-----Original Message-----
From: Mark Thomas <ma...@apache.org>
Sent: Friday, July 23, 2021 2:56 AM
To: users@tomcat.apache.org
Subject: Re: Strange incomplete response/truncation with Tomcat 9.0.48
AND 9.0.50
On 22/07/2021 22:06, jonmcalexan...@wellsfargo.com.INVALID wrote:
I have a team that is running into issues since version 9.0.48 where
they are receiving incomplete message responses from Tomcat when the
request was made from WebLogic.
Incomplete responses from 9.0.48 onwards. That sounds like a recently
fixed
regression. That issue happened with TLS.
<snip/>
*adrum.js:27 Error: Loading chunk 28 failed.*
(timeout:
https://<sanitized>......./<sanitized>.5af0fea300ccf52ff152.js)
That looks like TLS is being used which is consistent with the
suspected root
cause.
<snip/>
*_Network level_* we are seeing *TCP Window Full* intermittently when
this file transfer.
This is also consistent with the likely root cause. The regression
was in the
handling of incomplete writes.
<snip/>
After some additional research we assume this issue is related to one
of the known bugs listed in RedHat TC release notes
<https://urldefense.com/v3/__https://tomcat.apache.org/tomcat-9.0-
doc/changelog.html__;!!F9svGWnIaVPGSwU!69FyojmXXQigaRKpGDiwpMgS
sgODh4HrEhdK9d8ZbHZsJjpqNcD2ZmKprbbGjevCxxzKTSc$ >.
Fix: Expand the unit tests for HttpServlet.doHead()
Not an unreasonable guess but it looks to be an incorrect one.
I always recommend looking at the open bugs and the changelog from
the CI
system to see if the issue being observed has already been reported (and
possibly fixed).
https://urldefense.com/v3/__https://ci.apache.org/projects/tomcat/tomcat
-
9.0.x/docs/changelog.html__;!!F9svGWnIaVPGSwU!69FyojmXXQigaRKpGDi
wpMgSsgODh4HrEhdK9d8ZbHZsJjpqNcD2ZmKprbbGjevC8PK9tLQ$
This looks much more like bug 65448 to me:
https://urldefense.com/v3/__https://bz.apache.org/bugzilla/show_bug.cgi?
id=65448__;!!F9svGWnIaVPGSwU!69FyojmXXQigaRKpGDiwpMgSsgODh4HrE
hdK9d8ZbHZsJjpqNcD2ZmKprbbGjevCqMV6SbI$
<snip/>
Any help?
The fix will be in 9.0.51.
Snapshots (NOT formal releases) are available for testing from:
https://urldefense.com/v3/__https://repository.apache.org/content/group
s/snapshots/org/apache/tomcat/tomcat/9.0-
SNAPSHOT/__;!!F9svGWnIaVPGSwU!69FyojmXXQigaRKpGDiwpMgSsgODh4
HrEhdK9d8ZbHZsJjpqNcD2ZmKprbbGjevCZcMI2B0$
Usual caveats apply. These aren't releases. Use them entirely at your
own
risk.
In terms of a workaround, switching from NIO to NIO2 should avoid the
issue.
Mark
---------------------------------------------------------------------
To unsubscribe, e-mail: users-unsubscr...@tomcat.apache.org
For additional commands, e-mail: users-h...@tomcat.apache.org