From: Christophe Jaillet Date: Mon, 19 Apr 2021 12:17:11 +0000 (+0000) Subject: Fix a typo X-Git-Tag: 2.4.47~17 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=217135aaa736ccf6b697e5fda596b491ac93bb2f;p=thirdparty%2Fapache%2Fhttpd.git Fix a typo + remove trailing space to synhc with trunk [skip ci] git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@1888956 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/developer/new_api_2_4.xml b/docs/manual/developer/new_api_2_4.xml index 1b2ad4259d6..98970e9bccf 100644 --- a/docs/manual/developer/new_api_2_4.xml +++ b/docs/manual/developer/new_api_2_4.xml @@ -29,7 +29,7 @@ version 2.2 to 2.4, that may be of interest to module/application developers and core hacks. As of the first GA release of the 2.4 branch API compatibility is preserved for the life of the - 2.4 branch. (The + 2.4 branch. (The VERSIONING description for the 2.4 release provides more information about API compatibility.)

@@ -114,9 +114,9 @@
  • New API to retain data across module unload/load
  • New check_config hook
  • New ap_process_fnmatch_configs() function to process wildcards
  • -
  • Change ap_configfile_t, ap_cfg_getline(), - ap_cfg_getc() to return error codes, and add - ap_pcfg_strerror() for retrieving an error description.
  • +
  • Change ap_configfile_t, ap_cfg_getline(), + ap_cfg_getc() to return error codes, and add + ap_pcfg_strerror() for retrieving an error description.
  • Any config directive permitted in ACCESS_CONF context must now correctly handle being called from an .htaccess file via the new AllowOverrideList directive. @@ -128,7 +128,7 @@
    http_core (changed)
      -
    • REMOVED ap_default_type, ap_requires, all +
    • REMOVED ap_default_type, ap_requires, all 2.2 authnz API
    • Introduces Optional Functions for logio and authnz
    • New function ap_get_server_name_for_url to support IPv6 @@ -156,11 +156,11 @@
    • Support for mod_request kept_body
    • Support buffering filter data for async requests
    • New CONN_STATE values
    • -
    • Function changes: ap_escape_html updated; +
    • Function changes: ap_escape_html updated; ap_unescape_all, ap_escape_path_segment_buffer
    • Modules that load other modules later than the EXEC_ON_READ config reading stage need to call ap_reserve_module_slots() or - ap_reserve_module_slots_directive() in their + ap_reserve_module_slots_directive() in their pre_config hook.
    • The useragent IP address per request can now be tracked independently of the client IP address of the connection, for @@ -188,16 +188,16 @@
    • New auth_internal API and auth_provider API
    • New EOR bucket type
    • New function ap_process_async_request
    • -
    • New flags AP_AUTH_INTERNAL_PER_CONF and +
    • New flags AP_AUTH_INTERNAL_PER_CONF and AP_AUTH_INTERNAL_PER_URI
    • -
    • New access_checker_ex hook to apply additional access control +
    • New access_checker_ex hook to apply additional access control and/or bypass authentication.
    • -
    • New functions ap_hook_check_access_ex, - ap_hook_check_access, ap_hook_check_authn, - ap_hook_check_authz which accept +
    • New functions ap_hook_check_access_ex, + ap_hook_check_access, ap_hook_check_authn, + ap_hook_check_authz which accept AP_AUTH_INTERNAL_PER_* flags
    • -
    • DEPRECATED direct use of ap_hook_access_checker, - access_checker_ex, ap_hook_check_user_id, +
    • DEPRECATED direct use of ap_hook_access_checker, + access_checker_ex, ap_hook_check_user_id, ap_hook_auth_checker

    When possible, registering all access control hooks (including @@ -210,7 +210,7 @@

    If your module requires the old behavior and must perform access control checks on every sub-request with a different URI from the initial request, even if that URI matches the same set of access - control configuration directives, then use + control configuration directives, then use AP_AUTH_INTERNAL_PER_URI.

    @@ -221,7 +221,7 @@
    mod_cache (changed) -

    Introduces a commit_entity() function to the cache provider +

    Introduces a commit_entity() function to the cache provider interface, allowing atomic writes to cache. Add a cache_status() hook to report the cache decision. All private structures and functions were removed.

    @@ -262,10 +262,10 @@ set_scoreboard (locking uses the new ap_mutex API)
  • NEW API to drop privileges (delegates this platform-dependent function to modules)
  • -
  • NEW Hooks: mpm_query, timed_callback, and +
  • NEW Hooks: mpm_query, timed_callback, and get_name
  • CHANGED interfaces: monitor hook, - ap_reclaim_child_processes, + ap_reclaim_child_processes, ap_relieve_child_processes
  • @@ -358,7 +358,7 @@

    ap_log_*error are now implemented as macros. This means that it is no longer possible to use #ifdef inside the argument list of ap_log_*error, as this would cause - undefined behavor according to C99.

    + undefined behavior according to C99.

    A server_rec pointer must be passed to ap_log_error() when called after startup. This @@ -494,9 +494,9 @@

    This has been renamed to ap_unixd_setup_child(), but most callers should call the added ap_run_drop_privileges() hook.
    -
    conn_rec->remote_ip and +
    conn_rec->remote_ip and conn_rec->remote_addr
    -
    These fields have been renamed in order to distinguish between +
    These fields have been renamed in order to distinguish between the client IP address of the connection and the useragent IP address of the request (potentially overridden by a load balancer or proxy). References to either of these fields must be updated with one of the @@ -510,7 +510,7 @@
  • When you require the IP address of the client that is connected directly to the server, which might be the useragent or might be the load balancer or proxy itself, use - conn_rec->client_ip and + conn_rec->client_ip and conn_rec->client_addr.