Applied. Another 2.3 point release is pending to fix Ruby 1.9 compatibility.
Best, jeremy On Thu, Sep 10, 2009 at 4:11 PM, Grant Hutchins <[email protected]> wrote: > > Someone else had the same problem and posted a ticket to Lighthouse > with a workaround patch. > > The patch completely fixes our problem. > > https://rails.lighthouseapp.com/projects/8994/tickets/3181-patch-activesupportmultibyteclean-is-very-slow > > On Sep 10, 3:15 pm, Grant Hutchins <[email protected]> > wrote: >> We have applied the XSS vulnerability patch to the Rails 2.2.2 >> codebase and built our own version of the 2.2.2 gems. >> >> When we run with this patched 2.2.2, we are seeing high CPU usage >> which seems to be a direct result of the additional UTF-8 checking. >> Unfortunately it has increased CPU load so much that we are no longer >> able to keep up with the requests coming in. >> >> One idea we've had is to try to minimize the use of tag helpers in our >> application, but that seems like a pretty drastic step to take >> considering that before the patch we had plenty of headroom. The >> increase in CPU load is high enough that it seems like there could be >> room for optimization in this patch. >> >> Has anyone else run into this issue? Does anyone know of a good way to >> improve performance in this area? > > > --~--~---------~--~----~------------~-------~--~----~ You received this message because you are subscribed to the Google Groups "Ruby on Rails: Talk" group. To post to this group, send email to [email protected] To unsubscribe from this group, send email to [email protected] For more options, visit this group at http://groups.google.com/group/rubyonrails-talk?hl=en -~----------~----~----~----~------~----~------~--~---

