From: Vincent Bray
Date: Wed, 20 Aug 2008 22:55:37 +0000 (+0000)
Subject: Update transformations
X-Git-Tag: 2.3.0~341
X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=955382a02455d20421e59b22b05ebb170a11c3c2;p=thirdparty%2Fapache%2Fhttpd.git
Update transformations
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@687496 13f79535-47bb-0310-9956-ffa450edef68
---
diff --git a/docs/manual/mod/mod_proxy_http.html.en b/docs/manual/mod/mod_proxy_http.html.en
index 396ba6106ae..6fdc34486a0 100644
--- a/docs/manual/mod/mod_proxy_http.html.en
+++ b/docs/manual/mod/mod_proxy_http.html.en
@@ -75,10 +75,10 @@
proxy-nokeepalive
Forces the proxy to close the backend connection after
each request.
- Proxy-Chain-Auth
+ proxy-chain-auth
If the proxy requires authentication, it will read and
consume the proxy authentication credentials sent by the client.
- With Proxy-Chain-Auth it will also forward
+ With proxy-chain-auth it will also forward
the credentials to the next proxy in the chain. This may
be necessary if you have a chain of proxies that share
authentication information. Security Warning:
@@ -109,6 +109,16 @@
proxy-interim-response RFC
to be fully protocol
compliant, or proxy-interim-response Suppress
to suppress interim responses.
+ proxy-initial-not-pooled
+ If this variable is set no pooled connection will be reused
+ if the client connection is an initial connection. This avoids
+ the "proxy: error reading status line from remote server" error message
+ caused by the race condition that the backend server closed the
+ pooled connection after the connection check by the proxy and
+ before data send by the proxy reached the backend. It has to be
+ kept in mind that setting this variable downgrades performance,
+ especially with HTTP/1.0 clients.
+
diff --git a/docs/manual/mod/mod_ssl.html.en b/docs/manual/mod/mod_ssl.html.en
index a16230f796a..b6919b86470 100644
--- a/docs/manual/mod/mod_ssl.html.en
+++ b/docs/manual/mod/mod_ssl.html.en
@@ -361,10 +361,10 @@ authentication. Because although placing a CA certificate of the
server certificate chain into SSLCACertificatePath
has the same effect
for the certificate chain construction, it has the side-effect that
client certificates issued by this same CA certificate are also
-accepted on client authentication. That's usually not one expect.
+accepted on client authentication.
But be careful: Providing the certificate chain works only if you are using a
-single (either RSA or DSA) based server certificate. If you are
+single RSA or DSA based server certificate. If you are
using a coupled RSA+DSA certificate pair, this will work only if actually both
certificates use the same certificate chain. Else the browsers will be
confused in this situation.
diff --git a/docs/manual/rewrite/rewrite_guide.html.en b/docs/manual/rewrite/rewrite_guide.html.en
index ba7a703b44d..9c29c21997f 100644
--- a/docs/manual/rewrite/rewrite_guide.html.en
+++ b/docs/manual/rewrite/rewrite_guide.html.en
@@ -306,13 +306,13 @@ RewriteEngine on
# first try to find it in dir1/...
# ...and if found stop and be happy:
-RewriteCond /your/docroot/dir1/%{REQUEST_FILENAME} -f
-RewriteRule ^(.+) /your/docroot/dir1/$1 [L]
+RewriteCond %{DOCUMENT_ROOT}/dir1/%{REQUEST_FILENAME} -f
+RewriteRule ^(.+) %{DOCUMENT_ROOT}/dir1/$1 [L]
# second try to find it in dir2/...
# ...and if found stop and be happy:
-RewriteCond /your/docroot/dir2/%{REQUEST_FILENAME} -f
-RewriteRule ^(.+) /your/docroot/dir2/$1 [L]
+RewriteCond %{DOCUMENT_ROOT}/dir2/%{REQUEST_FILENAME} -f
+RewriteRule ^(.+) %{DOCUMENT_ROOT}/dir2/$1 [L]
# else go on for other Alias or ScriptAlias directives,
# etc.