From: Vincent Bray Date: Wed, 20 Aug 2008 22:55:37 +0000 (+0000) Subject: Update transformations X-Git-Tag: 2.3.0~341 X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=955382a02455d20421e59b22b05ebb170a11c3c2;p=thirdparty%2Fapache%2Fhttpd.git Update transformations git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@687496 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_proxy_http.html.en b/docs/manual/mod/mod_proxy_http.html.en index 396ba6106ae..6fdc34486a0 100644 --- a/docs/manual/mod/mod_proxy_http.html.en +++ b/docs/manual/mod/mod_proxy_http.html.en @@ -75,10 +75,10 @@
proxy-nokeepalive
Forces the proxy to close the backend connection after each request.
-
Proxy-Chain-Auth
+
proxy-chain-auth
If the proxy requires authentication, it will read and consume the proxy authentication credentials sent by the client. - With Proxy-Chain-Auth it will also forward + With proxy-chain-auth it will also forward the credentials to the next proxy in the chain. This may be necessary if you have a chain of proxies that share authentication information. Security Warning: @@ -109,6 +109,16 @@ proxy-interim-response RFC to be fully protocol compliant, or proxy-interim-response Suppress to suppress interim responses.
+
proxy-initial-not-pooled
+
If this variable is set no pooled connection will be reused + if the client connection is an initial connection. This avoids + the "proxy: error reading status line from remote server" error message + caused by the race condition that the backend server closed the + pooled connection after the connection check by the proxy and + before data send by the proxy reached the backend. It has to be + kept in mind that setting this variable downgrades performance, + especially with HTTP/1.0 clients. +
diff --git a/docs/manual/mod/mod_ssl.html.en b/docs/manual/mod/mod_ssl.html.en index a16230f796a..b6919b86470 100644 --- a/docs/manual/mod/mod_ssl.html.en +++ b/docs/manual/mod/mod_ssl.html.en @@ -361,10 +361,10 @@ authentication. Because although placing a CA certificate of the server certificate chain into SSLCACertificatePath has the same effect for the certificate chain construction, it has the side-effect that client certificates issued by this same CA certificate are also -accepted on client authentication. That's usually not one expect.

+accepted on client authentication.

But be careful: Providing the certificate chain works only if you are using a -single (either RSA or DSA) based server certificate. If you are +single RSA or DSA based server certificate. If you are using a coupled RSA+DSA certificate pair, this will work only if actually both certificates use the same certificate chain. Else the browsers will be confused in this situation.

diff --git a/docs/manual/rewrite/rewrite_guide.html.en b/docs/manual/rewrite/rewrite_guide.html.en index ba7a703b44d..9c29c21997f 100644 --- a/docs/manual/rewrite/rewrite_guide.html.en +++ b/docs/manual/rewrite/rewrite_guide.html.en @@ -306,13 +306,13 @@ RewriteEngine on # first try to find it in dir1/... # ...and if found stop and be happy: -RewriteCond /your/docroot/dir1/%{REQUEST_FILENAME} -f -RewriteRule ^(.+) /your/docroot/dir1/$1 [L] +RewriteCond %{DOCUMENT_ROOT}/dir1/%{REQUEST_FILENAME} -f +RewriteRule ^(.+) %{DOCUMENT_ROOT}/dir1/$1 [L] # second try to find it in dir2/... # ...and if found stop and be happy: -RewriteCond /your/docroot/dir2/%{REQUEST_FILENAME} -f -RewriteRule ^(.+) /your/docroot/dir2/$1 [L] +RewriteCond %{DOCUMENT_ROOT}/dir2/%{REQUEST_FILENAME} -f +RewriteRule ^(.+) %{DOCUMENT_ROOT}/dir2/$1 [L] # else go on for other Alias or ScriptAlias directives, # etc.