--------------------- PatchSet 11676 Date: 2007/09/19 20:48:14 Author: hno Branch: HEAD Tag: (none) Log: More cache and request/reply_header_max_size to their proper sections cache -> Options for tuning the cache request_header_max_size -> HTTP Options reply_heaer_max_size -> HTTP Options request_body_max_size -> HTTP Options Members: src/cf.data.pre:1.424->1.425 Index: squid/src/cf.data.pre =================================================================== RCS file: /cvsroot/squid/squid/src/cf.data.pre,v retrieving revision 1.424 retrieving revision 1.425 diff -u -r1.424 -r1.425 --- squid/src/cf.data.pre 19 Sep 2007 11:50:39 -0000 1.424 +++ squid/src/cf.data.pre 19 Sep 2007 20:48:14 -0000 1.425 @@ -1,6 +1,6 @@ # -# $Id: cf.data.pre,v 1.424 2007/09/19 11:50:39 hno Exp $ +# $Id: cf.data.pre,v 1.425 2007/09/19 20:48:14 hno Exp $ # # SQUID Web Proxy Cache http://www.squid-cache.org/ # ---------------------------------------------------------- @@ -832,19 +832,6 @@ the correct result. DOC_END -NAME: reply_header_max_size -COMMENT: (KB) -TYPE: b_size_t -DEFAULT: 20 KB -LOC: Config.maxReplyHeaderSize -DOC_START - This specifies the maximum size for HTTP headers in a reply. - Reply headers are usually relatively small (about 512 bytes). - Placing a limit on the reply header size will catch certain - bugs (for example with persistent connections) and possibly - buffer-overflow or denial-of-service attacks. -DOC_END - NAME: reply_body_max_size COMMENT: bytes allow|deny acl acl... TYPE: body_size_t @@ -1742,26 +1729,6 @@ NOCOMMENT_END DOC_END -NAME: cache no_cache -TYPE: acl_access -DEFAULT: none -LOC: Config.accessList.noCache -DOC_START - A list of ACL elements which, if matched, cause the request to - not be satisfied from the cache and the reply to not be cached. - In other words, use this to force certain objects to never be cached. - - You must use the word 'DENY' to indicate the ACL names which should - NOT be cached. - - Default is to allow all to be cached -NOCOMMENT_START -#We recommend you to use the following two lines. -acl QUERY urlpath_regex cgi-bin \? -cache deny QUERY -NOCOMMENT_END -DOC_END - COMMENT_START MEMORY CACHE OPTIONS ----------------------------------------------------------------------------- @@ -2716,31 +2683,24 @@ ----------------------------------------------------------------------------- COMMENT_END -NAME: request_header_max_size -COMMENT: (KB) -TYPE: b_size_t -DEFAULT: 20 KB -LOC: Config.maxRequestHeaderSize +NAME: cache no_cache +TYPE: acl_access +DEFAULT: none +LOC: Config.accessList.noCache DOC_START - This specifies the maximum size for HTTP headers in a request. - Request headers are usually relatively small (about 512 bytes). - Placing a limit on the request header size will catch certain - bugs (for example with persistent connections) and possibly - buffer-overflow or denial-of-service attacks. -DOC_END + A list of ACL elements which, if matched, cause the request to + not be satisfied from the cache and the reply to not be cached. + In other words, use this to force certain objects to never be cached. -NAME: request_body_max_size -COMMENT: (KB) -TYPE: b_size_t -DEFAULT: 0 KB -LOC: Config.maxRequestBodySize -DOC_START - This specifies the maximum size for an HTTP request body. - In other words, the maximum size of a PUT/POST request. - A user who attempts to send a request with a body larger - than this limit receives an "Invalid Request" error message. - If you set this parameter to a zero (the default), there will - be no limit imposed. + You must use the word 'DENY' to indicate the ACL names which should + NOT be cached. + + Default is to allow all to be cached +NOCOMMENT_START +#We recommend you to use the following two lines. +acl QUERY urlpath_regex cgi-bin \? +cache deny QUERY +NOCOMMENT_END DOC_END NAME: refresh_pattern @@ -2988,6 +2948,46 @@ ----------------------------------------------------------------------------- COMMENT_END +NAME: request_header_max_size +COMMENT: (KB) +TYPE: b_size_t +DEFAULT: 20 KB +LOC: Config.maxRequestHeaderSize +DOC_START + This specifies the maximum size for HTTP headers in a request. + Request headers are usually relatively small (about 512 bytes). + Placing a limit on the request header size will catch certain + bugs (for example with persistent connections) and possibly + buffer-overflow or denial-of-service attacks. +DOC_END + +NAME: reply_header_max_size +COMMENT: (KB) +TYPE: b_size_t +DEFAULT: 20 KB +LOC: Config.maxReplyHeaderSize +DOC_START + This specifies the maximum size for HTTP headers in a reply. + Reply headers are usually relatively small (about 512 bytes). + Placing a limit on the reply header size will catch certain + bugs (for example with persistent connections) and possibly + buffer-overflow or denial-of-service attacks. +DOC_END + +NAME: request_body_max_size +COMMENT: (KB) +TYPE: b_size_t +DEFAULT: 0 KB +LOC: Config.maxRequestBodySize +DOC_START + This specifies the maximum size for an HTTP request body. + In other words, the maximum size of a PUT/POST request. + A user who attempts to send a request with a body larger + than this limit receives an "Invalid Request" error message. + If you set this parameter to a zero (the default), there will + be no limit imposed. +DOC_END + NAME: broken_posts TYPE: acl_access DEFAULT: none