You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by rp...@apache.org on 2013/01/16 16:37:16 UTC
svn commit: r1433988 - in /httpd/httpd/trunk: CHANGES
modules/proxy/mod_proxy_http.c
Author: rpluem
Date: Wed Jan 16 15:37:16 2013
New Revision: 1433988
URL: http://svn.apache.org/viewvc?rev=1433988&view=rev
Log:
* A limit of zero means unlimited for LimitRequestBody.
PR: 54435
Submitted by: Pavel Mateja <pavel netsafe.cz>
Reviewed by: rpluem
Modified:
httpd/httpd/trunk/CHANGES
httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
Modified: httpd/httpd/trunk/CHANGES
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/CHANGES?rev=1433988&r1=1433987&r2=1433988&view=diff
==============================================================================
--- httpd/httpd/trunk/CHANGES [utf-8] (original)
+++ httpd/httpd/trunk/CHANGES [utf-8] Wed Jan 16 15:37:16 2013
@@ -1,9 +1,12 @@
-*- coding: utf-8 -*-
Changes with Apache 2.5.0
+ *) mod_proxy_http: Honour special value 0 (unlimited) of LimitRequestBody
+ PR 54435. [Pavel Mateja <pavel netsafe.cz>]
+
*) mod_lua: Add bindings for apr_dbd/mod_dbd database access
[Daniel Gruno]
-
+
*) mod_authn_file, mod_authn_dbd, mod_authn_dbm, mod_authn_socache:
Cache the result of the most recent password hash verification for every
keep-alive connection. This saves some expensive calculations.
Modified: httpd/httpd/trunk/modules/proxy/mod_proxy_http.c
URL: http://svn.apache.org/viewvc/httpd/httpd/trunk/modules/proxy/mod_proxy_http.c?rev=1433988&r1=1433987&r2=1433988&view=diff
==============================================================================
--- httpd/httpd/trunk/modules/proxy/mod_proxy_http.c (original)
+++ httpd/httpd/trunk/modules/proxy/mod_proxy_http.c Wed Jan 16 15:37:16 2013
@@ -587,7 +587,7 @@ static int spool_reqbody_cl(apr_pool_t *
* Let it take effect if we decide to store the body in a
* temporary file on disk.
*/
- if (bytes_spooled + bytes > limit) {
+ if (limit && (bytes_spooled + bytes > limit)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r, APLOGNO(01088)
"Request body is larger than the configured "
"limit of %" APR_OFF_T_FMT, limit);