Return-Path: X-Original-To: apmail-httpd-dev-archive@www.apache.org Delivered-To: apmail-httpd-dev-archive@www.apache.org Received: from mail.apache.org (hermes.apache.org [140.211.11.3]) by minotaur.apache.org (Postfix) with SMTP id 446A7186DB for ; Mon, 1 Feb 2016 09:28:25 +0000 (UTC) Received: (qmail 92139 invoked by uid 500); 1 Feb 2016 09:28:15 -0000 Delivered-To: apmail-httpd-dev-archive@httpd.apache.org Received: (qmail 92060 invoked by uid 500); 1 Feb 2016 09:28:15 -0000 Mailing-List: contact dev-help@httpd.apache.org; run by ezmlm Precedence: bulk Reply-To: dev@httpd.apache.org list-help: list-unsubscribe: List-Post: List-Id: Delivered-To: mailing list dev@httpd.apache.org Received: (qmail 92038 invoked by uid 99); 1 Feb 2016 09:28:15 -0000 Received: from Unknown (HELO spamd2-us-west.apache.org) (209.188.14.142) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 01 Feb 2016 09:28:15 +0000 Received: from localhost (localhost [127.0.0.1]) by spamd2-us-west.apache.org (ASF Mail Server at spamd2-us-west.apache.org) with ESMTP id CA1451A01BA for ; Mon, 1 Feb 2016 09:28:14 +0000 (UTC) X-Virus-Scanned: Debian amavisd-new at spamd2-us-west.apache.org X-Spam-Flag: NO X-Spam-Score: -0.654 X-Spam-Level: X-Spam-Status: No, score=-0.654 tagged_above=-999 required=6.31 tests=[DKIM_SIGNED=0.1, DKIM_VALID=-0.1, DKIM_VALID_AU=-0.1, RP_MATCHES_RCVD=-0.554, SPF_PASS=-0.001, URIBL_BLOCKED=0.001] autolearn=disabled Authentication-Results: spamd2-us-west.apache.org (amavisd-new); dkim=pass (1024-bit key) header.d=greenbytes.de header.b=clqlPVFK; dkim=pass (1024-bit key) header.d=greenbytes.de header.b=AkWqD25u Received: from mx1-eu-west.apache.org ([10.40.0.8]) by localhost (spamd2-us-west.apache.org [10.40.0.9]) (amavisd-new, port 10024) with ESMTP id 6JPxPc2CII6K for ; Mon, 1 Feb 2016 09:28:06 +0000 (UTC) Received: from mail.greenbytes.de (mail.greenbytes.de [217.91.35.233]) by mx1-eu-west.apache.org (ASF Mail Server at mx1-eu-west.apache.org) with ESMTPS id 73D3631AE0 for ; Mon, 1 Feb 2016 09:28:05 +0000 (UTC) Received: by mail.greenbytes.de (Postfix, from userid 117) id 13C4215A0A39; Mon, 1 Feb 2016 10:27:59 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=greenbytes.de; s=mail; t=1454318879; bh=qNRPAvpuw59j755AGE4wh9Db4LnTxgfXJrsENrnAA+o=; h=Subject:From:In-Reply-To:Date:References:To:From; b=clqlPVFKzlaNomWN2/ti4a38VtyHJR+hM73jraAe2AHieksxlBkQz0WwMEPuZj3Tt 1Ec8sZmgXfXMty79ik3ZTsHtV4IaO6yEIZMq8pjMAlrIc5uqnBQkxl01tWEYscqpFa 5Qwaj2/E28FDS1qIgbOQc+V17VFEQ3V3W/knAauY= Received: from [192.168.1.42] (unknown [217.91.35.233]) (using TLSv1 with cipher ECDHE-RSA-AES256-SHA (256/256 bits)) (Client did not present a certificate) by mail.greenbytes.de (Postfix) with ESMTPSA id CC73415A0440 for ; Mon, 1 Feb 2016 10:27:57 +0100 (CET) DKIM-Signature: v=1; a=rsa-sha256; c=simple/simple; d=greenbytes.de; s=mail; t=1454318877; bh=qNRPAvpuw59j755AGE4wh9Db4LnTxgfXJrsENrnAA+o=; h=Subject:From:In-Reply-To:Date:References:To:From; b=AkWqD25umINBDIfEozj6Po7VNNEPSTbTz9+DjxDfXDxYdApsNd61RbQs3+7uAJUcb YU+Y5FInNQoxxsVYVnASZZ2wmdkjhw/Oj+1Qb5+0oEo/XYrQCLYldeDAK5n0cEQLgy LKo9kB5RRBqhonsy4AfMJjp0kbADmkFgqWnHfVEw= Content-Type: text/plain; charset=us-ascii Mime-Version: 1.0 (Mac OS X Mail 9.2 \(3112\)) Subject: Re: event mpm and slave connections From: Stefan Eissing In-Reply-To: Date: Mon, 1 Feb 2016 10:27:57 +0100 Content-Transfer-Encoding: quoted-printable Message-Id: References: To: dev@httpd.apache.org X-Mailer: Apple Mail (2.3112) Sure, Bill. Love to have your feedback on this and make it work for = mod_ftp, too. > Am 30.01.2016 um 06:04 schrieb William A Rowe Jr = : >=20 > If you can give me a few days (not httpd'ing again until=20 > late Sun eve) - this is very close to the issues we have > in mod_ftp with the data connection/request aside the > control connection. The right patch will improve both > sets of dirty hacks :) >=20 > Thanks for the proposal! >=20 > Bill >=20 > On Fri, Jan 29, 2016 at 7:01 AM, Stefan Eissing = wrote: > I would like to propose some additions to event that help me get rid = of two ugly hacks in mod_http2: >=20 > 1. Initialization of slave connections > event registers on pre_connection hook and checks if c is a slave = (c->master) and if the connection state is either not there or the same = as master (pointer copy). It then sets up a new cs using the slave = connection pool. >=20 > 2. Initialization of server config > event keeps in its private connection state parts the server = configuration (queues for timeouts and keepalives) that are unique to = each server because of Timeout and KeepAliveTimeout settings. Normally, = theses are set on post_read_request hooks which is fine and well. On = master connections however, these hooks may never get called so the = server config remains stuck on the connections base server. > In the case of SNI however, we know which server this connection is = intended for and should use its Timeouts. This is done by installing an = early protocol_switch hook that sees connections updates and server_rec = and initializes its connection state accordingly. >=20 > Please vote on the attached patch. I do not want to mess with event = without having some moral backup... >=20 > -Stefan >=20 >=20