAJOR = libck.so.0
   LDFLAGS = -Wl,-soname,libck.so.0 -m64  -shared -fPIC
  GZIP = /bin/gzip -c
 CORES = 2
  POINTER_PACK = CK_MD_POINTER_PACK_DISABLE
  VMA_BITS = 48
  MEMORY_MODEL = CK_MD_TSO
   RTM = CK_MD_RTM_DISABLE

Headers will be installed in /usr/local/include
Libraries will be installed in /usr/local/lib
Documentation will be installed in /usr/local/share/man
configure: Build option summary:
CC: ccache cc
CXX:ccache c++
CPP:cc -E
CFLAGS: -g -pipe -Wall -O3 -feliminate-unused-debug-symbols 
-fno-strict-aliasing -Werror -mcx16
CXXFLAGS:-std=c++11 -g -pipe -Wall -O3 
-feliminate-unused-debug-symbols -fno-strict-aliasing -Werror 
-Wno-invalid-offsetof -mcx16
CPPFLAGS:   -Dlinux -D_LARGEFILE64_SOURCE=1 
-D_COMPILE64BIT_SOURCE=1 -D_GNU_SOURCE -D_REENTRANT -D__STDC_LIMIT_MACROS=1 
-D__STDC_FORMAT_MACROS=1 -DOPENSSL_NO_SSL_INTERN -I/usr/include/libxml2
LDFLAGS:
SHARED_CFLAGS:  -fPIC
SHARED_CXXFLAGS:-fPIC
SHARED_CXXLINKFLAGS:
SHARED_LDFLAGS: -shared
OPENSSL_LDFLAGS:
OPENSSL_INCLUDES:   
EXTRA_CC_LDFLAGS:   
EXTRA_CXX_LDFLAGS:  -rdynamic
LIBTOOL_LINK_FLAGS: 


++ make -j5 V=1
Making all in lib/ck
make[1]: Entering directory 
`https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck'
make -C doc all || exit
make[2]: Entering directory 
`https://ci.trafficserver.apache.org/job/out_of_tree-master/ws/src/BUILDS/lib/ck/doc'
for target in CK_ARRAY_FOREACH ck_array_buffer ck_array_commit ck_array_deinit 
ck_array_init ck_array_initialized ck_array_length ck_array_put 
ck_array_put_unique ck_array_remove ck_array_deinit ck_brlock ck_ht_count 
ck_ht_destroy ck_ht_gc ck_ht_get_spmc ck_ht_grow_spmc ck_ht_hash 
ck_ht_hash_direct ck_ht_init ck_ht_put_spmc ck_ht_remove_spmc ck_ht_reset_spmc 
ck_ht_reset_size_spmc ck_ht_set_spmc ck_ht_entry_empty ck_ht_entry_key 
ck_ht_entry_key_direct ck_ht_entry_key_length ck_ht_entry_key_set 
ck_ht_entry_key_set_direct ck_ht_entry_set ck_ht_entry_set_direct 
ck_ht_entry_value_direct ck_ht_entry_value ck_ht_iterator_init ck_ht_next 
ck_ht_stat ck_bitmap_init ck_bitmap_reset ck_bitmap_set ck_bitmap_bts 
ck_bitmap_test ck_bitmap_base ck_bitmap_union ck_bitmap_size ck_bitmap_clear 
ck_bitmap_bits ck_bitmap_buffer ck_bitmap_next ck_bitmap_iterator_init ck_elide 
ck_epoch_barrier ck_epoch_begin ck_epoch_call ck_epoch_end ck_epoch_init 
ck_epoch_poll ck_epoch_recycle ck_epoch_register ck_epoch_reclaim 
ck_epoch_synchronize ck_epoch_unregister ck_hs_gc ck_hs_init ck_hs_destroy 
CK_HS_HASH ck_hs_apply 

[jira] [Commented] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366178#comment-14366178
 ] 

ASF subversion and git services commented on TS-3452:
-

Commit 5fcd9d74f20f8b9b3aa8dd361fa4d037676b00ef in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=5fcd9d7 ]

TS-3452: Better debug messages for SSL_ERROR_SSL: incorporate changes suggested 
by sudheer to peek.


 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Jenkins build is back to normal : in_tree-master #804

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/in_tree-master/804/changes



[jira] [Commented] (TS-3451) SSL_ERROR_SSL increases moving from 5.0 to 5.2

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3451?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366143#comment-14366143
 ] 

Brian Geffon commented on TS-3451:
--

On 5.0 we're seeing an error rate of about *0.015%*

{code}
Tue Mar 17 21:36:47 UTC 2015
proxy.process.ssl.ssl_error_ssl=5903229
proxy.process.ssl.total_success_handshake_count=1723736605

Tue Mar 17 21:37:47 UTC 2015
proxy.process.ssl.ssl_error_ssl=5903229
proxy.process.ssl.total_success_handshake_count=1723762651

Tue Mar 17 21:38:47 UTC 2015
proxy.process.ssl.ssl_error_ssl=5903231
proxy.process.ssl.total_success_handshake_count=1723788457

Tue Mar 17 21:39:47 UTC 2015
proxy.process.ssl.ssl_error_ssl=5903231
proxy.process.ssl.total_success_handshake_count=1723813778

Tue Mar 17 21:40:47 UTC 2015
proxy.process.ssl.ssl_error_ssl=5903235
proxy.process.ssl.total_success_handshake_count=1723839761
{code}


On 5.2 we're consistently seeing an error rate of about *0.25%*

{code}
Tue Mar 17 21:29:53 UTC 2015
proxy.process.ssl.ssl_error_ssl=1504
proxy.process.ssl.total_success_handshake_count=355370

Tue Mar 17 21:30:53 UTC 2015
proxy.process.ssl.ssl_error_ssl=1541
proxy.process.ssl.total_success_handshake_count=370410

Tue Mar 17 21:31:53 UTC 2015
proxy.process.ssl.ssl_error_ssl=1580
proxy.process.ssl.total_success_handshake_count=385499

Tue Mar 17 21:32:53 UTC 2015
proxy.process.ssl.ssl_error_ssl=1624
proxy.process.ssl.total_success_handshake_count=400661

Tue Mar 17 21:33:53 UTC 2015
proxy.process.ssl.ssl_error_ssl=1647
proxy.process.ssl.total_success_handshake_count=415756
{code}

 SSL_ERROR_SSL increases moving from 5.0 to 5.2
 --

 Key: TS-3451
 URL: https://issues.apache.org/jira/browse/TS-3451
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: Susan Hinrichs
Assignee: Brian Geffon

 I'm creating a new bug to track the SSL_ERROR_SSL issues that [~briang] is 
 seeing beyond the handshake buffer errors causing the decryption failed or 
 bad record mac messages described in TS-3424.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dzmitry Markovich updated TS-3312:
--
Attachment: keep_alive3.diff

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366124#comment-14366124
 ] 

Brian Geffon commented on TS-3312:
--

[~dmich] Thanks! I'll wait for [~amc] to throw out any last feedback and commit 
it very soon.

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Build failed in Jenkins: in_tree-master #802

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/in_tree-master/802/changes

Changes:

[Leif Hedstrom] Fix indentation.

[Leif Hedstrom] Fix indentation.

[Thomas Jackson] Add tests for connect_attempts within (retries for connection 
to origin)

[Thomas Jackson] Add initial chunked encoding tests

[James Peach] tsqa: add basic regression tests wrapper

[James Peach] tsqa: add build tests for uncommon configuration options

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: update changes

--
[...truncated 655 lines...]
Detecting operating system...success [linux]
Detecting machine architecture...success [x86_64]
Finding dirname command..success [/bin/dirname]
Determining build directory..success 
[https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck]
Finding gzip toolsuccess [/bin/gzip]
Finding suitable compilersuccess [/bin/cc]
Detecting VMA bits...success [48]
Checking header file usability...success [stdbool.h]
Checking header file usability...success [stddef.h]
Checking header file usability...success [stdint.h]
Checking header file usability...success [string.h]
Generating header files..success
Generating build files...success

   VERSION = 0.4.5
 BUILD_DIR = 
https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck
   SRC_DIR = 
https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck
SYSTEM = linux
   PROFILE = x86_64
CC = /bin/cc
  COMPILER = gcc
CFLAGS = -D_XOPEN_SOURCE=600 -D_BSD_SOURCE -D_DEFAULT_SOURCE 
-std=gnu99 -pedantic -Wall -W -Wundef -Wendif-labels -Wshadow -Wpointer-arith 
-Wcast-align -Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes 
-Wnested-externs -Winline -Wdisabled-optimization -fstrict-aliasing -O2 -pipe 
-Wno-parentheses  -fPIC
PTHREAD_CFLAGS = -pthread
LD = /bin/cc
LDNAME = libck.so
LDNAME_VERSION = libck.so.0.4.5
  LDNAME_MAJOR = libck.so.0
   LDFLAGS = -Wl,-soname,libck.so.0 -m64  -shared -fPIC
  GZIP = /bin/gzip -c
 CORES = 2
  POINTER_PACK = CK_MD_POINTER_PACK_DISABLE
  VMA_BITS = 48
  MEMORY_MODEL = CK_MD_TSO
   RTM = CK_MD_RTM_DISABLE

Headers will be installed in /usr/local/include
Libraries will be installed in /usr/local/lib
Documentation will be installed in /usr/local/share/man
configure: Build option summary:
CC: ccache cc
CXX:ccache c++
CPP:cc -E
CFLAGS: -g -pipe -Wall -O3 -feliminate-unused-debug-symbols 
-fno-strict-aliasing -Werror -mcx16
CXXFLAGS:-std=c++11 -g -pipe -Wall -O3 
-feliminate-unused-debug-symbols -fno-strict-aliasing -Werror 
-Wno-invalid-offsetof -mcx16
CPPFLAGS:   -Dlinux -D_LARGEFILE64_SOURCE=1 
-D_COMPILE64BIT_SOURCE=1 -D_GNU_SOURCE -D_REENTRANT -D__STDC_LIMIT_MACROS=1 
-D__STDC_FORMAT_MACROS=1 -DOPENSSL_NO_SSL_INTERN -I/usr/include/libxml2
LDFLAGS:
SHARED_CFLAGS:  -fPIC
SHARED_CXXFLAGS:-fPIC
SHARED_CXXLINKFLAGS:
SHARED_LDFLAGS: -shared
OPENSSL_LDFLAGS:
OPENSSL_INCLUDES:   
EXTRA_CC_LDFLAGS:   
EXTRA_CXX_LDFLAGS:  -rdynamic
LIBTOOL_LINK_FLAGS: 


++ make -j5 V=1
Making all in lib/ck
make[1]: Entering directory 
`https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck'
make -C doc all || exit
make[2]: Entering directory 
`https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck/doc'
for target in CK_ARRAY_FOREACH ck_array_buffer ck_array_commit ck_array_deinit 
ck_array_init ck_array_initialized ck_array_length ck_array_put 
ck_array_put_unique ck_array_remove ck_array_deinit ck_brlock ck_ht_count 
ck_ht_destroy ck_ht_gc ck_ht_get_spmc ck_ht_grow_spmc ck_ht_hash 
ck_ht_hash_direct ck_ht_init ck_ht_put_spmc ck_ht_remove_spmc ck_ht_reset_spmc 
ck_ht_reset_size_spmc ck_ht_set_spmc ck_ht_entry_empty ck_ht_entry_key 
ck_ht_entry_key_direct ck_ht_entry_key_length ck_ht_entry_key_set 
ck_ht_entry_key_set_direct ck_ht_entry_set ck_ht_entry_set_direct 
ck_ht_entry_value_direct ck_ht_entry_value ck_ht_iterator_init ck_ht_next 
ck_ht_stat ck_bitmap_init ck_bitmap_reset ck_bitmap_set ck_bitmap_bts 
ck_bitmap_test ck_bitmap_base ck_bitmap_union ck_bitmap_size ck_bitmap_clear 
ck_bitmap_bits ck_bitmap_buffer ck_bitmap_next ck_bitmap_iterator_init ck_elide 
ck_epoch_barrier ck_epoch_begin ck_epoch_call ck_epoch_end ck_epoch_init 
ck_epoch_poll ck_epoch_recycle ck_epoch_register ck_epoch_reclaim 
ck_epoch_synchronize ck_epoch_unregister ck_hs_gc ck_hs_init ck_hs_destroy 
CK_HS_HASH ck_hs_apply ck_hs_iterator_init ck_hs_next ck_hs_get ck_hs_put 
ck_hs_set ck_hs_fas ck_hs_remove ck_hs_move ck_hs_grow ck_hs_rebuild 
ck_hs_count ck_hs_reset ck_hs_reset_size ck_hs_stat ck_rhs_gc 

[jira] [Updated] (TS-3448) Add an internal Mod to ControlMatcher (a boolean value)

2015-03-17 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3448?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3448:
--
Description: 
This allows, as an example, exclusion of parent.config for requests that are 
internal. Or, different cache.config rules for internal requests. Example usage 
could be
{code}
dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
internal=false
{code}

This would allow this rule to only trigger if the request is not an internal 
(plugin) request.

  was:
This allows, as an example, exclusion of parent.config for requests that are 
internal. Or, different cache.config rules for internal requests. Example usage 
could be
{code}
dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
internal_request=false
{code}

This would allow this rule to only trigger if the request is not an internal 
(plugin) request.


 Add an internal Mod to ControlMatcher (a boolean value)
 -

 Key: TS-3448
 URL: https://issues.apache.org/jira/browse/TS-3448
 Project: Traffic Server
  Issue Type: New Feature
  Components: Configuration, Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This allows, as an example, exclusion of parent.config for requests that are 
 internal. Or, different cache.config rules for internal requests. Example 
 usage could be
 {code}
 dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
 internal=false
 {code}
 This would allow this rule to only trigger if the request is not an internal 
 (plugin) request.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3448) Add an internal Mod to ControlMatcher (a boolean value)

2015-03-17 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3448?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3448:
--
Summary: Add an internal Mod to ControlMatcher (a boolean value)  (was: 
Add an internal_request Mod to ControlMatcher (a boolean value))

 Add an internal Mod to ControlMatcher (a boolean value)
 -

 Key: TS-3448
 URL: https://issues.apache.org/jira/browse/TS-3448
 Project: Traffic Server
  Issue Type: New Feature
  Components: Configuration, Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This allows, as an example, exclusion of parent.config for requests that are 
 internal. Or, different cache.config rules for internal requests. Example 
 usage could be
 {code}
 dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
 internal_request=false
 {code}
 This would allow this rule to only trigger if the request is not an internal 
 (plugin) request.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (TS-3452) Better debug messages for SSL_ERROR_SSL errors

2015-03-17 Thread Brian Geffon (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3452?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brian Geffon resolved TS-3452.
--
Resolution: Fixed

 Better debug messages for SSL_ERROR_SSL errors
 --

 Key: TS-3452
 URL: https://issues.apache.org/jira/browse/TS-3452
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 In the case of SSL_ERROR_SSL we can log better information, I'll drop in a 
 patch to do so.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Build failed in Jenkins: in_tree-master #803

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/in_tree-master/803/changes

Changes:

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: fixing format string 
warning

--
[...truncated 651 lines...]
config.status: executing depfiles commands
config.status: executing libtool commands
=== configuring in lib/ck 
(https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck)
configure: running /bin/sh ./configure --disable-option-checking 
'--prefix=/usr/local'  '--enable-ccache' '--enable-werror' 
'--enable-experimental-plugins' '--enable-example-plugins' 
'--enable-test-tools' '--enable-reclaimable-freelist' '--enable-wccp' 
'--enable-cppapi' 'CORES=2' --cache-file=/dev/null --srcdir=.
Detecting operating system...success [linux]
Detecting machine architecture...success [x86_64]
Finding dirname command..success [/bin/dirname]
Determining build directory..success 
[https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck]
Finding gzip toolsuccess [/bin/gzip]
Finding suitable compilersuccess [/bin/cc]
Detecting VMA bits...success [48]
Checking header file usability...success [stdbool.h]
Checking header file usability...success [stddef.h]
Checking header file usability...success [stdint.h]
Checking header file usability...success [string.h]
Generating header files..success
Generating build files...success

   VERSION = 0.4.5
 BUILD_DIR = 
https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck
   SRC_DIR = 
https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck
SYSTEM = linux
   PROFILE = x86_64
CC = /bin/cc
  COMPILER = gcc
CFLAGS = -D_XOPEN_SOURCE=600 -D_BSD_SOURCE -D_DEFAULT_SOURCE 
-std=gnu99 -pedantic -Wall -W -Wundef -Wendif-labels -Wshadow -Wpointer-arith 
-Wcast-align -Wwrite-strings -Wstrict-prototypes -Wmissing-prototypes 
-Wnested-externs -Winline -Wdisabled-optimization -fstrict-aliasing -O2 -pipe 
-Wno-parentheses  -fPIC
PTHREAD_CFLAGS = -pthread
LD = /bin/cc
LDNAME = libck.so
LDNAME_VERSION = libck.so.0.4.5
  LDNAME_MAJOR = libck.so.0
   LDFLAGS = -Wl,-soname,libck.so.0 -m64  -shared -fPIC
  GZIP = /bin/gzip -c
 CORES = 2
  POINTER_PACK = CK_MD_POINTER_PACK_DISABLE
  VMA_BITS = 48
  MEMORY_MODEL = CK_MD_TSO
   RTM = CK_MD_RTM_DISABLE

Headers will be installed in /usr/local/include
Libraries will be installed in /usr/local/lib
Documentation will be installed in /usr/local/share/man
configure: Build option summary:
CC: ccache cc
CXX:ccache c++
CPP:cc -E
CFLAGS: -g -pipe -Wall -O3 -feliminate-unused-debug-symbols 
-fno-strict-aliasing -Werror -mcx16
CXXFLAGS:-std=c++11 -g -pipe -Wall -O3 
-feliminate-unused-debug-symbols -fno-strict-aliasing -Werror 
-Wno-invalid-offsetof -mcx16
CPPFLAGS:   -Dlinux -D_LARGEFILE64_SOURCE=1 
-D_COMPILE64BIT_SOURCE=1 -D_GNU_SOURCE -D_REENTRANT -D__STDC_LIMIT_MACROS=1 
-D__STDC_FORMAT_MACROS=1 -DOPENSSL_NO_SSL_INTERN -I/usr/include/libxml2
LDFLAGS:
SHARED_CFLAGS:  -fPIC
SHARED_CXXFLAGS:-fPIC
SHARED_CXXLINKFLAGS:
SHARED_LDFLAGS: -shared
OPENSSL_LDFLAGS:
OPENSSL_INCLUDES:   
EXTRA_CC_LDFLAGS:   
EXTRA_CXX_LDFLAGS:  -rdynamic
LIBTOOL_LINK_FLAGS: 


++ make -j5 V=1
Making all in lib/ck
make[1]: Entering directory 
`https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck'
make -C doc all || exit
make[2]: Entering directory 
`https://ci.trafficserver.apache.org/job/in_tree-master/ws/src/lib/ck/doc'
for target in CK_ARRAY_FOREACH ck_array_buffer ck_array_commit ck_array_deinit 
ck_array_init ck_array_initialized ck_array_length ck_array_put 
ck_array_put_unique ck_array_remove ck_array_deinit ck_brlock ck_ht_count 
ck_ht_destroy ck_ht_gc ck_ht_get_spmc ck_ht_grow_spmc ck_ht_hash 
ck_ht_hash_direct ck_ht_init ck_ht_put_spmc ck_ht_remove_spmc ck_ht_reset_spmc 
ck_ht_reset_size_spmc ck_ht_set_spmc ck_ht_entry_empty ck_ht_entry_key 
ck_ht_entry_key_direct ck_ht_entry_key_length ck_ht_entry_key_set 
ck_ht_entry_key_set_direct ck_ht_entry_set ck_ht_entry_set_direct 
ck_ht_entry_value_direct ck_ht_entry_value ck_ht_iterator_init ck_ht_next 
ck_ht_stat ck_bitmap_init ck_bitmap_reset ck_bitmap_set ck_bitmap_bts 
ck_bitmap_test ck_bitmap_base ck_bitmap_union ck_bitmap_size ck_bitmap_clear 
ck_bitmap_bits ck_bitmap_buffer ck_bitmap_next ck_bitmap_iterator_init ck_elide 
ck_epoch_barrier ck_epoch_begin ck_epoch_call ck_epoch_end ck_epoch_init 
ck_epoch_poll ck_epoch_recycle ck_epoch_register ck_epoch_reclaim 
ck_epoch_synchronize ck_epoch_unregister ck_hs_gc ck_hs_init ck_hs_destroy 
CK_HS_HASH ck_hs_apply ck_hs_iterator_init ck_hs_next ck_hs_get ck_hs_put 
ck_hs_set 

[jira] [Commented] (TS-3446) custom logging for Cookie header

2015-03-17 Thread Scott Beardsley (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3446?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14364855#comment-14364855
 ] 

Scott Beardsley commented on TS-3446:
-

I don't see docs for trim here can you elaborate what trim does?:

https://docs.trafficserver.apache.org/en/latest/admin/event-logging-formats.en.html

Do you mean splice? I don't think splice would work since there is no way of 
knowing where the cookie falls in the string. This feature would require 
essentially a split on the semi-colon (and space?) dividing the cookie 
name/value pairs. Here is a good primer on the format:

http://curl.haxx.se/rfc/cookie_spec.html

BTW bonus points if the feature deals with set-cookie  response headers too 
(this is more complex though since you need to deal with scope and expires). 

 custom logging for Cookie header
 

 Key: TS-3446
 URL: https://issues.apache.org/jira/browse/TS-3446
 Project: Traffic Server
  Issue Type: Improvement
  Components: Core
Reporter: Scott Beardsley
Priority: Minor

 I have a use case that requires logging a specific cookie in the UA request. 
 The only way to do this today is to log the entire Cookie request header then 
 parse out the cookie name/value pair that I am interested in after the fact. 
 The problem with that approach is that some cookie data is sensitive and must 
 not exist in logs. Plus logging the entire cookie header is just wasteful. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3448) Add an internal_request Mod to ControlMatcher (a boolean value)

2015-03-17 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3448?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365691#comment-14365691
 ] 

Leif Hedstrom commented on TS-3448:
---

Hmm, ok. We have a mess here already, in header-rewrite, it's called 
INTERNAL-TRANSACTION :/

 Add an internal_request Mod to ControlMatcher (a boolean value)
 -

 Key: TS-3448
 URL: https://issues.apache.org/jira/browse/TS-3448
 Project: Traffic Server
  Issue Type: New Feature
  Components: Configuration, Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This allows, as an example, exclusion of parent.config for requests that are 
 internal. Or, different cache.config rules for internal requests. Example 
 usage could be
 {code}
 dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
 internal_request=false
 {code}
 This would allow this rule to only trigger if the request is not an internal 
 (plugin) request.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3448) Add an internal_request Mod to ControlMatcher (a boolean value)

2015-03-17 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3448?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365597#comment-14365597
 ] 

James Peach commented on TS-3448:
-

Consider naming this {{internal}} to match the {{@internal}} ACL filter for 
{{remap.config}}.

 Add an internal_request Mod to ControlMatcher (a boolean value)
 -

 Key: TS-3448
 URL: https://issues.apache.org/jira/browse/TS-3448
 Project: Traffic Server
  Issue Type: New Feature
  Components: Configuration, Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This allows, as an example, exclusion of parent.config for requests that are 
 internal. Or, different cache.config rules for internal requests. Example 
 usage could be
 {code}
 dest_domain=.  parent=proxy1.example.com:8080; proxy2.example.com:8080 
 internal_request=false
 {code}
 This would allow this rule to only trigger if the request is not an internal 
 (plugin) request.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Alan M. Carroll (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366291#comment-14366291
 ] 

Alan M. Carroll commented on TS-3312:
-

I'm going to rain on this parade because that's just how I roll.

It's unclear to me this bug even exists. What, exactly, is the problem? One is 
resetting the timeout. But that's not a bug, it's a feature, as described in 
the message itself - reseting timeout to maintain minimum number of 
connections, exactly as required by setting the configuration option 
{{origin_min_keep_alive_connections}} to 10. It's done twice because the 
inactivity timeout is set to 30s and we see the resets occuring at 30 and 60 
seconds after being put in the pool. The connection then gets an EOS which 
indicates the origin server shut it down. This occurs 60 seconds after the 
session is put in the pool, again exactly as expected if the origin server has 
a 60 second timeout.

On to poor Dzmitry. The primary issue I see is tieing the inactivity setting to 
releasing the session. This is not the same as ending the transaction. In 
particular the changes around line 4735 are going to happen after the 
transaction has been destroyed and a new one created so any changes made in the 
current transaction should *not* apply to that server session, as it is 
associated almost certainly with a different origin (if not, it would have been 
re-used instead of put in to the pool). So this is simply wrong.

To make any more criticism requires asking what exactly are we trying to do 
here? If it's to propagate settings from a particular HttpSM into the server 
session used by the HttpSM (because those settings may have been changed during 
the HttpSM run based on transaction specific data) then we should do that at 
the end of the HttpSM and not necessarily when it is put in to the pool. After 
all, may we not want that to apply even for the sticky session case noted 
above? So that if no new transaction does show up on the client session, the 
server session times out as indicated by the default or the API supplied value?

What might be simpler and more accurately implement the desired behavior 
(presuming we can even agree on that) is to have a seperate method on 
HttpServerSession that sets the time out and have the HttpSM call that just 
before the place where the server session can be released.

This leads to a related question. If the API is used to change the inactivity 
timeout, when does that take effect? Is the timeout for the server session 
immediately updated? If so then perhaps the HttpSM clean should just call that. 
Otherwise would that be a bug with regard to what is expected to happen?


 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


Build failed in Jenkins: tsqa-master #240

2015-03-17 Thread jenkins
See https://ci.trafficserver.apache.org/job/tsqa-master/240/changes

Changes:

[Leif Hedstrom] Fix indentation.

[Leif Hedstrom] Fix indentation.

[Thomas Jackson] Add tests for connect_attempts within (retries for connection 
to origin)

[Thomas Jackson] Add initial chunked encoding tests

[James Peach] tsqa: add basic regression tests wrapper

[James Peach] tsqa: add build tests for uncommon configuration options

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: update changes

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: fixing format string 
warning

[briang] TS-3452: Better debug messages for SSL_ERROR_SSL: incorporate changes 
suggested by sudheer to peek.

--
[...truncated 13205 lines...]
  10  687  3437.300   51847342/5184734  2211 2211 2211   85458691   
12.90
  10  699  3497.600   51450346/5145034  2254 2254 2254   85242617   
13.90
  10  710  3551.100   50898767/5089876  2285 2285 2285   84195527   
14.90
  10  714  3574.300   51357407/5135740  2292 2292 2292   84902617   
15.90
  10  712  3561.600   51601617/5160161  2274 2274 2273   85056110   
16.90
  10  716  3581.900   50526075/5052607  2287 2287 2287   83110796   
17.90
  10  721  3606.700   50573912/5057391  2307 2307 2307   83476684   
18.90
  10  713  3568.200   50952400/5095240  2292 2292 2292   84172932   
19.90
 con  new ops   1B  lat  bytes/per svrs  new  ops  total   time 
 err
  10  717  3591.300   50668650/5066865  2305 2305 2305   83740316   
20.90
  10  718  3593.500   51665972/5166597  2298 2298 2298   85811687   
21.90
  10  716  3583.400   52792141/5279214  2287 2287 2288   87380246   
22.90
  10  718  3592.700   53794353/5379435  2288 2288 2287   88580979   
23.90
  10  715  3578.800   54077547/5407754  2283 2283 2283   89371928   
24.90
  10  718  3593.600   53629963/5362996  2302 2302 2303   88449400   
25.90
  10  718  3595.500   53641793/5364179  2306 2306 2306   87719395   
26.90
  10  719  3599.000   52740011/5274001  2294 2294 2294   86058604   
27.90
MSG: reloading logging configuration
  10  715  3576.000   52764832/5276483  2280 2280 2279   86082677   
28.90
  10  715  3579.000   54253900/5425390  2296 2296 2297   89013562   
29.90
  10  718  3595.400   54126816/5412681  2307 2307 2307   88905670   
30.90
  10  716  3582.300   54208446/5420844  2289 2289 2289   88919658   
31.90
  10  716  3586.500   53210465/5321046  2296 2296 2296   87544292   
32.90
  10  715  3581.200   53854514/5385451  2293 2293 2293   88474295   
33.90
  10  712  3567.100   54227945/5422794  2289 2289 2288   89268981   
34.90
  10  712  3566.100   53974597/5397459  2293 2293 2293   89265605   
35.90
  10  714  3572.500   53752112/5375211  2304 2304 2303   89185850   
36.90
  10  714  3575.600   52890567/5289056  2306 2306 2306   87658662   
37.90
  10  712  3562.500   53092191/5309219  2294 2294 2294   87684286   
38.90
  10  714  3573.800   53997935/5399793  2297 2297 2297   88552526   
39.90
 con  new ops   1B  lat  bytes/per svrs  new  ops  total   time 
 err
  10  710  3552.800   54327495/5432749  2283 2283 2283   89545373   
40.90
  10  703  3516.500   54297007/5429700  2254 2254 2254   89257816   
41.90
  10  702  3514.600   53820264/5382026  2248 2248 2248   88521005   
42.90
  10  704  3523.300   53726094/5372609  2263 2263 2263   7442   
43.90
  10  707  3536.400   52901774/5290177  2265 2265 2265   88159671   
44.90
  10  707  3537.300   53574871/5357487  2272 2272 2273   89605980   
45.90
  10  710  3555.300   53705594/5370559  2288 2288 2287   89906655   
46.90
  10  714  3577.000   53627035/5362703  2308 2308 2308   89907153   
47.90
  10  711  3558.400   53640576/5364057  2289 2289 2289   89736514   
48.90
  10  714  3574.900   52976810/5297681  2295 2295 2295   88381271   
49.90
  10  714  3574.700   52603167/5260316  2291 2291 2291   87372299   
50.90
  10  716  3585.200   53105360/5310536  2298 2298 2298   87803401   
51.90
  10  717  3587.600   53037589/5303758  2297 2297 2297   87248330   
52.90
  10  720  3606.600   52964924/5296492  2310 2310 2310   87272625   
53.90
  10  717  3590.300   53285833/5328583  2294 2294 2294   87613508   
54.90
  10  714  3573.500   52690281/5269028  2288 2288 2288   86636191   
55.90
  10  713  3568.600   52260624/5226062  2289 2289 2290   85750035   
56.90
  10  713  3570.200   52245520/5224552 

[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365913#comment-14365913
 ] 

Dzmitry Markovich commented on TS-3312:
---

[~briang], could you please take a look? I addressed feedback with previous 
patch.

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive2.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Comment Edited] (TS-3424) SSL error: SSL3_GET_RECORD:decryption failed or bad record mac

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3424?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365956#comment-14365956
 ] 

Brian Geffon edited comment on TS-3424 at 3/17/15 8:10 PM:
---

Ok since [~shinrich] created TS-3451, let's close this guy out with the 
intention of backporting to 5.2.x, sound good? I just don't see the commit in 
the comment history for some reason.


was (Author: briang):
Ok since [~shinrich] created TS-3451, let's close this guy out with the 
intention of backporting to 5.2.x, sound good?

 SSL error: SSL3_GET_RECORD:decryption failed or bad record mac
 --

 Key: TS-3424
 URL: https://issues.apache.org/jira/browse/TS-3424
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: ts-3424-2.diff, ts-3424-3.diff, ts-3424-for-52-2.diff, 
 ts-3424-for-52.diff, ts-3424.diff, undo-handshake-buffer-for-52.diff, 
 undo-handshake-buffer.diff


 Starting with 5.2.x we're seeing SSL_ERROR_SSL type errors in 
 {{ssl_read_from_net}}, when calling OpenSSL's {{ERR_error_string_n}} we see 
 the error is {{1408F119:SSL routines:SSL3_GET_RECORD:decryption failed or bad 
 record mac}}. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Leif Hedstrom (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365977#comment-14365977
 ] 

Leif Hedstrom commented on TS-3312:
---

I wasn't thrilled about the release either, but I'll manage. However, I feel 
strongly that we should use better names in these signatures. For example:

{code}
void releaseSession(HttpServerSession* ss, ink_hrtime inactivity_timeout_in = 
0);
void HttpServerSession::release(ink_hrtime timeout_in);
{code}

If I understand correctly, these are the KA timeouts for the origin 
connections, no? Then the names of these parameters should reflect that, at a 
minimum they should be named _out, but even so, inactivity_timeout_out is very 
confusing since we have another timeout for exactly that (which is *not* the KA 
timeout). I think the prototypes should be something like

{code}
void releaseSession(HttpServerSession* ss, ink_hrtime ka_timeout_out = 0);
void HttpServerSession::release(ink_hrtime ka_timeout_out);
{code}


Maybe it's our naming convention that's confusing, but _in and _out here refers 
to incoming connection vs outgoing connection, not if it's an in or out 
variable.

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive2.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365935#comment-14365935
 ] 

Brian Geffon commented on TS-3312:
--

I'm not thrilled that we have to modify the {{release()}} signature, but I see 
why it's necessary. This looks good to me, if there are no other 
objections/comments/suggestions I'll commit this latest version in the next few 
days.

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive2.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3451) SSL_ERROR_SSL increases moving from 5.0 to 5.2

2015-03-17 Thread Susan Hinrichs (JIRA)
Susan Hinrichs created TS-3451:
--

 Summary: SSL_ERROR_SSL increases moving from 5.0 to 5.2
 Key: TS-3451
 URL: https://issues.apache.org/jira/browse/TS-3451
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: Susan Hinrichs


I'm creating a new bug to track the SSL_ERROR_SSL issues that [~briang] is 
seeing beyond the handshake buffer errors causing the decryption failed or bad 
record mac messages described in TS-3424.





--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3451) SSL_ERROR_SSL increases moving from 5.0 to 5.2

2015-03-17 Thread Brian Geffon (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3451?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brian Geffon reassigned TS-3451:


Assignee: Brian Geffon

 SSL_ERROR_SSL increases moving from 5.0 to 5.2
 --

 Key: TS-3451
 URL: https://issues.apache.org/jira/browse/TS-3451
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: Susan Hinrichs
Assignee: Brian Geffon

 I'm creating a new bug to track the SSL_ERROR_SSL issues that [~briang] is 
 seeing beyond the handshake buffer errors causing the decryption failed or 
 bad record mac messages described in TS-3424.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dzmitry Markovich updated TS-3312:
--
Attachment: (was: keep_alive3.diff)

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dzmitry Markovich updated TS-3312:
--
Attachment: keep_alive3.diff

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3451) SSL_ERROR_SSL increases moving from 5.0 to 5.2

2015-03-17 Thread Susan Hinrichs (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3451?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366006#comment-14366006
 ] 

Susan Hinrichs commented on TS-3451:


Running 5.2 plus the fix from TS-3424 in production with additional debug 
prints to get details of SSL_ERROR_SSL from SSLAccept, I'm seeing a burst of 
1-5 errors about once a minute.

I see mostly the following

* SSL_BYTES_TO_CIPHER_LIST:inappropriate fallback -  This is the most frequent 
message by far in the log.  This seems like a legitimate error.  The server is 
preventing clients from negotiating protocol A and falling back to lower 
protocol B. https://dwradcliffe.com/2014/10/16/testing-tls-fallback.html

* SSL3_GET_CLIENT_HELLO:no shared cipher - The client and server have no 
ciphers in common.  This is quite a believable error. 

* SSL3_GET_CLIENT_HELLO:required cipher missing - This means that on a session 
resume, the client is offering different ciphers than was used when the cipher 
was originally negotiated.  Seems odd.  See a discussion here about having 
android having issues here.  
https://code.google.com/p/android/issues/detail?id=97132

* SSL3_GET_MESSAGE:unexpected message

* SSL3_READ_BYTES:sslv3 alert unexpected message

* SSL3_READ_BYTES:sslv3 alert bad certificate

* SSL3_READ_BYTES:sslv3 alert bad record mac - Perhaps we still have some 
corruption from the handshake?

* SSL3_READ_BYTES:sslv3 alert illegal parameter

* SSL3_READ_BYTES:tlsv1 alert unknown ca

 SSL_ERROR_SSL increases moving from 5.0 to 5.2
 --

 Key: TS-3451
 URL: https://issues.apache.org/jira/browse/TS-3451
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: Susan Hinrichs
Assignee: Brian Geffon

 I'm creating a new bug to track the SSL_ERROR_SSL issues that [~briang] is 
 seeing beyond the handshake buffer errors causing the decryption failed or 
 bad record mac messages described in TS-3424.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3312) KA timeout to origin does not seem to honor configurations

2015-03-17 Thread Dzmitry Markovich (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3312?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Dzmitry Markovich updated TS-3312:
--
Attachment: (was: keep_alive2.diff)

 KA timeout to origin does not seem to honor configurations
 --

 Key: TS-3312
 URL: https://issues.apache.org/jira/browse/TS-3312
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Reporter: Leif Hedstrom
Assignee: Brian Geffon
 Fix For: 5.3.0

 Attachments: keep_alive3.diff


 Doing some basic testing, with the following settings:
 {code}
 CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 120
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 I see ATS timing out the origin sessions after 30sec, with a 
 {code}
 CONFIG proxy.config.http.transaction_no_activity_timeout_out INT 30
 {code}
 What's also interesting, after I made a config change per Geffon's suggestion:
 {code}
 CONFIG proxy.config.http.origin_min_keep_alive_connections INT 10
 {code}
 I see the following in the diagnostic trace:
 {code}
 [Jan 21 14:19:19.416] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] [release 
 session] session placed into shared pool
 [Jan 21 14:19:49.558] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.633] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_bucket] session received io notice [VC_EVENT_INACTIVITY_TIMEOUT], 
 reseting timeout to maintain minimum number of connections
 [Jan 21 14:20:19.670] Server {0x7fb1b4f06880} DEBUG: (http_ss) [0] 
 [session_pool] session 0x1cc5aa0 received io notice [VC_EVENT_EOS]
 {code}
 So, not only is it resetting the timeout twice, it also gets a VC_EVENT_EOS. 
 I first though it was the origin that closed the connection, but from what I 
 could tell, the timeout on the origin was set to 60s.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3451) SSL_ERROR_SSL increases moving from 5.0 to 5.2

2015-03-17 Thread Brian Geffon (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3451?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14366025#comment-14366025
 ] 

Brian Geffon commented on TS-3451:
--

I see mostly the following:

{code}
ERR_get_error=336109835 (error:1408A10B:SSL 
routines:SSL3_GET_CLIENT_HELLO:wrong version number)
ERR_get_error=336109761 (error:1408A0C1:SSL routines:SSL3_GET_CLIENT_HELLO:no 
shared cipher)
ERR_get_error=336204149 (error:140A1175:SSL 
routines:SSL_BYTES_TO_CIPHER_LIST:inappropriate fallback)
ERR_get_error=336027900 (error:140760FC:SSL 
routines:SSL23_GET_CLIENT_HELLO:unknown protocol)
{code}

With wrong version number and inappropriate fallback as the majority of them

 SSL_ERROR_SSL increases moving from 5.0 to 5.2
 --

 Key: TS-3451
 URL: https://issues.apache.org/jira/browse/TS-3451
 Project: Traffic Server
  Issue Type: Bug
  Components: SSL
Reporter: Susan Hinrichs
Assignee: Brian Geffon

 I'm creating a new bug to track the SSL_ERROR_SSL issues that [~briang] is 
 seeing beyond the handshake buffer errors causing the decryption failed or 
 bad record mac messages described in TS-3424.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-2205) AIO caused system hang

2015-03-17 Thread Zhaonanli (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2205?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365053#comment-14365053
 ] 

Zhaonanli commented on TS-2205:
---

hi , arise again, version 4.2.2 

 AIO caused system hang
 --

 Key: TS-2205
 URL: https://issues.apache.org/jira/browse/TS-2205
 Project: Traffic Server
  Issue Type: Bug
  Components: Cache
Affects Versions: 4.0.1
Reporter: Zhao Yongming
Assignee: weijin
Priority: Critical

 the system may hang with AIO thread CPU usage rising:
 {code}
 top - 17:10:46 up 38 days, 22:43,  2 users,  load average: 11.34, 2.97, 2.75
 Tasks: 512 total,  55 running, 457 sleeping,   0 stopped,   0 zombie
 Cpu(s):  6.9%us, 54.8%sy,  0.0%ni, 37.3%id,  0.0%wa,  0.0%hi,  0.9%si,  0.0%st
 Mem:  65963696k total, 64318444k used,  1645252k free,   241496k buffers
 Swap: 33554424k total,20416k used, 33534008k free, 14864188k cached
   PID USER  PR  NI  VIRT  RES  SHR S %CPU %MEMTIME+  COMMAND
 32498 ats   20   0 59.3g  45g  25m R 65.8 72.1  24:44.15 [ET_AIO 5]
  3213 root  20   0 000 S 15.4  0.0  13:38.32 kondemand/7
  3219 root  20   0 000 S 15.1  0.0  16:32.78 kondemand/13
 4 root  20   0 000 S 13.8  0.0  33:18.13 ksoftirqd/0
13 root  20   0 000 S 13.4  0.0  21:45.18 ksoftirqd/2
37 root  20   0 000 S 13.4  0.0  19:42.34 ksoftirqd/8
45 root  20   0 000 S 13.4  0.0  18:31.17 ksoftirqd/10
 32483 ats   20   0 59.3g  45g  25m R 13.4 72.1  16:47.14 [ET_AIO 6]
 32487 ats   20   0 59.3g  45g  25m R 13.4 72.1  16:46.93 [ET_AIO 2]
25 root  20   0 000 S 13.1  0.0  19:02.18 ksoftirqd/5
65 root  20   0 000 S 13.1  0.0  19:24.04 ksoftirqd/15
 32477 ats   20   0 59.3g  45g  25m R 13.1 72.1  16:32.90 [ET_AIO 0]
 32478 ats   20   0 59.3g  45g  25m R 13.1 72.1  16:49.77 [ET_AIO 1]
 32479 ats   20   0 59.3g  45g  25m S 13.1 72.1  16:41.77 [ET_AIO 2]
 32481 ats   20   0 59.3g  45g  25m R 13.1 72.1  16:50.40 [ET_AIO 4]
 32482 ats   20   0 59.3g  45g  25m R 13.1 72.1  16:47.42 [ET_AIO 5]
 32484 ats   20   0 59.3g  45g  25m R 13.1 72.1  16:25.81 [ET_AIO 7]
 32485 ats   20   0 59.3g  45g  25m S 13.1 72.1  16:52.71 [ET_AIO 0]
 32486 ats   20   0 59.3g  45g  25m S 13.1 72.1  16:51.69 [ET_AIO 1]
 32491 ats   20   0 59.3g  45g  25m S 13.1 72.1  16:50.58 [ET_AIO 6]
 32492 ats   20   0 59.3g  45g  25m S 13.1 72.1  16:49.12 [ET_AIO 7]
 32480 ats   20   0 59.3g  45g  25m S 12.8 72.1  16:47.39 [ET_AIO 3]
 32488 ats   20   0 59.3g  45g  25m R 12.8 72.1  16:52.16 [ET_AIO 3]
 32489 ats   20   0 59.3g  45g  25m S 12.8 72.1  16:50.79 [ET_AIO 4]
 32490 ats   20   0 59.3g  45g  25m R 12.8 72.1  16:52.61 [ET_AIO 5]
 {code}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3447) Failing to remap POST requests if buffer_upload plugin is enabled and Host header contains port number

2015-03-17 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3447?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365130#comment-14365130
 ] 

ASF GitHub Bot commented on TS-3447:


Github user SolidWallOfCode commented on a diff in the pull request:

https://github.com/apache/trafficserver/pull/181#discussion_r26573216
  
--- Diff: plugins/experimental/buffer_upload/buffer_upload.cc ---
@@ -753,6 +753,15 @@ attach_pvc_plugin(TSCont /* contp ATS_UNUSED */, 
TSEvent event, void *edata)
 memcpy(replacement_host_str, host_hdr_str_val, 
host_hdr_str_val_len);
 TSDebug(DEBUG_TAG, Adding host to request url: %s, 
replacement_host_str);
 
+const char *colon = strstr(replacement_host_str, :);
--- End diff --

Why {{strstr}} instead of {{strchr}}?


 Failing to remap POST requests if buffer_upload plugin is enabled and Host 
 header contains port number
 --

 Key: TS-3447
 URL: https://issues.apache.org/jira/browse/TS-3447
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 6.0.0


 We've experienced POST request mapping issues in some situation while 
 buffer_upload plugin is enabled.
 After cross reference, we found that Host header with port value cannot be 
 mapped correctly.
 Sample remap.config:
 {quote}
   map http://www.example.com/   http://127.0.0.1:8001/
   map http://www.example.com:8080/  http://127.0.0.1:8001/
 {quote}
 Sample plugin.config
 {quote}
   buffer_upload.so conf/trafficserver/buffer_upload/buffer_upload.config
 {quote}
 Sample buffer_upload.config
 {quote}
   use_disk_buffer 1
   convert_url 0
   chunk_size  1024
   url_list_file   conf/trafficserver/buffer_upload/url_list.config
   base_dirvar/buffer_upload_tmp
   subdir_num  100
   thread_num  10
   mem_buffer_size 51000
 {quote}
 Sample buffer upload url_list.config
 {quote}
   http://www.example.com/upload/upload.php
 {quote}
 Sample cmds  responses
 {quote}
   curl http://www.example.com/test.php -X POST -d 'blah'
map ok
   curl http://www.example.com:8080/test.php
map ok
   curl http://www.example.com:8080/test.php -X POST -d 'blah'
404 Not Found! (Not Found on Accelerator)
 {quote}
 I've tried to correct this and will update with pull request shortly, thanks



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3447) Failing to remap POST requests if buffer_upload plugin is enabled and Host header contains port number

2015-03-17 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3447?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365122#comment-14365122
 ] 

ASF GitHub Bot commented on TS-3447:


Github user SolidWallOfCode commented on a diff in the pull request:

https://github.com/apache/trafficserver/pull/181#discussion_r26573116
  
--- Diff: plugins/experimental/buffer_upload/buffer_upload.cc ---
@@ -753,6 +753,15 @@ attach_pvc_plugin(TSCont /* contp ATS_UNUSED */, 
TSEvent event, void *edata)
 memcpy(replacement_host_str, host_hdr_str_val, 
host_hdr_str_val_len);
 TSDebug(DEBUG_TAG, Adding host to request url: %s, 
replacement_host_str);
 
+const char *colon = strstr(replacement_host_str, :);
+if (colon != NULL  colon + 1 != NULL) {
+  int port_str_val = atoi(colon + 1);
+
+  if (port_str_val != 80) {
+TSUrlPortSet(req_bufp, url_loc, port_str_val);
+  }
+  host_hdr_str_val_len -= strlen(colon);
--- End diff --

Why not {{host_hdr_str_val_len = colon - host_hdr_str_val_len;}} if you 
want to clip at the colon?


 Failing to remap POST requests if buffer_upload plugin is enabled and Host 
 header contains port number
 --

 Key: TS-3447
 URL: https://issues.apache.org/jira/browse/TS-3447
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 6.0.0


 We've experienced POST request mapping issues in some situation while 
 buffer_upload plugin is enabled.
 After cross reference, we found that Host header with port value cannot be 
 mapped correctly.
 Sample remap.config:
 {quote}
   map http://www.example.com/   http://127.0.0.1:8001/
   map http://www.example.com:8080/  http://127.0.0.1:8001/
 {quote}
 Sample plugin.config
 {quote}
   buffer_upload.so conf/trafficserver/buffer_upload/buffer_upload.config
 {quote}
 Sample buffer_upload.config
 {quote}
   use_disk_buffer 1
   convert_url 0
   chunk_size  1024
   url_list_file   conf/trafficserver/buffer_upload/url_list.config
   base_dirvar/buffer_upload_tmp
   subdir_num  100
   thread_num  10
   mem_buffer_size 51000
 {quote}
 Sample buffer upload url_list.config
 {quote}
   http://www.example.com/upload/upload.php
 {quote}
 Sample cmds  responses
 {quote}
   curl http://www.example.com/test.php -X POST -d 'blah'
map ok
   curl http://www.example.com:8080/test.php
map ok
   curl http://www.example.com:8080/test.php -X POST -d 'blah'
404 Not Found! (Not Found on Accelerator)
 {quote}
 I've tried to correct this and will update with pull request shortly, thanks



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3447) Failing to remap POST requests if buffer_upload plugin is enabled and Host header contains port number

2015-03-17 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3447?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365166#comment-14365166
 ] 

ASF GitHub Bot commented on TS-3447:


Github user yzlai commented on a diff in the pull request:

https://github.com/apache/trafficserver/pull/181#discussion_r26576225
  
--- Diff: plugins/experimental/buffer_upload/buffer_upload.cc ---
@@ -753,6 +753,15 @@ attach_pvc_plugin(TSCont /* contp ATS_UNUSED */, 
TSEvent event, void *edata)
 memcpy(replacement_host_str, host_hdr_str_val, 
host_hdr_str_val_len);
 TSDebug(DEBUG_TAG, Adding host to request url: %s, 
replacement_host_str);
 
+const char *colon = strstr(replacement_host_str, :);
--- End diff --

This is copied from 
https://github.com/apache/trafficserver/blob/master/plugins/experimental/buffer_upload/buffer_upload.cc#L633
However, I can use strchr instead ^^a


 Failing to remap POST requests if buffer_upload plugin is enabled and Host 
 header contains port number
 --

 Key: TS-3447
 URL: https://issues.apache.org/jira/browse/TS-3447
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 6.0.0


 We've experienced POST request mapping issues in some situation while 
 buffer_upload plugin is enabled.
 After cross reference, we found that Host header with port value cannot be 
 mapped correctly.
 Sample remap.config:
 {quote}
   map http://www.example.com/   http://127.0.0.1:8001/
   map http://www.example.com:8080/  http://127.0.0.1:8001/
 {quote}
 Sample plugin.config
 {quote}
   buffer_upload.so conf/trafficserver/buffer_upload/buffer_upload.config
 {quote}
 Sample buffer_upload.config
 {quote}
   use_disk_buffer 1
   convert_url 0
   chunk_size  1024
   url_list_file   conf/trafficserver/buffer_upload/url_list.config
   base_dirvar/buffer_upload_tmp
   subdir_num  100
   thread_num  10
   mem_buffer_size 51000
 {quote}
 Sample buffer upload url_list.config
 {quote}
   http://www.example.com/upload/upload.php
 {quote}
 Sample cmds  responses
 {quote}
   curl http://www.example.com/test.php -X POST -d 'blah'
map ok
   curl http://www.example.com:8080/test.php
map ok
   curl http://www.example.com:8080/test.php -X POST -d 'blah'
404 Not Found! (Not Found on Accelerator)
 {quote}
 I've tried to correct this and will update with pull request shortly, thanks



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-1807) shutdown on a write VIO to TSHttpConnect() doesn't propogate

2015-03-17 Thread William Bardwell (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-1807?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

William Bardwell updated TS-1807:
-
Fix Version/s: (was: 5.3.0)
   6.0.0

 shutdown on a write VIO to TSHttpConnect() doesn't propogate
 

 Key: TS-1807
 URL: https://issues.apache.org/jira/browse/TS-1807
 Project: Traffic Server
  Issue Type: Bug
  Components: HTTP
Reporter: William Bardwell
  Labels: review
 Fix For: 6.0.0

 Attachments: TS-1807.diff


 In a plugin I am doing a TSHttpConnect() and then sending HTTP requests and 
 getting responses.  But when I try to do TSVIONBytesSet() and 
 TSVConnShutdown() on the write vio (due to the client side being done sending 
 requests) the write vio just sits there and never wakes up the other side, 
 and the response side doesn't try to close up until an inactivity timeout 
 happens.
 I think that PluginVC::do_io_shutdown() needs to do  
 other_side-read_state.vio.reenable(); when a shutdown for write shows up.  
 Then the otherside wakes up and sees the EOF due to the shutdown.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-1807) shutdown on a write VIO to TSHttpConnect() doesn't propogate

2015-03-17 Thread William Bardwell (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-1807?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365213#comment-14365213
 ] 

William Bardwell commented on TS-1807:
--

Yeah until I can button-hole someone to look at that change and see if it is 
reasonable or an early sign of madness I don't want to check it in.

 shutdown on a write VIO to TSHttpConnect() doesn't propogate
 

 Key: TS-1807
 URL: https://issues.apache.org/jira/browse/TS-1807
 Project: Traffic Server
  Issue Type: Bug
  Components: HTTP
Reporter: William Bardwell
  Labels: review
 Fix For: 6.0.0

 Attachments: TS-1807.diff


 In a plugin I am doing a TSHttpConnect() and then sending HTTP requests and 
 getting responses.  But when I try to do TSVIONBytesSet() and 
 TSVConnShutdown() on the write vio (due to the client side being done sending 
 requests) the write vio just sits there and never wakes up the other side, 
 and the response side doesn't try to close up until an inactivity timeout 
 happens.
 I think that PluginVC::do_io_shutdown() needs to do  
 other_side-read_state.vio.reenable(); when a shutdown for write shows up.  
 Then the otherside wakes up and sees the EOF due to the shutdown.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3447) Failing to remap POST requests if buffer_upload plugin is enabled and Host header contains port number

2015-03-17 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3447?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365485#comment-14365485
 ] 

ASF GitHub Bot commented on TS-3447:


Github user bryancall commented on a diff in the pull request:

https://github.com/apache/trafficserver/pull/181#discussion_r26590946
  
--- Diff: plugins/experimental/buffer_upload/buffer_upload.cc ---
@@ -753,6 +753,15 @@ attach_pvc_plugin(TSCont /* contp ATS_UNUSED */, 
TSEvent event, void *edata)
 memcpy(replacement_host_str, host_hdr_str_val, 
host_hdr_str_val_len);
 TSDebug(DEBUG_TAG, Adding host to request url: %s, 
replacement_host_str);
 
+const char *colon = strchr(replacement_host_str, ':');
+if (colon != NULL  colon + 1 != NULL) {
+  int port_str_val = atoi(colon + 1);
+
+  if (port_str_val != 80) {
--- End diff --

Why only check for port 80 and not 443? Also, you should consider checking 
the scheme.


 Failing to remap POST requests if buffer_upload plugin is enabled and Host 
 header contains port number
 --

 Key: TS-3447
 URL: https://issues.apache.org/jira/browse/TS-3447
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 6.0.0


 We've experienced POST request mapping issues in some situation while 
 buffer_upload plugin is enabled.
 After cross reference, we found that Host header with port value cannot be 
 mapped correctly.
 Sample remap.config:
 {quote}
   map http://www.example.com/   http://127.0.0.1:8001/
   map http://www.example.com:8080/  http://127.0.0.1:8001/
 {quote}
 Sample plugin.config
 {quote}
   buffer_upload.so conf/trafficserver/buffer_upload/buffer_upload.config
 {quote}
 Sample buffer_upload.config
 {quote}
   use_disk_buffer 1
   convert_url 0
   chunk_size  1024
   url_list_file   conf/trafficserver/buffer_upload/url_list.config
   base_dirvar/buffer_upload_tmp
   subdir_num  100
   thread_num  10
   mem_buffer_size 51000
 {quote}
 Sample buffer upload url_list.config
 {quote}
   http://www.example.com/upload/upload.php
 {quote}
 Sample cmds  responses
 {quote}
   curl http://www.example.com/test.php -X POST -d 'blah'
map ok
   curl http://www.example.com:8080/test.php
map ok
   curl http://www.example.com:8080/test.php -X POST -d 'blah'
404 Not Found! (Not Found on Accelerator)
 {quote}
 I've tried to correct this and will update with pull request shortly, thanks



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3447) Failing to remap POST requests if buffer_upload plugin is enabled and Host header contains port number

2015-03-17 Thread ASF GitHub Bot (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3447?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14365491#comment-14365491
 ] 

ASF GitHub Bot commented on TS-3447:


Github user bryancall commented on a diff in the pull request:

https://github.com/apache/trafficserver/pull/181#discussion_r26591169
  
--- Diff: plugins/experimental/buffer_upload/buffer_upload.cc ---
@@ -753,6 +753,15 @@ attach_pvc_plugin(TSCont /* contp ATS_UNUSED */, 
TSEvent event, void *edata)
 memcpy(replacement_host_str, host_hdr_str_val, 
host_hdr_str_val_len);
--- End diff --

Might as well clean up the memset.  You can set 
replacement_host_str[host_hdr_str_val_len + 1] = '\0' after the memcpy instead 
of doing a memset.


 Failing to remap POST requests if buffer_upload plugin is enabled and Host 
 header contains port number
 --

 Key: TS-3447
 URL: https://issues.apache.org/jira/browse/TS-3447
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Ethan Lai
 Fix For: 6.0.0


 We've experienced POST request mapping issues in some situation while 
 buffer_upload plugin is enabled.
 After cross reference, we found that Host header with port value cannot be 
 mapped correctly.
 Sample remap.config:
 {quote}
   map http://www.example.com/   http://127.0.0.1:8001/
   map http://www.example.com:8080/  http://127.0.0.1:8001/
 {quote}
 Sample plugin.config
 {quote}
   buffer_upload.so conf/trafficserver/buffer_upload/buffer_upload.config
 {quote}
 Sample buffer_upload.config
 {quote}
   use_disk_buffer 1
   convert_url 0
   chunk_size  1024
   url_list_file   conf/trafficserver/buffer_upload/url_list.config
   base_dirvar/buffer_upload_tmp
   subdir_num  100
   thread_num  10
   mem_buffer_size 51000
 {quote}
 Sample buffer upload url_list.config
 {quote}
   http://www.example.com/upload/upload.php
 {quote}
 Sample cmds  responses
 {quote}
   curl http://www.example.com/test.php -X POST -d 'blah'
map ok
   curl http://www.example.com:8080/test.php
map ok
   curl http://www.example.com:8080/test.php -X POST -d 'blah'
404 Not Found! (Not Found on Accelerator)
 {quote}
 I've tried to correct this and will update with pull request shortly, thanks



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)