Author: remy.maucherat(a)jboss.com
Date: 2008-04-01 08:22:38 -0400 (Tue, 01 Apr 2008)
New Revision: 575
Modified:
trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
Log:
- A fancy client properly implementing continue could be impacted by the buffering hack,
so allow
disabling it in the APR connector just in case.
Modified: trunk/java/org/apache/coyote/http11/Http11AprProcessor.java
===================================================================
--- trunk/java/org/apache/coyote/http11/Http11AprProcessor.java 2008-04-01 00:45:28 UTC
(rev 574)
+++ trunk/java/org/apache/coyote/http11/Http11AprProcessor.java 2008-04-01 12:22:38 UTC
(rev 575)
@@ -1226,9 +1226,11 @@
if (ssl && (socket != 0)) {
// Consume and buffer the request body, so that it does not
// interfere with the client's handshake messages
- InputFilter[] inputFilters = inputBuffer.getFilters();
- ((BufferedInputFilter)
inputFilters[Constants.BUFFERED_FILTER]).setLimit(maxSavePostSize);
- inputBuffer.addActiveFilter(inputFilters[Constants.BUFFERED_FILTER]);
+ if (maxSavePostSize > -2) {
+ InputFilter[] inputFilters = inputBuffer.getFilters();
+ ((BufferedInputFilter)
inputFilters[Constants.BUFFERED_FILTER]).setLimit(maxSavePostSize);
+
inputBuffer.addActiveFilter(inputFilters[Constants.BUFFERED_FILTER]);
+ }
try {
// Renegociate certificates
SSLSocket.renegotiate(socket);