-
-
Notifications
You must be signed in to change notification settings - Fork 996
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Special characters added to pages due to compression on v5.0.13 #923
Comments
Hi, I'm experiencing the same when upgrading from The following code snippet reproduces the issue: func TestCompressionResponse(t *testing.T) {
yamlDoc := []byte("key: value")
handler := func(w http.ResponseWriter, r *http.Request) {
w.Header().Set("Content-Type", "application/x-yaml")
w.Write(yamlDoc)
}
r := chi.NewRouter()
r.Use(middleware.Compress(5))
r.Get("/test", handler)
srv := &http.Server{Addr: ":3333", Handler: r}
go srv.ListenAndServe()
res, err := http.Get("http://localhost:3333/test")
if err != nil {
t.Fatalf("could not send request: %v", err)
}
got, err := io.ReadAll(res.Body)
if err != nil {
t.Fatalf("could not read response body: %v", err)
}
if !bytes.Equal(got, yamlDoc) {
// v5.0.12: pass
// v5.0.13: server_test.go:39: expected "key: value" but got "key: value\x1f\x8b\b\x00\x00\x00\x00\x00\x00\xff\x01\x00\x00\xff\xff\x00\x00\x00\x00\x00\x00\x00\x00"
t.Errorf("expected %q but got %q", yamlDoc, got)
}
} |
Thanks for reporting this issue. I'll revert #919 via #924. I wonder if anyone could look into the root cause of the issue introduced by #919. I doesn't make sense to me. @Neurostep? |
@balogal would you be able to submit a similar compress mw test case to chi, please? |
Thanks for the quick reaction @VojtechVitek. I'll have a shot at the test. |
Those special characters are the GZIP File header. Calling The changes introduced in #919 meant that |
@surakshith-suvarna that is a great finding 👍 Didn’t know, gzip/deflate writes when closing even though there were no prior writes, TIL @VojtechVitek So now we have a controversial situation, when for one case the writer has to call Close() to release resources, and another case when we should refrain from calling this as it breaks the normal flow. I wonder if we can find a way to not wrap the http.ResponseWriter at all in case we encounter that the content shouldn’t be compressed? Now we wrap it unconditionally and do the checking later. If this sounds like a way forward, I can look into this later next week, starting Wednesday. @VojtechVitek @pkieltyka Please, let me know what do you think |
Sounds good. This is delicate and we need more test cases. I propose we wrap the ResponseWriter with compress writer during the first So,
|
Just came back from my PTO and wanna quickly follow up here. I have read your proposal above and I find it very hard and un-intuitive to implement the way it is described. I believe the My idea was to move the Am I missing something? 🤔 |
@Neurostep ok sounds good :) |
@VojtechVitek @balogal @js-everts For posterity, I created the following PR #928 to mitigate the memory leak issue and at the same time keep in mind this issue. It would be great if anyone could give feedback for the mentioned PR 🙏 |
In previous versions, compression was only applied if we had set the Content-Type header (w.Header().Set("Content-Type", "text/html")). In version 5.0.13 if the header is not set ������� displays on every page where the header is missing.
The text was updated successfully, but these errors were encountered: