This is an automated email from the ASF dual-hosted git repository.

zwoop pushed a commit to branch 7.1.x
in repository https://gitbox.apache.org/repos/asf/trafficserver.git


The following commit(s) were added to refs/heads/7.1.x by this push:
     new b537933  Fix unintialized request_content_length in 
HttpSM::state_read_client_request_header
b537933 is described below

commit b53793376333d3914c3c3093713c2403787490a5
Author: scw00 <[email protected]>
AuthorDate: Mon Jun 12 11:48:38 2017 +0800

    Fix unintialized request_content_length in 
HttpSM::state_read_client_request_header
    
    request_content_length is unintialized in 
HttpSM::state_read_client_request_header.
    So we need to get cl in client_request header.
    
    (cherry picked from commit c652da90bd3dd4f7f2060bf9b0087b5808ec594c)
---
 proxy/http/HttpSM.cc | 3 ++-
 1 file changed, 2 insertions(+), 1 deletion(-)

diff --git a/proxy/http/HttpSM.cc b/proxy/http/HttpSM.cc
index 59483ce..47391e3 100644
--- a/proxy/http/HttpSM.cc
+++ b/proxy/http/HttpSM.cc
@@ -804,7 +804,8 @@ HttpSM::state_read_client_request_header(int event, void 
*data)
     }
 
     if (t_state.hdr_info.client_request.method_get_wksidx() == 
HTTP_WKSIDX_TRACE ||
-        (t_state.hdr_info.request_content_length <= 0 && 
t_state.client_info.transfer_encoding != HttpTransact::CHUNKED_ENCODING)) {
+        (t_state.hdr_info.client_request.get_content_length() == 0 &&
+         t_state.client_info.transfer_encoding != 
HttpTransact::CHUNKED_ENCODING)) {
       // Enable further IO to watch for client aborts
       ua_entry->read_vio->reenable();
     } else {

-- 
To stop receiving notification emails like this one, please contact
['"[email protected]" <[email protected]>'].

Reply via email to