PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
[ start all new proposals below, under PATCHES PROPOSED. ]
+ * mod_proxy_http: Do not forward an Expect: 100-continue to
+ an HTTP/1.0 server
+ Trunk version of patch:
+ http://svn.apache.org/viewvc?view=rev&revision=661506
+ Backport version for 2.2.x of patch:
+ Trunk version of patch works
+ +1: jim, rpluem, niq
PATCHES PROPOSED TO BACKPORT FROM TRUNK:
[ New proposals should be added at the end of the list ]
Backport version for 2.2.x of patch:
Trunk version of patch works
+1: rpluem,
- -1: niq - strcasecmp(NULL, ...) when secure is not set
- rpluem: Good catch. Should be fixed by r660461.
- rpluem asks: niq are your concers now addressed and can I regard
- your veto as moot?
-
- * mod_proxy_http: Do not forward an Expect: 100-continue to
- an HTTP/1.0 server
- Trunk version of patch:
- http://svn.apache.org/viewvc?view=rev&revision=661506
- Backport version for 2.2.x of patch:
- Trunk version of patch works
- +1: jim, rpluem
- niq: Interesting point in RFC2616: a client can send Expect to
- a 1.0 server, but a proxy mustn't. But I'm not convinced
- by the use of force-proxy-request-1.0, when RFC2616 suggests
- caching backend response headers.
- rpluem: It's a first and quick start. The RFC says that we as a
- proxy must not sent it to a server from which we know that it
- speaks HTTP/1.0. If we set force-proxy-request-1.0 we *know*
- that we speak HTTP/1.0 with this server. A perfect solution
- would be of course to memorize the HTTP version for each
- (or a reasonable number) server and act accordingly.
* mod_rewrite: Preserve the query string when [proxy,noescape]. PR 45247.
Caused by r649840/trunk, r663593/2.2.x
http://svn.apache.org/viewvc?view=rev&revision=670061
Backport version for 2.2.x of updated patch:
http://people.apache.org/~tdonovan/diffs/mod_rewrite_proxy_esc_2.2.x.diff
- +1: rpluem
+ +1: rpluem, niq
* mod_auth_digest: Detect during startup when AuthDigestProvider
is configured to use an incompatible provider via AuthnProviderAlias.
Backport version for 2.2.x of patch:
http://people.apache.org/~covener/2.2.x-digest_vs_authnalias-2.diff
+1: covener, rpluem
+ -1: niq: looks like a major MMN bump to me, in that it'll
+ break binary compatibility with old compilations
+ of authn modules (has_realm_hash being undefined).
+ Why not just test get_realm_hash - as in the else clause?
* core, authn/z: Avoid calling access control hooks for internal requests
with configurations which match those of initial request. Revert to
http://svn.apache.org/viewvc?rev=674000&view=rev
Backport version for 2.2.x of patch:
Trunk version of patch works
- +1: rpluem,
+ +1: rpluem, niq
PATCHES/ISSUES THAT ARE STALLED