From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.0 (2014-02-07) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: AS59895 185.65.205.0/24 X-Spam-Status: No, score=-2.6 required=3.0 tests=AWL,BAYES_00,RCVD_IN_XBL, RDNS_NONE,SPF_FAIL,SPF_HELO_FAIL,TO_EQ_FM_DIRECT_MX,TO_EQ_FM_DOM_SPF_FAIL, TO_EQ_FM_SPF_FAIL shortcircuit=no autolearn=no autolearn_force=no version=3.4.0 Received: from 80x24.org (unknown [185.65.205.10]) by dcvr.yhbt.net (Postfix) with ESMTP id 072B120958 for ; Fri, 24 Mar 2017 04:45:16 +0000 (UTC) From: Eric Wong To: yahns-public@yhbt.net Subject: [PATCH] proxy_pass: comment explaining what rack.hijack calls Date: Fri, 24 Mar 2017 04:45:13 +0000 Message-Id: <20170324044513.16370-1-yahns-public@yhbt.net> List-Id: "call" is a generic name and may not obvious to somebody new to the code. --- lib/yahns/proxy_pass.rb | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/lib/yahns/proxy_pass.rb b/lib/yahns/proxy_pass.rb index 0ada4a6..2a37773 100644 --- a/lib/yahns/proxy_pass.rb +++ b/lib/yahns/proxy_pass.rb @@ -57,7 +57,7 @@ def init_path_vars(path) def call(env) # 3-way handshake for TCP backends while we generate the request header rr = Yahns::ReqRes.start(@sockaddr) - c = env['rack.hijack'].call + c = env['rack.hijack'].call # Yahns::HttpClient#call req = Rack::Request.new(env) req = @path.gsub(/\$(\w+)/) { req.__send__($1) } -- EW