]> git.ipfire.org Git - thirdparty/apache/httpd.git/commitdiff
* IMHO this one is at least stalled
authorRuediger Pluem <rpluem@apache.org>
Sat, 29 Nov 2008 21:08:55 +0000 (21:08 +0000)
committerRuediger Pluem <rpluem@apache.org>
Sat, 29 Nov 2008 21:08:55 +0000 (21:08 +0000)
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.2.x@721718 13f79535-47bb-0310-9956-ffa450edef68

STATUS

diff --git a/STATUS b/STATUS
index 180d325f1bf0fd4a2fb94a01dd3f991b9ab06e1a..26347208cf44ae03831d9fed2bd1f2fd4aeabdbb 100644 (file)
--- a/STATUS
+++ b/STATUS
@@ -100,6 +100,37 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
     http://svn.apache.org/viewvc?view=rev&revision=657459
     +1: niq, rpluem
 
+   * mod_ssl: Add server name indication (RFC 4366) support (PR 34607).
+      Trunk version of patches:
+         http://svn.apache.org/viewvc?view=rev&revision=606190
+         http://svn.apache.org/viewvc?view=rev&revision=607420
+         http://svn.apache.org/viewvc?view=rev&revision=607425
+         http://svn.apache.org/viewvc?view=rev&revision=611216
+         http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c?r1=611216&r2=630436
+         http://svn.apache.org/viewvc?view=rev&revision=662815
+
+      Backport version for 2.2.x of updated patch:
+         http://people.apache.org/~fuankg/diffs/httpd-2.2.x-sni.diff
+      +1: fuankg
+      +0: like ssl upgrade of 2.2, perhaps this is a good reason to bring
+          httpd-2.4 to completion?  vhost changes could be disruptive to
+          third party module authors.
+      -1: rpluem: jorton found some problems with the trunk version and they
+                  should be fixed / discussed in trunk before we backport.
+          pquerna: Until issues for this feature are fixed in trunk, we can not
+                   backport it.
+
+   * core: Allow ap_invoke_handler to pass AP_FILTER_ERROR through as if it
+     were a reserved return code (OK/DECLINED) instead of converting it to 
+     internal server error.
+      Trunk version of patch:
+        http://svn.apache.org/viewvc?rev=721679&view=rev
+      Backport version for 2.2.x of updated patch:
+        http://people.apache.org/~covener/2.2.x-ap_filter_error.diff
+      +1: covener
+
+PATCHES/ISSUES THAT ARE STALLED
+
   * srclib/pcre and vendor/pcre
     http://www.vuxml.org/freebsd/pkg-pcre.html
 
@@ -139,36 +170,6 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
     -1: pgollucci
 
    * mod_ssl: Add server name indication (RFC 4366) support (PR 34607).
-      Trunk version of patches:
-         http://svn.apache.org/viewvc?view=rev&revision=606190
-         http://svn.apache.org/viewvc?view=rev&revision=607420
-         http://svn.apache.org/viewvc?view=rev&revision=607425
-         http://svn.apache.org/viewvc?view=rev&revision=611216
-         http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/ssl/ssl_engine_kernel.c?r1=611216&r2=630436
-         http://svn.apache.org/viewvc?view=rev&revision=662815
-
-      Backport version for 2.2.x of updated patch:
-         http://people.apache.org/~fuankg/diffs/httpd-2.2.x-sni.diff
-      +1: fuankg
-      +0: like ssl upgrade of 2.2, perhaps this is a good reason to bring
-          httpd-2.4 to completion?  vhost changes could be disruptive to
-          third party module authors.
-      -1: rpluem: jorton found some problems with the trunk version and they
-                  should be fixed / discussed in trunk before we backport.
-          pquerna: Until issues for this feature are fixed in trunk, we can not
-                   backport it.
-
-   * core: Allow ap_invoke_handler to pass AP_FILTER_ERROR through as if it
-     were a reserved return code (OK/DECLINED) instead of converting it to 
-     internal server error.
-      Trunk version of patch:
-        http://svn.apache.org/viewvc?rev=721679&view=rev
-      Backport version for 2.2.x of updated patch:
-        http://people.apache.org/~covener/2.2.x-ap_filter_error.diff
-      +1: covener
-
-PATCHES/ISSUES THAT ARE STALLED
-
  * core, authn/z: Avoid calling access control hooks for internal requests
    with configurations which match those of initial request.  Revert to
    original behaviour (call access control hooks for internal requests