Bug #12126
closed
[PATCH] openssl: accept moving write buffer for write_nonblock
Added by normalperson (Eric Wong) over 8 years ago.
Updated over 8 years ago.
Description
By setting the SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER flag.
This flag was introduced at the same time as
SSL_MODE_ENABLE_PARTIAL_WRITE in OpenSSL 0.9.4 and makes usage
with non-blocking sockets much easier.
Before this, a Rubyist would need to remember the exact object
which failed to write and reuse it later when the socket became
writable again. This causes problems when the buffer is given
by another layer of the application (e.g. a buffer is given
by a Rack middleware or application to a Rack web server).
* ext/openssl/ossl_ssl.c (ossl_sslctx_s_alloc):
enable SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER by default
Related to https://bugs.ruby-lang.org/issues/12085
I'm not sure if this can be considered a bugfix which
should be backported. I have found write_nonblock usability to
be severely hampered by the lack if this flag.
Files
normalperson@yhbt.net wrote:
Before this, a Rubyist would need to remember the exact object
which failed to write and reuse it later when the socket became
writable again. This causes problems when the buffer is given
by another layer of the application (e.g. a buffer is given
by a Rack middleware or application to a Rack web server).
I should note the content of the buffer still needs to remain the
unchanged. And IMHO, any reasonable non-blocking server working with
stream sockets is expected to maintain identical content when
retrying writes.
The main difference with this patch is the memory addresses passed
to SSL_write() C function can be safely changed when retrying.
IMHO it's unreasonable for a Ruby programmer to care about memory
addresses passed to C functions when writing in Ruby.
- Status changed from Open to Closed
Applied in changeset r54466.
openssl: accept moving write buffer for write_nonblock
By setting the SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER flag.
This flag was introduced at the same time as
SSL_MODE_ENABLE_PARTIAL_WRITE in OpenSSL 0.9.4 and makes usage
with non-blocking sockets much easier.
Before this, a Rubyist would need to remember the exact object
which failed to write and reuse it later when the socket became
writable again. This causes problems when the buffer is given
by another layer of the application (e.g. a buffer is given
by a Rack middleware or application to a Rack web server).
- ext/openssl/ossl_ssl.c (ossl_sslctx_s_alloc):
enable SSL_MODE_ACCEPT_MOVING_WRITE_BUFFER by default
[Bug #12126]
- Related to Feature #12085: [PATCH] openssl: document `exception: false' for *_nonblock added
- Related to Bug #12309: Segmentation fault caused by OpenSSL added
- Related to Bug #6168: Segfault in OpenSSL bindings added
- Related to deleted (Bug #6168: Segfault in OpenSSL bindings)
- Related to deleted (Bug #12309: Segmentation fault caused by OpenSSL)
Also available in: Atom
PDF
Like0
Like0Like0Like0Like0Like0Like0Like0Like0