From: Jim Jagielski Date: Fri, 11 Nov 2011 17:36:46 +0000 (+0000) Subject: Merge r1200475, r1200478, r1200482, r1200491, r1200513, r1200550, r1200580, r1200605... X-Git-Tag: 2.3.16~198 X-Git-Url: https://granicus.if.org/sourcecode?a=commitdiff_plain;h=ca0f90bb48e074a6953862b3e4e17603cf453663;p=apache Merge r1200475, r1200478, r1200482, r1200491, r1200513, r1200550, r1200580, r1200605, r1200612, r1200614, r1200639, r1200646, r1200656, r1200667, r1200679, r1200699, r1200957, r1200961, r1200963 from trunk: fix issue with incorrect munging of the lua package path -- LuaPackagePath directives were not working Default to not allowing htaccess in /, instead of just the documentroot, which gets a nice 10% performance boost by default for me. * modules/ssl/ssl_private.h, modules/ssl/ssl_engine_kernel.c (ssl_callback_tlsext_tickets): Use unsigned char * to fix gcc -Wpointer-sign warnings. Only load the really imporant modules (i.e. those enabled by the 'few' selection) by default. Don't handle modules enabled with --enable-foo specially. This fixes problems with module dependencies until someone implements a mechanism for resolving module dependencies. remove last traces of the code cache * modules/proxy/mod_proxy_html.c (comp_urlmap): Fix const-ness warning. * modules/lua/mod_lua.c (ap_lua_ssl_is_https): New function. (lua_post_config): Pick up ssl_is_https optional function. * modules/lua/lua_request.c (req_ssl_is_https_field): New function. (ap_lua_load_request): Map is_https field to above. remove some debug logging which snuck in remove ability to set min and max pool sizes for server scope in prep for removing server scope remove lingering reslist references before killing server scope replace server scope with thread scope use a sub-pool for scope_once Fix installation of conf/extra/proxy-html.conf. Otherwise httpd does no longer start, because it is the only extra file required in the main config at the moment. Rebuild xdoc transform Clarify docs for LimitRequestLine, as per bug #51665. Rebuild doc transforms. Submitted by: brianm, pquerna, jorton, sf, brianm, jorton, jorton, sf, pquerna, brianm, brianm, brianm, brianm, brianm, jorton, rjung, rbowen, rbowen, rbowen Reviewed/backported by: jim git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1200981 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/CHANGES b/CHANGES index 1e5b0a59f4..c921965922 100644 --- a/CHANGES +++ b/CHANGES @@ -1,6 +1,10 @@ -*- coding: utf-8 -*- Changes with Apache 2.3.16 + *) configure: Only load the really imporant modules (i.e. those enabled by + the 'few' selection) by default. Don't handle modules enabled with + --enable-foo specially. [Stefan Fritsch] + *) end-generation hook: Fix false notification of end-of-generation for temporary intervals with no active MPM children. [Jeff Trawick] diff --git a/acinclude.m4 b/acinclude.m4 index 76d79fcb52..2911fba1aa 100644 --- a/acinclude.m4 +++ b/acinclude.m4 @@ -359,7 +359,7 @@ AC_DEFUN(APACHE_MODULE,[ sharedobjs=yes shared=yes DSO_MODULES="$DSO_MODULES $1" - if test "$_apmod_required" = "yes" ; then + if test "$5" = "yes" ; then ENABLED_DSO_MODULES="${ENABLED_DSO_MODULES},$1" fi ;; diff --git a/docs/conf/httpd.conf.in b/docs/conf/httpd.conf.in index d59952f366..6edb323cfd 100644 --- a/docs/conf/httpd.conf.in +++ b/docs/conf/httpd.conf.in @@ -112,6 +112,7 @@ ServerAdmin you@example.com # blocks below. # + AllowOverride none Require all denied diff --git a/docs/manual/mod/core.html.en b/docs/manual/mod/core.html.en index 68ae427259..4ad851d925 100644 --- a/docs/manual/mod/core.html.en +++ b/docs/manual/mod/core.html.en @@ -2420,7 +2420,7 @@ client that will be allowed in an HTTP request header.

The LimitRequestFieldSize directive - allows the server administrator to reduce or increase the limit + allows the server administrator to set the limit on the allowed size of an HTTP request header field. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header @@ -2440,7 +2440,8 @@ client

Under normal conditions, the value should not be changed from - the default.
+ the default. Also, you can't set this higher than 8190 without + modifying the source code and rebuilding.

Warning

When name-based virtual hosting is used, the value for this @@ -2464,7 +2465,7 @@ from the client allowed on the HTTP request-line.

The LimitRequestLine directive allows - the server administrator to reduce or increase the limit on the allowed size + the server administrator to set the limit on the allowed size of a client's HTTP request-line. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a @@ -2484,7 +2485,8 @@ from the client

Under normal conditions, the value should not be changed from - the default.
+ the default. Also, you can't set this higher than 8190 without + modifying the source and rebuilding.

Warning

When name-based virtual hosting is used, the value for this diff --git a/docs/manual/mod/core.xml b/docs/manual/mod/core.xml index a9e9866feb..7b3cbf5b1b 100644 --- a/docs/manual/mod/core.xml +++ b/docs/manual/mod/core.xml @@ -2409,7 +2409,7 @@ client that will be allowed in an HTTP request header.

The LimitRequestFieldSize directive - allows the server administrator to reduce or increase the limit + allows the server administrator to set the limit on the allowed size of an HTTP request header field. A server needs this value to be large enough to hold any one header field from a normal client request. The size of a normal request header @@ -2429,7 +2429,8 @@ client Under normal conditions, the value should not be changed from - the default. + the default. Also, you can't set this higher than 8190 without + modifying the source code and rebuilding. Warning

When name-based virtual hosting is used, the value for this @@ -2452,7 +2453,7 @@ from the client allowed on the HTTP request-line.

The LimitRequestLine directive allows - the server administrator to reduce or increase the limit on the allowed size + the server administrator to set the limit on the allowed size of a client's HTTP request-line. Since the request-line consists of the HTTP method, URI, and protocol version, the LimitRequestLine directive places a @@ -2472,7 +2473,8 @@ from the client Under normal conditions, the value should not be changed from - the default. + the default. Also, you can't set this higher than 8190 without + modifying the source and rebuilding. Warning

When name-based virtual hosting is used, the value for this diff --git a/docs/manual/mod/core.xml.de b/docs/manual/mod/core.xml.de index 279e61a3df..48f3ad8b2c 100644 --- a/docs/manual/mod/core.xml.de +++ b/docs/manual/mod/core.xml.de @@ -1,7 +1,7 @@ - + + + +