]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
*) mod_session_cookie: avoid duplicate Set-Cookie headers in the response.
authorGraham Leggett <minfrin@apache.org>
Fri, 23 Nov 2018 15:34:40 +0000 (15:34 +0000)
committerGraham Leggett <minfrin@apache.org>
Fri, 23 Nov 2018 15:34:40 +0000 (15:34 +0000)
   trunk patch: http://svn.apache.org/r1843244
+1: elukey, jim, minfrin

git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1847288 13f79535-47bb-0310-9956-ffa450edef68

CHANGES
STATUS
modules/session/mod_session_cookie.c

diff --git a/CHANGES b/CHANGES
index 4f166a88efd95f972f16023e38f89de9a6df796b..7762b618f9c1c438b5ee51629bd2c64b8f48c06c 100644 (file)
--- a/CHANGES
+++ b/CHANGES
@@ -1,6 +1,9 @@
                                                          -*- coding: utf-8 -*-
 Changes with Apache 2.4.38
 
+  *) mod_session_cookie: avoid duplicate Set-Cookie header in the response.
+     [Emmanuel Dreyfus <manu@netbsd.org>, Luca Toscano]
+
   *) mod_ssl: clear *SSL errors before loading certificates and checking
      afterwards. Otherwise errors are reported when other SSL using modules
      are in play. Fixes PR 62880. [Michael Kaufmann]
diff --git a/STATUS b/STATUS
index 771aafea4f150bca4bda865464968fa4a7db0b00..5cec43e76b4bc07ec3c375d09c196ee15f4e5a42 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -126,12 +126,6 @@ RELEASE SHOWSTOPPERS:
 PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
   [ start all new proposals below, under PATCHES PROPOSED. ]
 
-  *) mod_session_cookie: avoid duplicate Set-Cookie headers in the response.
-     trunk patch: http://svn.apache.org/r1843244
-     2.4.x patch: svn merge -c 1843244 ^/httpd/httpd/trunk .
-     +1: elukey, jim, minfrin
-     elukey: test added in http://svn.apache.org/r1844468
-
 
 PATCHES PROPOSED TO BACKPORT FROM TRUNK:
   [ New proposals should be added at the end of the list ]
index 6a02322bf19a9756bb13e21e045b787b0a1885ca..a010ee7163ac933c614fa83c762291b6096030ac 100644 (file)
@@ -67,7 +67,7 @@ static apr_status_t session_cookie_save(request_rec * r, session_rec * z)
     if (conf->name_set) {
         if (z->encoded && z->encoded[0]) {
             ap_cookie_write(r, conf->name, z->encoded, conf->name_attrs,
-                            z->maxage, r->headers_out, r->err_headers_out,
+                            z->maxage, r->err_headers_out,
                             NULL);
         }
         else {
@@ -80,7 +80,7 @@ static apr_status_t session_cookie_save(request_rec * r, session_rec * z)
     if (conf->name2_set) {
         if (z->encoded && z->encoded[0]) {
             ap_cookie_write2(r, conf->name2, z->encoded, conf->name2_attrs,
-                             z->maxage, r->headers_out, r->err_headers_out,
+                             z->maxage, r->err_headers_out,
                              NULL);
         }
         else {