- 22 Feb, 2013 3 commits
-
-
Tatsuhiro Tsujikawa authored
Use --backend-spdy-no-tls to disable TLS on backend SPDY connection. The SPDY protocol used there must be configured by --backend-spdy-proto option.
-
Tatsuhiro Tsujikawa authored
Surprisingly, field_set & UF_USERINFO is nonzero even if userinfo component is empty string.
-
Tatsuhiro Tsujikawa authored
-
- 19 Feb, 2013 2 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 17 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-
- 16 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-
- 15 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-
- 14 Feb, 2013 5 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 13 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-
- 11 Feb, 2013 2 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Now we set Downstream::set_response_connection_close(true) for tunneled connections. Also call Upstream::on_downstream_body_complete() callback when setting MSG_COMPLETE in SpdySession when RST_STREAM is caught. Clean up EOF handling in https_downstream_readcb.
-
- 10 Feb, 2013 3 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 09 Feb, 2013 10 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
SPDY frame has :scheme header field, so x-forwarded-proto is not necessary.
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Currently, resume_read() fails if on_read() returns -1 in case that evbuffer_add failed, which means, most likely, memory allocation failure. ClientHandler is marked "should be closed", but if evbuffer_add is failed, write callback will not be invoked and its marking is not evaluated. It will eventually be deleted when the client is disconnected or backend failure though.
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
Specify proxy URI in the form http://[USER:PASS]PROXY:PORT. USER and PASS are optional and if they exist they must be properly percent-encoded. This proxy is used when the backend connection is SPDY. First, make a CONNECT request to the proxy and it connects to the backend on behalf of shrpx. This forms tunnel. After that, shrpx performs SSL/TLS handshake with the downstream through the tunnel. The timeouts when connecting and making CONNECT request can be specified by --backend-read-timeout and --backend-write-timeout options.
-
- 08 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
With --spdy-bridge option, it listens SPDY/HTTPS connections from front end and forwards them to the backend in SPDY. The usage will be written later. This change fixes the crash when more than 2 outstanding SpdyDownstreamConnection objects are added to SpdySession and establishing connection to SPDY backend is failed.
-
- 07 Feb, 2013 3 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 06 Feb, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
This option specifies additional certificate and private key file. Shrpx will choose certificates based on the hostname indicated by client using TLS SNI extension. This option can be used multiple times.
-
- 02 Feb, 2013 2 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 01 Feb, 2013 2 commits
-
-
Tatsuhiro Tsujikawa authored
-
Tatsuhiro Tsujikawa authored
-
- 31 Jan, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-
- 30 Jan, 2013 1 commit
-
-
Tatsuhiro Tsujikawa authored
-