]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
mod_proxy_hcheck: Fix issues with TCP health checks. PR 61499
authorGraham Leggett <minfrin@apache.org>
Tue, 18 Sep 2018 21:24:06 +0000 (21:24 +0000)
committerGraham Leggett <minfrin@apache.org>
Tue, 18 Sep 2018 21:24:06 +0000 (21:24 +0000)
trunk patch: http://svn.apache.org/r1840582
2.4.x patch: svn merge -c 1840582 ^/httpd/httpd/trunk .
+1: jim, ylavic, minfrin

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1841263 13f79535-47bb-0310-9956-ffa450edef68

CHANGES
STATUS
modules/proxy/mod_proxy_hcheck.c

diff --git a/CHANGES b/CHANGES
index 7443f4d5ecf104595bfec5e88231716395e0565b..90547fc44551dcfac0126e6b47b27979e72e35d3 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -3,6 +3,9 @@ Changes with Apache 2.4.36
 
 Changes with Apache 2.4.35
 
+  *) mod_proxy_hcheck: Fix issues with TCP health checks. PR 61499
+     [Dominik Stillhard <dominik.stillhard united-security-providers.ch>]
+
   *) mod_proxy_hcheck: take balancer's SSLProxy* directives into account.
      [Jim Jagielski]
 
diff --git a/STATUS b/STATUS
index 80750cc1ed904137591a0e539ad1610ae2259259..06bc1acd0afa4b1acee43da86ce76a329bb2351c 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -124,10 +124,6 @@ RELEASE SHOWSTOPPERS:
 PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
   [ start all new proposals below, under PATCHES PROPOSED. ]
 
-   *) mod_proxy_hcheck: Fix issues with TCP health checks. PR 61499
-      trunk patch: http://svn.apache.org/r1840582
-      2.4.x patch: svn merge -c 1840582 ^/httpd/httpd/trunk .
-      +1: jim, ylavic, minfrin
 
 
 PATCHES PROPOSED TO BACKPORT FROM TRUNK:
index 0ee6845265040bf5a805edc5bb6fc35f7a8f65de..bf557b71e9cbc505f292e5493c39055a4d841903 100644 (file)
@@ -612,7 +612,6 @@ static apr_status_t hc_check_tcp(baton_t *baton)
 
     status = hc_get_backend("HCTCP", &backend, hc, ctx, baton->ptemp);
     if (status == OK) {
-        backend->addr = hc->cp->addr;
         status = ap_proxy_connect_backend("HCTCP", backend, hc, ctx->s);
         /* does an unconditional ap_proxy_is_socket_connected() */
     }