- 18 Oct, 2019 17 commits
-
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
for clients what the _index entry is about.
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
segments dominate the _.index file.
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Pål Hermunn Johansen authored
-
Pål Hermunn Johansen authored
-
- 17 Oct, 2019 3 commits
-
-
Andrew Wiik authored
6233b088 4d8e4b9c c7267466 cda19210 dee47cc4 e34de5c1 a0ad9025 54be487b 1dc891a5 0582753d 78694521 3c04f5c7 f2357c88 740ee39c cb1b5899 458306fa 0e32f166 9e1e0972 a82d8552 4bbf6df6 d8421dcd 3c8ecb4c a0b8a734 8c5118d1 3d170c0d d869640b 1506c5cf 5ecbde38 e1a1fdc7 64c0e1ae 93e6dd70 f3e9ca6a 07ad2fb8Co-authored-by:
Dag Haavi Finstad <daghf@varnish-software.com> Co-authored-by:
Dridi Boukelmoune <dridi.boukelmoune@gmail.com> Co-authored-by:
Federico G. Schwindt <fgsch@lodoss.net> Co-authored-by:
Nils Goroll <nils.goroll@uplex.de> Co-authored-by:
Poul-Henning Kamp <phk@FreeBSD.org> Co-authored-by:
Shohei Tanaka(@xcir) <kokoniimasu+git@gmail.com>
-
Andrew Wiik authored
0ad32622Co-authored-by:
Poul-Henning Kamp <phk@FreeBSD.org>
-
Andrew Wiik authored
b23dddd3Co-authored-by:
Guillaume Quintard <guillaume@varnish-software.com>
-
- 07 Oct, 2019 1 commit
-
-
Andrew Wiik authored
This makes waitinglist rushes happen also in HSH_Lookup when encountering cache hits. This helps to get the requests on the waitinglist restarted when doing streaming delivery. Fixes #2977. Backported from @mbgrydeland master commits. Based on: 37368496
-
- 02 Oct, 2019 1 commit
-
-
Nils Goroll authored
93d80501 made execution of ban_lurker_test_ban() conditional on bd != b, which effectively caused objects hanging off bans below request bans to not get tested against relevant bans. Because object bans (from the obans list) are being marked completed, the objects which were skipped would also be missed to get evaluated against the relevant bans at lookup time unless they were evaluated in request context. So, in effect, we would simply miss to test bans. Fixes #3007 Maybe related to #3006
-
- 27 Aug, 2019 10 commits
-
-
Martin Blix Grydeland authored
-
Martin Blix Grydeland authored
-
Martin Blix Grydeland authored
-
Martin Blix Grydeland authored
When clearing the [CR]LF in a line continuation, we would continue replacing any [CR|LF|HT|SP] characters up until the end of the buffer, possibly overwriting later [CR]LFs. Fix this by only unconditionally overwrite one [CR]LF, and then only replace [HT|SP] with SP to keep with previous behaviour. Update r00494.vtc to include multiple line continuations to make sure they are parsed.
-
Martin Blix Grydeland authored
The end of http1_dissect_hdrs ends with skipping over the final [CR]LF that marks then end of the headers. Currently that skip is optional, that is, it is skipped if it was present. This patch adds an assert if the final [CR]LF is not found when finishing the parsing. HTTP1_Complete guarantees that it is there, if not we would not have started parsing the request or response in the first place, and if it is missing, there must be an error in the parsing leading up to it.
-
Martin Blix Grydeland authored
In http1_splitline, if the third field is missing, we would still set the txt.b value to where the field would have been, with a NULL txt.e entry. This would cause http_Proto to attempt to parse the values there. Fix this by only setting the .b and .e if the third field was present.
-
Martin Blix Grydeland authored
When parsing a request like this, "GET /\n\n", the first NL would be overwritten by nul guard inserted after the 2nd field, and the second NL would be overwritten by the nul guard after the missing 3rd field. This would cause http1_dissect_hdrs to attempt to decode the body as headers.
-
Martin Blix Grydeland authored
The proto field is optional in HTTP, so it may not be set. Set the proto to 0 also for a NULL value instead of segfaulting if it were NULL.
-
Alf-André Walla authored
The macros vct_iscrlf() and vct_skipcrlf() may look at one or two bytes after its pointer value, causing OOB reads. This would allow http1_dissect_hdrs to wrongly see a CRLF when one wasn't there (the last LF left over in the bufer from the previous request). Change the macros to inline functions, and harden them by always sending the end pointer so that they can't overflow. vct_iscrlf() will return an int value of 0 for no [CR]LF, 1 for LF and 2 for CRLF. vct_skipcrlf() will return the pointer having been skipped 0, 1 or 2 bytes.
-
Martin Blix Grydeland authored
-
- 10 Jul, 2019 8 commits
-
-
Poul-Henning Kamp authored
-
Dridi Boukelmoune authored
-
Nils Goroll authored
Encoding and decoding are as much a function as handling blobs, in particular with transcode().
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Poul-Henning Kamp authored
-
Geoff Simmons authored
Closes #2870 Conflicts: include/tbl/vsl_tags.h We can use the NOSUP_NOTICE instead.
-
Poul-Henning Kamp authored
-