[jira] [Created] (TS-3329) ATS shouldn't start if SSL is configured and certificate can't be loaded

2015-01-27 Thread kang li (JIRA)
kang li created TS-3329:
---

 Summary: ATS shouldn't start if SSL is configured and certificate 
can't be loaded
 Key: TS-3329
 URL: https://issues.apache.org/jira/browse/TS-3329
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: kang li


requirement by [~dcarlin]:
{quote}
It seems ATS will start up even if the certificate file isn't present.

ATS settings in records.config:

CONFIG proxy.config.ssl.server.cert_chain.filename STRING digicert.pem
CONFIG proxy.config.ssl.server.cert.path STRING conf/yts/ssl

ATS settings in ssl_multicert.config:

dest_ip=* ssl_cert_name=ycpi_ssl_cert.pem

What happened was that this volume /home/y/conf/yts/ssl wasn't mounted - so the
SSL cert and chain cert were inaccessible.   ATS started anyways just returning
errors on 443. Healthchecks were served on port 80 via HTTP, so it appeared to 
that the site was OK. 
{quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3329) ATS shouldn't start if SSL is configured and certificate can't be loaded

2015-01-27 Thread Susan Hinrichs (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3329?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Susan Hinrichs updated TS-3329:
---
Assignee: kang li

 ATS shouldn't start if SSL is configured and certificate can't be loaded
 

 Key: TS-3329
 URL: https://issues.apache.org/jira/browse/TS-3329
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: kang li
Assignee: kang li
 Attachments: patch.diff


 requirement by [~dcarlin]:
 {quote}
 It seems ATS will start up even if the certificate file isn't present.
 ATS settings in records.config:
 CONFIG proxy.config.ssl.server.cert_chain.filename STRING digicert.pem
 CONFIG proxy.config.ssl.server.cert.path STRING conf/yts/ssl
 ATS settings in ssl_multicert.config:
 dest_ip=* ssl_cert_name=ycpi_ssl_cert.pem
 What happened was that this volume /home/y/conf/yts/ssl wasn't mounted - so 
 the
 SSL cert and chain cert were inaccessible.   ATS started anyways just 
 returning
 errors on 443. Healthchecks were served on port 80 via HTTP, so it appeared 
 to that the site was OK. 
 {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3329) ATS shouldn't start if SSL is configured and certificate can't be loaded

2015-01-27 Thread kang li (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3329?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

kang li updated TS-3329:

Attachment: patch.diff

Just exit when ATS load SSL certificate failure.

 ATS shouldn't start if SSL is configured and certificate can't be loaded
 

 Key: TS-3329
 URL: https://issues.apache.org/jira/browse/TS-3329
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: kang li
 Attachments: patch.diff


 requirement by [~dcarlin]:
 {quote}
 It seems ATS will start up even if the certificate file isn't present.
 ATS settings in records.config:
 CONFIG proxy.config.ssl.server.cert_chain.filename STRING digicert.pem
 CONFIG proxy.config.ssl.server.cert.path STRING conf/yts/ssl
 ATS settings in ssl_multicert.config:
 dest_ip=* ssl_cert_name=ycpi_ssl_cert.pem
 What happened was that this volume /home/y/conf/yts/ssl wasn't mounted - so 
 the
 SSL cert and chain cert were inaccessible.   ATS started anyways just 
 returning
 errors on 443. Healthchecks were served on port 80 via HTTP, so it appeared 
 to that the site was OK. 
 {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3119) Add option to support SO_LINGER to origin server

2015-01-27 Thread Bryan Call (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3119?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293903#comment-14293903
 ] 

Bryan Call commented on TS-3119:


Git commit history:

commit e5069f1b6249bcd62f5bf1a425ed16926ac2bbba
Author: Kang Li kan...@yahoo-inc.com
Date:   Wed Oct 29 17:04:03 2014 -0700

TS-3119: add SO_LINGER socket option support

The timeout should be 0 if we turn on SO_LINGER option as we are
using non-blocking socket. I have tried a non-zero timeout, but the
setsockopt failed.

If we add a new sock option
  static unit32_t const SOCK_OPT_LINGER_ON = 4;

Then we could configure
  proxy.config.net.sock_option_flag_in
  proxy.config.net.sock_option_flag_out

to make client connection or server connection LINGER for 0 ms if
needed.

 Add option to support SO_LINGER to origin server
 

 Key: TS-3119
 URL: https://issues.apache.org/jira/browse/TS-3119
 Project: Traffic Server
  Issue Type: New Feature
  Components: Network
Reporter: kang li
Assignee: James Peach
 Fix For: 5.2.0

 Attachments: add_so_linger_as_option.diff, linger.diff


 When install ATS and apache in the same box to do SSL termination. We saw 
 port exhaustion, performance drop and request missing through ATS. 
 Before migration we are using stunnel to do SSL termination. There were no 
 such problem. After investigation we found add SO_LINGER option to origin 
 could resolve these problem. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3119) Add option to support SO_LINGER to origin server

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3119?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293901#comment-14293901
 ] 

ASF subversion and git services commented on TS-3119:
-

Commit a465af20e24029cf42b69a6f2d1479805543552a in trafficserver's branch 
refs/heads/master from [~bcall]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=a465af2 ]

TS-3119: Added documentation for SO_LINGER


 Add option to support SO_LINGER to origin server
 

 Key: TS-3119
 URL: https://issues.apache.org/jira/browse/TS-3119
 Project: Traffic Server
  Issue Type: New Feature
  Components: Network
Reporter: kang li
Assignee: James Peach
 Fix For: 5.2.0

 Attachments: add_so_linger_as_option.diff, linger.diff


 When install ATS and apache in the same box to do SSL termination. We saw 
 port exhaustion, performance drop and request missing through ATS. 
 Before migration we are using stunnel to do SSL termination. There were no 
 such problem. After investigation we found add SO_LINGER option to origin 
 could resolve these problem. 



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3330) Several broken stats

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3330?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294018#comment-14294018
 ] 

ASF subversion and git services commented on TS-3330:
-

Commit 30606a9106b15132c04744e0d268b040e444cead in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=30606a9 ]

TS-3330: update changes


 Several broken stats
 

 Key: TS-3330
 URL: https://issues.apache.org/jira/browse/TS-3330
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 We found that a few stats aren't properly incremented, patch incoming.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3330) Several broken stats

2015-01-27 Thread Brian Geffon (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3330?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brian Geffon updated TS-3330:
-
Fix Version/s: 5.3.0

 Several broken stats
 

 Key: TS-3330
 URL: https://issues.apache.org/jira/browse/TS-3330
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP, SSL
Reporter: Brian Geffon
 Fix For: 5.3.0


 We found that a few stats aren't properly incremented, patch incoming.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3330) Several broken stats

2015-01-27 Thread Brian Geffon (JIRA)
Brian Geffon created TS-3330:


 Summary: Several broken stats
 Key: TS-3330
 URL: https://issues.apache.org/jira/browse/TS-3330
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP, SSL
Reporter: Brian Geffon


We found that a few stats aren't properly incremented, patch incoming.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3326) proxy.config.http.send_http11_requests not applied when hostdb lookup is not performed

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3326?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294007#comment-14294007
 ] 

ASF subversion and git services commented on TS-3326:
-

Commit 9a9c4519e3442febf9e160683fa69b6970d9a67b in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=9a9c451 ]

TS-3326 Better comments, and make the default in release builds be the same as 
our default configuration


 proxy.config.http.send_http11_requests not applied when hostdb lookup is not 
 performed
 --

 Key: TS-3326
 URL: https://issues.apache.org/jira/browse/TS-3326
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Affects Versions: 5.2.0
Reporter: Sudheer Vinukonda
Assignee: Sudheer Vinukonda
 Fix For: 5.3.0


 The setting {{proxy.config.http.send_http11_requests}} determines what http 
 version is used in sending outgoing requests. However, this setting is not 
 applied when dns/hostdb lookup is skipped (for e.g, when using the TS API 
 {{TSHttpTxnServerAddrSet}}). This causes problems since the default version 
 in the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
 change the default to an invalid value (e.g 0.0) in 6.0 and TS-3328 that 
 tracks the need for a new/modified TS API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3326) proxy.config.http.send_http11_requests not applied when hostdb lookup is not performed

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3326?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294009#comment-14294009
 ] 

ASF subversion and git services commented on TS-3326:
-

Commit 37f0fd013a45d5f5e56535d307122f55aaaf0c81 in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=37f0fd0 ]

TS-3326 Slightly better comment


 proxy.config.http.send_http11_requests not applied when hostdb lookup is not 
 performed
 --

 Key: TS-3326
 URL: https://issues.apache.org/jira/browse/TS-3326
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Affects Versions: 5.2.0
Reporter: Sudheer Vinukonda
Assignee: Sudheer Vinukonda
 Fix For: 5.3.0


 The setting {{proxy.config.http.send_http11_requests}} determines what http 
 version is used in sending outgoing requests. However, this setting is not 
 applied when dns/hostdb lookup is skipped (for e.g, when using the TS API 
 {{TSHttpTxnServerAddrSet}}). This causes problems since the default version 
 in the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
 change the default to an invalid value (e.g 0.0) in 6.0 and TS-3328 that 
 tracks the need for a new/modified TS API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3330) Several broken stats

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3330?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294017#comment-14294017
 ] 

ASF subversion and git services commented on TS-3330:
-

Commit bf213732cf98ccf1b53750e3fdc57230144c1e41 in trafficserver's branch 
refs/heads/master from [~briang]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=bf21373 ]

TS-3330: Several broken stats


 Several broken stats
 

 Key: TS-3330
 URL: https://issues.apache.org/jira/browse/TS-3330
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 We found that a few stats aren't properly incremented, patch incoming.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-2480) Choose the address related SSL_CTX for session ticket callback

2015-01-27 Thread Susan Hinrichs (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-2480?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294173#comment-14294173
 ] 

Susan Hinrichs commented on TS-2480:


The issue is that information about the connections should not be keyed by the 
SSL_CTX, because the SSL_CTX might change later. 

It looks like Wei Sun was adding indirection in his patch.  In implementing 
TS-3006, we also changed the lookup structure point to a data structure that 
includes the SSL_CTX rather than the SSL_CTX directly.  This means we can add 
other data like whether the object should be blind tunneled.  We could also add 
the ticket information here.  Rather than pulling up the key information by 
indexing via a SSL_CTX that might have changed, we can pull up the key 
information by IP address which should be consistent

I assume that the ticket information can only be specified by IP address in the 
SSL_multicert file.  Since the ticket callback could be processed before the 
SNI callback, it doesn't seem that you would always have access to the server 
name at this point.



 Choose the address related SSL_CTX for session ticket callback
 --

 Key: TS-2480
 URL: https://issues.apache.org/jira/browse/TS-2480
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: Wei Sun
Assignee: Susan Hinrichs
  Labels: review
 Fix For: 5.3.0

 Attachments: TS-2480.diff


 When the dest_ip in ssl_multicert.config is not '*', the default SSL_CTX 
 retrieved from the request when presenting session ticket or session id is 
 not associated with any app data (certs, settings, etc), ats delays the 
 association in SNI handling. So in the callback of 
 SSL_CTX_set_tlsext_ticket_key_cb or SSL_CTX_sess_set_get_cb, it won't get the 
 expected SSL_CTX, and session ticket handling will be degraded to the default 
 behavior.
 I have a requirement of retrieving SSL_CTX during these two callback 
 functions, probably I could workaround it by 
 SSLCertificateConfig::acquire()-findInfoInHash(ip) in every callback and get 
 the expected SSL_CTX. I'm wondering is it feasible to do it once in 
 make_ssl_connection()?  Is there any design consideration for being this 
 (delay to overwrite the SSL_CTX in SNI handling)? I have a small patch if it 
 is needed.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Work started] (TS-2480) Choose the address related SSL_CTX for session ticket callback

2015-01-27 Thread Susan Hinrichs (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-2480?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Work on TS-2480 started by Susan Hinrichs.
--
 Choose the address related SSL_CTX for session ticket callback
 --

 Key: TS-2480
 URL: https://issues.apache.org/jira/browse/TS-2480
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: Wei Sun
Assignee: Susan Hinrichs
  Labels: review
 Fix For: 5.3.0

 Attachments: TS-2480.diff


 When the dest_ip in ssl_multicert.config is not '*', the default SSL_CTX 
 retrieved from the request when presenting session ticket or session id is 
 not associated with any app data (certs, settings, etc), ats delays the 
 association in SNI handling. So in the callback of 
 SSL_CTX_set_tlsext_ticket_key_cb or SSL_CTX_sess_set_get_cb, it won't get the 
 expected SSL_CTX, and session ticket handling will be degraded to the default 
 behavior.
 I have a requirement of retrieving SSL_CTX during these two callback 
 functions, probably I could workaround it by 
 SSLCertificateConfig::acquire()-findInfoInHash(ip) in every callback and get 
 the expected SSL_CTX. I'm wondering is it feasible to do it once in 
 make_ssl_connection()?  Is there any design consideration for being this 
 (delay to overwrite the SSL_CTX in SNI handling)? I have a small patch if it 
 is needed.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3287) Coverity fixes for v5.3.0 by zwoop

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3287?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294290#comment-14294290
 ] 

ASF subversion and git services commented on TS-3287:
-

Commit 5893c89ddc51d07c782253c7802073784a1ce7c9 in trafficserver's branch 
refs/heads/master from [~jpe...@apache.org]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=5893c89 ]

TS-3287: fix broken HdrTest data

Coverity CID #1196441


 Coverity fixes for v5.3.0 by zwoop
 --

 Key: TS-3287
 URL: https://issues.apache.org/jira/browse/TS-3287
 Project: Traffic Server
  Issue Type: Bug
  Components: Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This is my JIRA for Coverity commits for v5.3.0.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3331) negative responses cached even when headers indicate otherwise

2015-01-27 Thread William Bardwell (JIRA)
William Bardwell created TS-3331:


 Summary: negative responses cached even when headers indicate 
otherwise
 Key: TS-3331
 URL: https://issues.apache.org/jira/browse/TS-3331
 Project: Traffic Server
  Issue Type: Bug
  Components: Core
Reporter: William Bardwell


Negative type status codes get cached even when there are Cache-Control: 
no-store or the like headers and positive caching would be paying attention to 
that.  So the fix is to apply response headers (and general caching config) to 
negative caching choices too.
My patch might fix [TS-2633] 406 negative responses being cached for too long




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (TS-3326) proxy.config.http.send_http11_requests not applied when hostdb lookup is not performed

2015-01-27 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3326?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda resolved TS-3326.
---
Resolution: Fixed

 proxy.config.http.send_http11_requests not applied when hostdb lookup is not 
 performed
 --

 Key: TS-3326
 URL: https://issues.apache.org/jira/browse/TS-3326
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Affects Versions: 5.2.0
Reporter: Sudheer Vinukonda
Assignee: Sudheer Vinukonda
 Fix For: 5.3.0


 The setting {{proxy.config.http.send_http11_requests}} determines what http 
 version is used in sending outgoing requests. However, this setting is not 
 applied when dns/hostdb lookup is skipped (for e.g, when using the TS API 
 {{TSHttpTxnServerAddrSet}}). This causes problems since the default version 
 in the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
 change the default to an invalid value (e.g 0.0) in 6.0 and TS-3328 that 
 tracks the need for a new/modified TS API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3331) negative responses cached even when headers indicate otherwise

2015-01-27 Thread William Bardwell (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3331?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

William Bardwell updated TS-3331:
-
Fix Version/s: 5.3.0

 negative responses cached even when headers indicate otherwise
 --

 Key: TS-3331
 URL: https://issues.apache.org/jira/browse/TS-3331
 Project: Traffic Server
  Issue Type: Bug
  Components: Core
Reporter: William Bardwell
Assignee: William Bardwell
 Fix For: 5.3.0


 Negative type status codes get cached even when there are Cache-Control: 
 no-store or the like headers and positive caching would be paying attention 
 to that.  So the fix is to apply response headers (and general caching 
 config) to negative caching choices too.
 My patch might fix [TS-2633] 406 negative responses being cached for too long



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Closed] (TS-3323) Cache scan will stop early if any empty volumes

2015-01-27 Thread William Bardwell (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3323?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

William Bardwell closed TS-3323.

Resolution: Fixed

 Cache scan will stop early if any empty volumes
 ---

 Key: TS-3323
 URL: https://issues.apache.org/jira/browse/TS-3323
 Project: Traffic Server
  Issue Type: Bug
  Components: Cache
Reporter: William Bardwell
Assignee: William Bardwell
 Fix For: 5.3.0


 Cache scans will stop early if there are any volumes with nothing in them (no 
 directory entries.)  It needs to just skip to the next volume.
 (Also the optimizations to the scanning are not strict enough about what is a 
 valid directory entry.)



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3333) TOS settings do not apply to IPv6 connections

2015-01-27 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber reassigned TS-:
---

Assignee: Phil Sorber

 TOS settings do not apply to IPv6 connections
 -

 Key: TS-
 URL: https://issues.apache.org/jira/browse/TS-
 Project: Traffic Server
  Issue Type: Bug
  Components: Network
Reporter: Phil Sorber
Assignee: Phil Sorber

 TOS settings only take effect when dealing with IPv4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-153) Dynamic keep-alive timeouts

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-153?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294308#comment-14294308
 ] 

ASF subversion and git services commented on TS-153:


Commit c53eb2e011b271db672c299b8fa4049be210ce4b in trafficserver's branch 
refs/heads/master from [~bcall]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=c53eb2e ]

TS-153: Fixed typo on method name


 Dynamic keep-alive timeouts
 -

 Key: TS-153
 URL: https://issues.apache.org/jira/browse/TS-153
 Project: Traffic Server
  Issue Type: New Feature
  Components: Core
Reporter: Leif Hedstrom
Assignee: Bryan Call
Priority: Minor
  Labels: A
 Fix For: 5.3.0

 Attachments: ts153.diff


 (This is from a Y! Bugzilla ticket 1821593, adding it here. . Originally 
 posted by Leif Hedstrom on 2008-03-19):
 Currently you have to set static keep-alive idle timeouts in TS, e.g.
CONFIG proxy.config.http.keep_alive_no_activity_timeout_in INT 8
CONFIG proxy.config.http.keep_alive_no_activity_timeout_out INT 30
 even with epoll() in 1.17.x, this is difficult to configure, and put an 
 appropriate timeout. The key here is that the
 settings above need to assure that you stay below the max configured number 
 of connections, e.g.:
 CONFIG proxy.config.net.connections_throttle INT 75000
 I'm suggesting that we add one (or two) new configuration options, and 
 appropriate TS code support, to instead of
 specifying timeouts, we specify connection limits for idle KA connections. 
 For example:
 CONFIG proxy.config.http.keep_alive_max_idle_connections_in INT 5
 CONFIG proxy.config.http_keep_alive_max_idle_connections_out INT 5000
 (one still has to be careful to leave head-room for active connections here, 
 in the example above, 2 connections
 could be active, which is a lot of traffic).
 These would override the idle timeouts, so one could use the max_idle 
 connections for incoming (client) connections,
 and the idle timeouts for outgoing (origin) connections for instance.
 The benefit here is that it makes configuration not only easier, but also a 
 lot safer for many applications.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Resolved] (TS-3330) Several broken stats

2015-01-27 Thread Brian Geffon (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3330?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Brian Geffon resolved TS-3330.
--
Resolution: Fixed

 Several broken stats
 

 Key: TS-3330
 URL: https://issues.apache.org/jira/browse/TS-3330
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP, SSL
Reporter: Brian Geffon
Assignee: Brian Geffon
 Fix For: 5.3.0


 We found that a few stats aren't properly incremented, patch incoming.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3332) header_rewrite set-conn-dscp does not work in remap

2015-01-27 Thread Phil Sorber (JIRA)
Phil Sorber created TS-3332:
---

 Summary: header_rewrite set-conn-dscp does not work in remap
 Key: TS-3332
 URL: https://issues.apache.org/jira/browse/TS-3332
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Phil Sorber


the set-conn-dscp operator only works in global plugins and not in remap ones.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3333) TOS settings do not apply to IPv6 connections

2015-01-27 Thread Phil Sorber (JIRA)
Phil Sorber created TS-:
---

 Summary: TOS settings do not apply to IPv6 connections
 Key: TS-
 URL: https://issues.apache.org/jira/browse/TS-
 Project: Traffic Server
  Issue Type: Bug
  Components: Network
Reporter: Phil Sorber


TOS settings only take effect when dealing with IPv4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3333) TOS settings do not apply to IPv6 connections

2015-01-27 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-:

Fix Version/s: 5.3.0

 TOS settings do not apply to IPv6 connections
 -

 Key: TS-
 URL: https://issues.apache.org/jira/browse/TS-
 Project: Traffic Server
  Issue Type: Bug
  Components: Network
Reporter: Phil Sorber
Assignee: Phil Sorber
 Fix For: 5.3.0


 TOS settings only take effect when dealing with IPv4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Assigned] (TS-3332) header_rewrite set-conn-dscp does not work in remap

2015-01-27 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3332?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber reassigned TS-3332:
---

Assignee: Phil Sorber

 header_rewrite set-conn-dscp does not work in remap
 ---

 Key: TS-3332
 URL: https://issues.apache.org/jira/browse/TS-3332
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Phil Sorber
Assignee: Phil Sorber

 the set-conn-dscp operator only works in global plugins and not in remap ones.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3333) TOS settings do not apply to IPv6 connections

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294440#comment-14294440
 ] 

ASF subversion and git services commented on TS-:
-

Commit 6ef00b89a65ed876e0abf07ec0fd32d0fac7eda2 in trafficserver's branch 
refs/heads/master from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=6ef00b8 ]

TS-: Enable TOS settings on IPv6 connections


 TOS settings do not apply to IPv6 connections
 -

 Key: TS-
 URL: https://issues.apache.org/jira/browse/TS-
 Project: Traffic Server
  Issue Type: Bug
  Components: Network
Reporter: Phil Sorber
Assignee: Phil Sorber

 TOS settings only take effect when dealing with IPv4



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3332) header_rewrite set-conn-dscp does not work in remap

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3332?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14294439#comment-14294439
 ] 

ASF subversion and git services commented on TS-3332:
-

Commit 138269ee2f585de819a3924d30d42508a0513cb2 in trafficserver's branch 
refs/heads/master from [~psudaemon]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=138269e ]

TS-3332: Allow set-conn-dscp to work in remap


 header_rewrite set-conn-dscp does not work in remap
 ---

 Key: TS-3332
 URL: https://issues.apache.org/jira/browse/TS-3332
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Phil Sorber
Assignee: Phil Sorber

 the set-conn-dscp operator only works in global plugins and not in remap ones.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3332) header_rewrite set-conn-dscp does not work in remap

2015-01-27 Thread Phil Sorber (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3332?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Phil Sorber updated TS-3332:

Fix Version/s: 5.3.0

 header_rewrite set-conn-dscp does not work in remap
 ---

 Key: TS-3332
 URL: https://issues.apache.org/jira/browse/TS-3332
 Project: Traffic Server
  Issue Type: Bug
  Components: Plugins
Reporter: Phil Sorber
Assignee: Phil Sorber
 Fix For: 5.3.0


 the set-conn-dscp operator only works in global plugins and not in remap ones.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3287) Coverity fixes for v5.3.0 by zwoop

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3287?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293725#comment-14293725
 ] 

ASF subversion and git services commented on TS-3287:
-

Commit e3c7e1aa586c672fc014478b8c79b99528cc57ba in trafficserver's branch 
refs/heads/master from [~zwoop]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=e3c7e1a ]

TS-3287 Remove some more dead code, this should eventually die completely


 Coverity fixes for v5.3.0 by zwoop
 --

 Key: TS-3287
 URL: https://issues.apache.org/jira/browse/TS-3287
 Project: Traffic Server
  Issue Type: Bug
  Components: Core
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 This is my JIRA for Coverity commits for v5.3.0.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3326) proxy.config.http.send_http11_requests not applied when hostdb lookup is not performed

2015-01-27 Thread ASF subversion and git services (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3326?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293721#comment-14293721
 ] 

ASF subversion and git services commented on TS-3326:
-

Commit 4f5e3f0b05f6f9e7de9aaa89b7e73e0ef39c4a6f in trafficserver's branch 
refs/heads/master from [~sudheerv]
[ https://git-wip-us.apache.org/repos/asf?p=trafficserver.git;h=4f5e3f0 ]

[TS-3326]: check client req version for hostdb lookup when config says so


 proxy.config.http.send_http11_requests not applied when hostdb lookup is not 
 performed
 --

 Key: TS-3326
 URL: https://issues.apache.org/jira/browse/TS-3326
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Affects Versions: 5.2.0
Reporter: Sudheer Vinukonda
Assignee: Sudheer Vinukonda
 Fix For: 5.3.0


 The setting {{proxy.config.http.send_http11_requests}} determines what http 
 version is used in sending outgoing requests. However, this setting is not 
 applied when dns/hostdb lookup is skipped (for e.g, when using the TS API 
 {{TSHttpTxnServerAddrSet}}). This causes problems since the default version 
 in the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
 change the default to an invalid value (e.g 0.0) in 6.0



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Commented] (TS-3329) ATS shouldn't start if SSL is configured and certificate can't be loaded

2015-01-27 Thread James Peach (JIRA)

[ 
https://issues.apache.org/jira/browse/TS-3329?page=com.atlassian.jira.plugin.system.issuetabpanels:comment-tabpanelfocusedCommentId=14293800#comment-14293800
 ] 

James Peach commented on TS-3329:
-

I disagree with this. I think that we certainly should be tolerant of SSL 
failures. SSL loading failures will log an error; perhaps they should throw an 
alert as well.

 ATS shouldn't start if SSL is configured and certificate can't be loaded
 

 Key: TS-3329
 URL: https://issues.apache.org/jira/browse/TS-3329
 Project: Traffic Server
  Issue Type: Improvement
  Components: SSL
Reporter: kang li
Assignee: kang li
 Attachments: patch.diff


 requirement by [~dcarlin]:
 {quote}
 It seems ATS will start up even if the certificate file isn't present.
 ATS settings in records.config:
 CONFIG proxy.config.ssl.server.cert_chain.filename STRING digicert.pem
 CONFIG proxy.config.ssl.server.cert.path STRING conf/yts/ssl
 ATS settings in ssl_multicert.config:
 dest_ip=* ssl_cert_name=ycpi_ssl_cert.pem
 What happened was that this volume /home/y/conf/yts/ssl wasn't mounted - so 
 the
 SSL cert and chain cert were inaccessible.   ATS started anyways just 
 returning
 errors on 443. Healthchecks were served on port 80 via HTTP, so it appeared 
 to that the site was OK. 
 {quote}



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3326) proxy.config.http.send_http11_requests not applied when hostdb lookup is not performed

2015-01-27 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3326?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3326:
--
Description: The setting {{proxy.config.http.send_http11_requests}} 
determines what http version is used in sending outgoing requests. However, 
this setting is not applied when dns/hostdb lookup is skipped (for e.g, when 
using the TS API {{TSHttpTxnServerAddrSet}}). This causes problems since the 
default version in the code used is v0.9 at the moment. See the jira TS-3327 
that proposes to change the default to an invalid value (e.g 0.0) in 6.0 and 
TS-3328 that tracks the need for a new/modified TS API.  (was: The setting 
{{proxy.config.http.send_http11_requests}} determines what http version is used 
in sending outgoing requests. However, this setting is not applied when 
dns/hostdb lookup is skipped (for e.g, when using the TS API 
{{TSHttpTxnServerAddrSet}}). This causes problems since the default version in 
the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
change the default to an invalid value (e.g 0.0) in 6.0)

 proxy.config.http.send_http11_requests not applied when hostdb lookup is not 
 performed
 --

 Key: TS-3326
 URL: https://issues.apache.org/jira/browse/TS-3326
 Project: Traffic Server
  Issue Type: Bug
  Components: Core, HTTP
Affects Versions: 5.2.0
Reporter: Sudheer Vinukonda
Assignee: Sudheer Vinukonda
 Fix For: 5.3.0


 The setting {{proxy.config.http.send_http11_requests}} determines what http 
 version is used in sending outgoing requests. However, this setting is not 
 applied when dns/hostdb lookup is skipped (for e.g, when using the TS API 
 {{TSHttpTxnServerAddrSet}}). This causes problems since the default version 
 in the code used is v0.9 at the moment. See the jira TS-3327 that proposes to 
 change the default to an invalid value (e.g 0.0) in 6.0 and TS-3328 that 
 tracks the need for a new/modified TS API.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3327) change the default http version in the source to an invalid version

2015-01-27 Thread Sudheer Vinukonda (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3327?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Sudheer Vinukonda updated TS-3327:
--
Description: This jira is opened to track the proposal to change the 
default http version in the code to an invalid value instead of 0.9. Also refer 
TS-3326 and TS-3328 for some related changes.  (was: This jira is opened to 
track the proposal to change the default http version in the code to an invalid 
value instead of 0.9. Also refer TS-3326 for some related changes.)

 change the default http version in the source to an invalid version
 ---

 Key: TS-3327
 URL: https://issues.apache.org/jira/browse/TS-3327
 Project: Traffic Server
  Issue Type: Improvement
  Components: Core, HTTP
Reporter: Sudheer Vinukonda
 Fix For: 6.0.0


 This jira is opened to track the proposal to change the default http version 
 in the code to an invalid value instead of 0.9. Also refer TS-3326 and 
 TS-3328 for some related changes.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3334) Restore proxy.config.proxy_name to something reasonable default value

2015-01-27 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3334?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3334:
--
Backport to Version: 5.2.1

 Restore proxy.config.proxy_name to something reasonable default value
 -

 Key: TS-3334
 URL: https://issues.apache.org/jira/browse/TS-3334
 Project: Traffic Server
  Issue Type: Bug
  Components: Configuration
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 As of somewhere between 5.1.x and 5.2.x, we eliminated 
 proxy.config.proxy_name from records.config.in. It used to be set to the 
 build machine name, but now we default to the one in RecordsConfig.cc (which 
 is proxy_name).
 I'd like to suggest we do one of two things (please voice your opinion):
 1) Restore the proxy.config.proxy_name into records.config.in, with the old 
 setting (@buildmachine@).
 2) Use the *hostname* from the Machine object. This is basically 
 gethostname().
 I think I prefer #2, but I'm also open for other suggestions.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Created] (TS-3334) Restore proxy.config.proxy_name to something reasonable default value

2015-01-27 Thread Leif Hedstrom (JIRA)
Leif Hedstrom created TS-3334:
-

 Summary: Restore proxy.config.proxy_name to something reasonable 
default value
 Key: TS-3334
 URL: https://issues.apache.org/jira/browse/TS-3334
 Project: Traffic Server
  Issue Type: Bug
  Components: Configuration
Reporter: Leif Hedstrom


As of somewhere between 5.1.x and 5.2.x, we eliminated proxy.config.proxy_name 
from records.config.in. It used to be set to the build machine name, but now we 
default to the one in RecordsConfig.cc (which is proxy_name).

I'd like to suggest we do one of two things (please voice your opinion):

1) Restore the proxy.config.proxy_name into records.config.in, with the old 
setting (@buildmachine@).

2) Use the localhost from the Machine object. This is basically gethostname().


I think I prefer #2, but I'm also open for other suggestions.




--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3334) Restore proxy.config.proxy_name to something reasonable default value

2015-01-27 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3334?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3334:
--
Description: 
As of somewhere between 5.1.x and 5.2.x, we eliminated proxy.config.proxy_name 
from records.config.in. It used to be set to the build machine name, but now we 
default to the one in RecordsConfig.cc (which is proxy_name).

I'd like to suggest we do one of two things (please voice your opinion):

1) Restore the proxy.config.proxy_name into records.config.in, with the old 
setting (@buildmachine@).

2) Use the *the_hostname* from the Machine object. This is basically 
gethostname().


I think I prefer #2, but I'm also open for other suggestions.


  was:
As of somewhere between 5.1.x and 5.2.x, we eliminated proxy.config.proxy_name 
from records.config.in. It used to be set to the build machine name, but now we 
default to the one in RecordsConfig.cc (which is proxy_name).

I'd like to suggest we do one of two things (please voice your opinion):

1) Restore the proxy.config.proxy_name into records.config.in, with the old 
setting (@buildmachine@).

2) Use the localhost from the Machine object. This is basically gethostname().


I think I prefer #2, but I'm also open for other suggestions.



 Restore proxy.config.proxy_name to something reasonable default value
 -

 Key: TS-3334
 URL: https://issues.apache.org/jira/browse/TS-3334
 Project: Traffic Server
  Issue Type: Bug
  Components: Configuration
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 As of somewhere between 5.1.x and 5.2.x, we eliminated 
 proxy.config.proxy_name from records.config.in. It used to be set to the 
 build machine name, but now we default to the one in RecordsConfig.cc (which 
 is proxy_name).
 I'd like to suggest we do one of two things (please voice your opinion):
 1) Restore the proxy.config.proxy_name into records.config.in, with the old 
 setting (@buildmachine@).
 2) Use the *the_hostname* from the Machine object. This is basically 
 gethostname().
 I think I prefer #2, but I'm also open for other suggestions.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)


[jira] [Updated] (TS-3334) Restore proxy.config.proxy_name to something reasonable default value

2015-01-27 Thread Leif Hedstrom (JIRA)

 [ 
https://issues.apache.org/jira/browse/TS-3334?page=com.atlassian.jira.plugin.system.issuetabpanels:all-tabpanel
 ]

Leif Hedstrom updated TS-3334:
--
Description: 
As of somewhere between 5.1.x and 5.2.x, we eliminated proxy.config.proxy_name 
from records.config.in. It used to be set to the build machine name, but now we 
default to the one in RecordsConfig.cc (which is proxy_name).

I'd like to suggest we do one of two things (please voice your opinion):

1) Restore the proxy.config.proxy_name into records.config.in, with the old 
setting (@buildmachine@).

2) Use the *hostname* from the Machine object. This is basically gethostname().


I think I prefer #2, but I'm also open for other suggestions.


  was:
As of somewhere between 5.1.x and 5.2.x, we eliminated proxy.config.proxy_name 
from records.config.in. It used to be set to the build machine name, but now we 
default to the one in RecordsConfig.cc (which is proxy_name).

I'd like to suggest we do one of two things (please voice your opinion):

1) Restore the proxy.config.proxy_name into records.config.in, with the old 
setting (@buildmachine@).

2) Use the *the_hostname* from the Machine object. This is basically 
gethostname().


I think I prefer #2, but I'm also open for other suggestions.



 Restore proxy.config.proxy_name to something reasonable default value
 -

 Key: TS-3334
 URL: https://issues.apache.org/jira/browse/TS-3334
 Project: Traffic Server
  Issue Type: Bug
  Components: Configuration
Reporter: Leif Hedstrom
Assignee: Leif Hedstrom
 Fix For: 5.3.0


 As of somewhere between 5.1.x and 5.2.x, we eliminated 
 proxy.config.proxy_name from records.config.in. It used to be set to the 
 build machine name, but now we default to the one in RecordsConfig.cc (which 
 is proxy_name).
 I'd like to suggest we do one of two things (please voice your opinion):
 1) Restore the proxy.config.proxy_name into records.config.in, with the old 
 setting (@buildmachine@).
 2) Use the *hostname* from the Machine object. This is basically 
 gethostname().
 I think I prefer #2, but I'm also open for other suggestions.



--
This message was sent by Atlassian JIRA
(v6.3.4#6332)