From: Christophe Jaillet Date: Sun, 13 Apr 2014 21:03:53 +0000 (+0000) Subject: Add notes for changes made in version 2.4.7 + synch formating with... X-Git-Url: http://git.ipfire.org/cgi-bin/gitweb.cgi?a=commitdiff_plain;h=a51fa99f3bfb9858871c85a6b24384b1a6458516;p=thirdparty%2Fapache%2Fhttpd.git Add notes for changes made in version 2.4.7 + synch formating with 2.4.x git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1587097 13f79535-47bb-0310-9956-ffa450edef68 --- diff --git a/docs/manual/mod/mod_filter.xml b/docs/manual/mod/mod_filter.xml index 280ff4ee5d5..ccf76b64cb8 100644 --- a/docs/manual/mod/mod_filter.xml +++ b/docs/manual/mod/mod_filter.xml @@ -416,7 +416,7 @@ for a complete reference and examples.
change=yes|no
Specifies whether the filter changes the content, including possibly - the content length.
+ the content length. The "no" argument is supported in 2.4.7 and later.
change=1:1
The filter changes the content, but will not change the content diff --git a/docs/manual/mod/mod_headers.xml b/docs/manual/mod/mod_headers.xml index d090b18e797..0097d305059 100644 --- a/docs/manual/mod/mod_headers.xml +++ b/docs/manual/mod/mod_headers.xml @@ -259,7 +259,8 @@ Header merge Cache-Control no-store env=NO_STORE
setifempty
The request header is set, but only if there is no previous header - with this name. Available in 2.4.7 and later.
+ with this name.
+ Available in 2.4.7 and later.
unset
The request header of this name is removed, if it exists. If @@ -315,7 +316,7 @@ Header merge Cache-Control no-store env=NO_STORE server configvirtual host directory.htaccess FileInfo -SetIfEmpty available in 2.4.7 and later +SetIfEmpty and note available in 2.4.7 and later

This directive can replace, merge or remove HTTP response @@ -406,7 +407,8 @@ Header merge Cache-Control no-store env=NO_STORE

setifempty
The request header is set, but only if there is no previous header - with this name. Available in 2.4.7 and later.
+ with this name.
+ Available in 2.4.7 and later.
unset
The response header of this name is removed, if it exists. @@ -417,7 +419,8 @@ Header merge Cache-Control no-store env=NO_STORE
The value of the named response header is copied into an internal note whose name is given by value. This is useful if a header sent by a CGI or proxied resource is configured to be unset - but should also be logged.
+ but should also be logged.
+ Available in 2.4.7 and later.
@@ -499,8 +502,8 @@ Header merge Cache-Control no-store env=NO_STORE

For edit there is both a value argument which is a regular expression, - and an additional replacement string. The replacement string - may also contain format specifiers.

+ and an additional replacement string. As of version 2.4.7 + the replacement string may also contain format specifiers.

The Header directive may be followed by an additional argument, which may be any of:

diff --git a/docs/manual/mod/mod_ldap.xml b/docs/manual/mod/mod_ldap.xml index 8cb27f02d93..672c5d69d29 100644 --- a/docs/manual/mod/mod_ldap.xml +++ b/docs/manual/mod/mod_ldap.xml @@ -72,9 +72,9 @@ LDAPOpCacheTTL 600 <Location /ldap-status> SetHandler ldap-status - + Require host yourdomain.example.com - + Satisfy any AuthType Basic AuthName "LDAP Protected" @@ -107,9 +107,9 @@ LDAPOpCacheTTL 600 credentials used when binding to an LDAP server. These credentials can be provided to LDAP servers that do not allow anonymous binds during referral chasing. To control - this feature, see the - LDAPReferrals and - LDAPReferralHopLimit + this feature, see the + LDAPReferrals and + LDAPReferralHopLimit directives. By default, this feature is enabled.

@@ -197,26 +197,26 @@ LDAPOpCacheTTL 600
Using SSL/TLS

The ability to create an SSL and TLS connections to an LDAP server - is defined by the directives - LDAPTrustedGlobalCert, + is defined by the directives + LDAPTrustedGlobalCert, LDAPTrustedClientCert - and LDAPTrustedMode. - These directives specify the CA and optional client certificates to be used, - as well as the type of encryption to be used on the connection (none, SSL or + and LDAPTrustedMode. + These directives specify the CA and optional client certificates to be used, + as well as the type of encryption to be used on the connection (none, SSL or TLS/STARTTLS).

-# Establish an SSL LDAP connection on port 636. Requires that -# mod_ldap and mod_authnz_ldap be loaded. Change the +# Establish an SSL LDAP connection on port 636. Requires that +# mod_ldap and mod_authnz_ldap be loaded. Change the # "yourdomain.example.com" to match your domain. LDAPTrustedGlobalCert CA_DER /certs/certfile.der <Location /ldap-status> SetHandler ldap-status - + Require host yourdomain.example.com - + Satisfy any AuthType Basic AuthName "LDAP Protected" @@ -227,17 +227,17 @@ LDAPTrustedGlobalCert CA_DER /certs/certfile.der -# Establish a TLS LDAP connection on port 389. Requires that -# mod_ldap and mod_authnz_ldap be loaded. Change the +# Establish a TLS LDAP connection on port 389. Requires that +# mod_ldap and mod_authnz_ldap be loaded. Change the # "yourdomain.example.com" to match your domain. LDAPTrustedGlobalCert CA_DER /certs/certfile.der <Location /ldap-status> SetHandler ldap-status - + Require host yourdomain.example.com - + Satisfy any AuthType Basic AuthName "LDAP Protected" @@ -356,9 +356,9 @@ LDAPTrustedGlobalCert CA_DER /certs/cacert1.der LDAPTrustedGlobalCert CA_BASE64 /certs/cacert2.pem <Location /ldap-status> SetHandler ldap-status - + Require host yourdomain.example.com - + LDAPTrustedClientCert CERT_BASE64 /certs/cert1.pem LDAPTrustedClientCert KEY_BASE64 /certs/key1.pem # CA certs respecified due to per-directory client certs @@ -497,7 +497,7 @@ valid AuthConfig -

This directive, if enabled by the LDAPReferrals directive, +

This directive, if enabled by the LDAPReferrals directive, limits the number of referral hops that are followed before terminating an LDAP query.

@@ -510,40 +510,40 @@ valid LDAPReferrals Enable referral chasing during queries to the LDAP server. -LDAPReferrals On|Off|default +LDAPReferrals On|Off|default LDAPReferrals On directory.htaccess AuthConfig +The default parameter is available in Apache 2.4.7 and later

Some LDAP servers divide their directory among multiple domains and use referrals to direct a client when a domain boundary is crossed. This is similar to a HTTP redirect. - LDAP client libraries may or may not chase referrals by default. This directive - explicitly configures the referral chasing in the underlying SDK.

- - -

LDAPReferrals takes the takes the following values:

+ LDAP client libraries may or may not chase referrals by default. This directive + explicitly configures the referral chasing in the underlying SDK.

+ +

LDAPReferrals takes the following values:

"on"

When set to "on", the underlying SDK's referral chasing state - is enabled, LDAPReferralHopLimit is used to - override the SDK's hop limit, and an LDAP rebind callback is + is enabled, LDAPReferralHopLimit is used to + override the SDK's hop limit, and an LDAP rebind callback is registered.

"off"

When set to "off", the underlying SDK's referral chasing state is disabled completely.

"default"

When set to "default", the underlying SDK's referral chasing state - is not changed, LDAPReferralHopLimit is not - used to overide the SDK's hop limit, and no LDAP rebind callback is + is not changed, LDAPReferralHopLimit is not + used to overide the SDK's hop limit, and no LDAP rebind callback is registered.

-

The directive LDAPReferralHopLimit works in conjunction with +

The directive LDAPReferralHopLimit works in conjunction with this directive to limit the number of referral hops to follow before terminating the LDAP query. - When referral processing is enabled by a value of "On", client credentials will be provided, - via a rebind callback, for any LDAP server requiring them.

+ When referral processing is enabled by a value of "On", client credentials will be provided, + via a rebind callback, for any LDAP server requiring them.

@@ -556,7 +556,7 @@ valid

If LDAPRetryDelay is set to a non-zero - value, the server will delay retrying an LDAP request for the + value, the server will delay retrying an LDAP request for the specified amount of time. Setting this directive to 0 will result in any retry to occur without delay.

@@ -571,7 +571,7 @@ valid LDAPRetries 3 server config -

The server will retry failed LDAP requests up to +

The server will retry failed LDAP requests up to LDAPRetries times. Setting this directive to 0 disables retries.

LDAP errors such as timeouts and refused connections are retryable.

@@ -757,10 +757,10 @@ connection client certificates. connection pool. The default value of -1, and any other negative value, allows connections of any age to be reused.

-

The timemout is based on when the LDAP connection is returned to the +

The timemout is based on when the LDAP connection is returned to the pool, not based on the last time I/O has been performed over the backend connection. If the information is cached, the apparent idle time can exceed - the LDAPConnectionPoolTTL.

+ the LDAPConnectionPoolTTL.

This timeout defaults to units of seconds, but accepts suffixes for milliseconds (ms), minutes (min), and hours (h). diff --git a/docs/manual/mod/mod_logio.xml b/docs/manual/mod/mod_logio.xml index e7acb129403..6bbeafc6717 100644 --- a/docs/manual/mod/mod_logio.xml +++ b/docs/manual/mod/mod_logio.xml @@ -70,7 +70,8 @@ %S Bytes transferred (received and sent), including request and headers, - cannot be zero. This is the combination of %I and %O. + cannot be zero. This is the combination of %I and %O.
+ Available in Apache 2.4.7 and later

Usually, the functionality is used like this:

diff --git a/docs/manual/mod/mod_session_crypto.xml b/docs/manual/mod/mod_session_crypto.xml index c2446c251dd..dd8e7da98f2 100644 --- a/docs/manual/mod/mod_session_crypto.xml +++ b/docs/manual/mod/mod_session_crypto.xml @@ -175,8 +175,9 @@ SessionCryptoPassphrase secret secret to the end of the list, and once rolled out completely to all servers, remove the first key from the start of the list.

-

If the value begins with exec: the resulting command will be executed and the - first line returned to standard output by the program will be used as the key.

+

As of version 2.4.7 if the value begins with exec: the resulting command + will be executed and the first line returned to standard output by the program will be + used as the key.

 #key used as-is
 SessionCryptoPassphrase secret