- core: 80 chars
- http_core: Clean-uo and style. No functional change overall
- http_core: One more style fix in ap_process_http_async_connection()
- mod_mime: Fix a cppcheck warning
- mod_proxy_ajp: Fix a harmless clang warning
- suexec: avoid a potential sprintf overflow
- mod_headers: This is harmless, but this really should be an 'echo_do *'
- core: Fix typo
- core: Update a comment about the 'PATCH' HTTP command
- mod_proxy_balancer: Fix some HTML syntax issues
trunk patch:
- http://svn.apache.org/r1780282
- http://svn.apache.org/r1814659
- http://svn.apache.org/r1814660
- http://svn.apache.org/r1838285
- http://svn.apache.org/r1842881
- http://svn.apache.org/r1846253
- http://svn.apache.org/r1853757
- http://svn.apache.org/r1851702
- http://svn.apache.org/r1853980
- http://svn.apache.org/r1855614
2.4.x patch: svn merge -c
1780282,
1814659,
1814660,
1838285,
1842881,
1846253,
1853757,
1851702,
1853980,
1855614 ^/httpd/httpd/trunk .
+1: jailletc36, jim, rjung
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/branches/2.4.x@
1860129 13f79535-47bb-0310-9956-
ffa450edef68
-*- coding: utf-8 -*-
Changes with Apache 2.4.40
+ *) Easy patches: synch 2.4.x and trunk
+ - core: 80 chars
+ - http_core: Clean-uo and style. No functional change overall
+ - http_core: One more style fix in ap_process_http_async_connection()
+ - mod_mime: Fix a cppcheck warning
+ - mod_proxy_ajp: Fix a harmless clang warning
+ - suexec: avoid a potential sprintf overflow
+ - mod_headers: This is harmless, but this really should be an 'echo_do *'
+ - core: Fix typo
+ - core: Update a comment about the 'PATCH' HTTP command
+ - mod_proxy_balancer: Fix some HTML syntax issues
+ [Christophe Jaillet]
+
*) When using mod_status with the Event MPM, report the number of requests
associated with an active connection in the "ACC" field. Previously
zero was always reported with this MPM. PR60647. [Eric Covener]
PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
[ start all new proposals below, under PATCHES PROPOSED. ]
- *) Easy patches: synch 2.4.x and trunk
- - core: 80 chars
- - http_core: Clean-uo and style. No functional change overall
- - http_core: One more style fix in ap_process_http_async_connection()
- - mod_mime: Fix a cppcheck warning
- - mod_proxy_ajp: Fix a harmless clang warning
- - suexec: avoid a potential sprintf overflow
- - mod_headers: This is harmless, but this really should be an 'echo_do *'
- - core: Fix typo
- - core: Update a comment about the 'PATCH' HTTP command
- - mod_proxy_balancer: Fix some HTML syntax issues
- trunk patch:
- - http://svn.apache.org/r1780282
- - http://svn.apache.org/r1814659
- - http://svn.apache.org/r1814660
- - http://svn.apache.org/r1838285
- - http://svn.apache.org/r1842881
- - http://svn.apache.org/r1846253
- - http://svn.apache.org/r1853757
- - http://svn.apache.org/r1851702
- - http://svn.apache.org/r1853980
- - http://svn.apache.org/r1855614
- 2.4.x patch: svn merge -c 1780282,1814659,1814660,1838285,1842881,1846253,1853757,1851702,1853980,1855614 ^/httpd/httpd/trunk .
- +1: jailletc36, jim, rjung
- jailletc36: this series relies on r1780280 backport (see above)
PATCHES PROPOSED TO BACKPORT FROM TRUNK:
[ New proposals should be added at the end of the list ]
#define M_CONNECT 4
#define M_OPTIONS 5
#define M_TRACE 6 /** RFC 2616: HTTP */
-#define M_PATCH 7 /** no rfc(!) ### remove this one? */
+#define M_PATCH 7 /** RFC 5789: PATCH Method for HTTP */
#define M_PROPFIND 8 /** RFC 2518: WebDAV */
#define M_PROPPATCH 9 /* : */
#define M_MKCOL 10
AP_DEBUG_ASSERT(cs != NULL);
AP_DEBUG_ASSERT(cs->state == CONN_STATE_READ_REQUEST_LINE);
- while (cs->state == CONN_STATE_READ_REQUEST_LINE) {
+ if (cs->state == CONN_STATE_READ_REQUEST_LINE) {
ap_update_child_status_from_conn(c->sbh, SERVER_BUSY_READ, c);
- if (ap_extended_status) ap_set_conn_count(c->sbh, r, c->keepalives);
+ if (ap_extended_status) {
+ ap_set_conn_count(c->sbh, r, c->keepalives);
+ }
if ((r = ap_read_request(c))) {
-
c->keepalive = AP_CONN_UNKNOWN;
/* process the request if it was read without error */
if (r->status == HTTP_OK) {
cs->state = CONN_STATE_HANDLER;
- if (ap_extended_status) ap_set_conn_count(c->sbh, r, c->keepalives+1);
+ if (ap_extended_status) {
+ ap_set_conn_count(c->sbh, r, c->keepalives + 1);
+ }
ap_update_child_status(c->sbh, SERVER_BUSY_WRITE, r);
ap_process_async_request(r);
/* After the call to ap_process_request, the
if (!r->content_languages && conf->default_language) {
const char **new;
- if (!r->content_languages) {
- r->content_languages = apr_array_make(r->pool, 2, sizeof(char *));
- }
+ r->content_languages = apr_array_make(r->pool, 2, sizeof(char *));
new = (const char **)apr_array_push(r->content_languages);
*new = conf->default_language;
}
static int echo_header(void *v, const char *key, const char *val)
{
- edit_do *ed = v;
+ echo_do *ed = (echo_do *)v;
/* If the input header (key) matches the regex, echo it intact to
* r->headers_out.
if (len < 4 || len > 15)
return UNKNOWN_METHOD;
+ memset(header, 0, sizeof header);
while (*p)
header[i++] = apr_toupper(*p++);
header[i] = '\0';
ap_rprintf(r, "<tr><td>Fails trigger)</td><td><input name='w_hf' id='w_hf' type='text'"
"value='%d'></td></tr>\n", wsel->s->fails);
ap_rprintf(r, "<tr><td>HC uri</td><td><input name='w_hu' id='w_hu' type='text'"
- "value='%s'</td></tr>\n", ap_escape_html(r->pool, wsel->s->hcuri));
+ "value='%s'></td></tr>\n", ap_escape_html(r->pool, wsel->s->hcuri));
ap_rputs("</table>\n</td></tr>\n", r);
}
ap_rputs("<tr><td colspan='2'><input type=submit value='Submit'></td></tr>\n", r);
ap_rprintf(r, "value='%d'></td></tr>\n", bsel->s->max_attempts);
ap_rputs("<tr><td>Disable Failover:</td>", r);
create_radio("b_sforce", bsel->s->sticky_force, r);
+ ap_rputs("</tr>\n", r);
ap_rputs("<tr><td>Sticky Session:</td><td><input name='b_ss' id='b_ss' size=64 type=text ", r);
if (strcmp(bsel->s->sticky, bsel->s->sticky_path)) {
ap_rvputs(r, "value ='", bsel->s->sticky, " | ",
return (ap_scoreboard_image ? 1 : 0);
}
-AP_DECLARE(void) ap_set_conn_count(ap_sb_handle_t *sb, request_rec *r, unsigned short conn_count)
+AP_DECLARE(void) ap_set_conn_count(ap_sb_handle_t *sb, request_rec *r,
+ unsigned short conn_count)
{
worker_score *ws;
type = "Binary operator";
break;
default:
- *parms->err = "Inavalid expression type in expr_lookup";
+ *parms->err = "Invalid expression type in expr_lookup";
return !OK;
}
if ( parms->type == AP_EXPR_FUNC_OP_UNARY
static void clean_env(void)
{
- char pathbuf[512];
char **cleanenv;
char **ep;
int cidx = 0;
exit(123);
}
- sprintf(pathbuf, "PATH=%s", AP_SAFE_PATH);
- cleanenv[cidx] = strdup(pathbuf);
+ cleanenv[cidx] = strdup("PATH=" AP_SAFE_PATH);
if (cleanenv[cidx] == NULL) {
log_err("failed to malloc memory for environment\n");
exit(124);