You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by wr...@apache.org on 2013/02/12 06:40:30 UTC

svn commit: r1445036 - /httpd/httpd/branches/2.2.x/STATUS

Author: wrowe
Date: Tue Feb 12 05:40:30 2013
New Revision: 1445036

URL: http://svn.apache.org/r1445036
Log:
Accept (and for some, promote) a number of good patches

Modified:
    httpd/httpd/branches/2.2.x/STATUS

Modified: httpd/httpd/branches/2.2.x/STATUS
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.2.x/STATUS?rev=1445036&r1=1445035&r2=1445036&view=diff
==============================================================================
--- httpd/httpd/branches/2.2.x/STATUS (original)
+++ httpd/httpd/branches/2.2.x/STATUS Tue Feb 12 05:40:30 2013
@@ -100,6 +100,55 @@ PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
      2.2.x patch: http://people.apache.org/~covener/patches/2.2.x-byterange-table_clear.diff
      +1: covener, rjung, trawick
 
+  * mod_cache: Allow providers to decide whether to cache responses with code
+    206.
+    Trunk version of patch:
+      http://svn.apache.org/viewvc?rev=952823&view=rev
+    Backport version for 2.2.x of patch:
+      Trunk version of patch works
+    +1: rpluem, rjung, wrowe
+
+   * mod_proxy_http: Use the same hostname for SNI as for the HTTP request when
+     forwarding to SSL backends.
+     PR: 53134
+     Based on a patch from: Michael Weiser <michael weiser.dinsnail.net>
+     trunk patch: http://svn.apache.org/viewvc?view=revision&revision=1333969
+     2.4.x patch: http://svn.apache.org/viewvc?view=revision&revision=1356881
+     2.2.x patch: http://people.apache.org/~rjung/patches/mod_proxy_http-fix-hostname-ssl-2_2.patch
+     +1: rjung, covener, wrowe
+     kbrand: only has an effect if r1175416 is backported, too (see note at
+             https://issues.apache.org/bugzilla/show_bug.cgi?id=53134#c10
+             by the patch author)
+
+   * server/mpm_unix.c (dummy_connection): Use a TLS 1.0 close_notify
+     alert if the chosen listener is configured for https; not perfect
+     but better than sending an HTTP request.  Adjust comments.
+     Based on a patch from: Michael Weiser <michael weiser.dinsnail.net>
+     trunk patch: http://svn.apache.org/viewvc?view=revision&revision=1327036 and
+                  http://svn.apache.org/viewvc?view=revision&revision=1327080
+     2.4.x patch: http://svn.apache.org/viewvc?view=revision&revision=1356884
+     2.2.x patch: http://people.apache.org/~rjung/patches/dummy_connection-https-tls-2_2.patch
+     +1: rjung, covener, wrowe
+
+   * ab: add TLS1.1/TLS1.2 options to -f switch, and adapt output
+     to more accurately report the negotiated protocol. PR 53916.
+     trunk patch: https://svn.apache.org/viewvc?view=revision&revision=1395225
+     2.2.x patch: https://people.apache.org/~kbrand/ab-tlsv1_x-2.2.x.patch
+     +1: kbrand, covener, wrowe
+
+   * modules/ldap/util_ldap.c: Correct erroneous messages
+     PR: 53402
+     trunk and 2.4.x: Erroneous message about LDAPSharedCacheSize
+       http://svn.apache.org/viewvc?view=revision&sortby=date&revision=1096577
+     trunk and 2.4.x: Erroneous order for the parameters
+       http://svn.apache.org/viewvc?view=revision&sortby=date&revision=627637
+     2.2.x patch: attached in PR 53402 (https://issues.apache.org/bugzilla/attachment.cgi?id=29502)
+     +1: jailletc36, covener, wrowe
+
+   * mod_ssl: fix UID env var regression introduced in 2.2.15. PR54510.
+     2.2.x patch: https://people.apache.org/~kbrand/ssl_vars_uid_PR54510.patch
+     +1: kbrand, druggeri, wrowe
+
 PATCHES PROPOSED TO BACKPORT FROM TRUNK:
   [ New proposals should be added at the end of the list ]
 
@@ -134,14 +183,6 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
                   mod_ssl is not loaded, but right now it would fail.
                   An mmn minor bump would also be required for API addition.
 
-  * mod_cache: Allow providers to decide whether to cache responses with code
-    206.
-    Trunk version of patch:
-      http://svn.apache.org/viewvc?rev=952823&view=rev
-    Backport version for 2.2.x of patch:
-      Trunk version of patch works
-    +1: rpluem, rjung
-
    * mod_ssl: Add RFC 5878 support. This allows support of mechanisms
               such as Certificate Transparency. Note that new
               mechanisms are supported without software updates.
@@ -175,63 +216,26 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
                   http://svn.apache.org/viewvc?view=revision&revision=1328326
      2.4.x patch: http://svn.apache.org/viewvc?view=revision&revision=1334346
      2.2.x patch: http://people.apache.org/~rjung/patches/improve-speaking-http-on-https-message-2_2.patch
-     +1: rjung
-
-   * mod_proxy_http: Use the same hostname for SNI as for the HTTP request when
-     forwarding to SSL backends.
-     PR: 53134
-     Based on a patch from: Michael Weiser <michael weiser.dinsnail.net>
-     trunk patch: http://svn.apache.org/viewvc?view=revision&revision=1333969
-     2.4.x patch: http://svn.apache.org/viewvc?view=revision&revision=1356881
-     2.2.x patch: http://people.apache.org/~rjung/patches/mod_proxy_http-fix-hostname-ssl-2_2.patch
-     +1: rjung, covener
-     kbrand: only has an effect if r1175416 is backported, too (see note at
-             https://issues.apache.org/bugzilla/show_bug.cgi?id=53134#c10
-             by the patch author)
-
-   * server/mpm_unix.c (dummy_connection): Use a TLS 1.0 close_notify
-     alert if the chosen listener is configured for https; not perfect
-     but better than sending an HTTP request.  Adjust comments.
-     Based on a patch from: Michael Weiser <michael weiser.dinsnail.net>
-     trunk patch: http://svn.apache.org/viewvc?view=revision&revision=1327036 and
-                  http://svn.apache.org/viewvc?view=revision&revision=1327080
-     2.4.x patch: http://svn.apache.org/viewvc?view=revision&revision=1356884
-     2.2.x patch: http://people.apache.org/~rjung/patches/dummy_connection-https-tls-2_2.patch
-     +1: rjung, covener
-
-   * ab: add TLS1.1/TLS1.2 options to -f switch, and adapt output
-     to more accurately report the negotiated protocol. PR 53916.
-     trunk patch: https://svn.apache.org/viewvc?view=revision&revision=1395225
-     2.2.x patch: https://people.apache.org/~kbrand/ab-tlsv1_x-2.2.x.patch
-     +1: kbrand, covener
+     +1: rjung, wrowe
 
    * mod_dir: Support for the 'disabled' FallbackResource argument
      trunk patch : https://svn.apache.org/viewvc?view=revision&revision=1398066
      Also suggested for backport to 2.4
      2.2.x src patch: trunk patch works
      2.2.x documentation patch : http://apache-doc-fr.gryzor.com/fallbackresource_disabled_2.2_doc.patch
-     +1: gryzor
-
-   * modules/ldap/util_ldap.c: Correct erroneous messages
-     PR: 53402
-     trunk and 2.4.x: Erroneous message about LDAPSharedCacheSize
-                  http://svn.apache.org/viewvc?view=revision&sortby=date&revision=1096577
-     trunk and 2.4.x: Erroneous order for the parameters
-                  http://svn.apache.org/viewvc?view=revision&sortby=date&revision=627637
-     2.2.x patch: attached in PR 53402 (https://issues.apache.org/bugzilla/attachment.cgi?id=29502)
-     +1: jailletc36, covener
+     +1: gryzor, wrowe
 
    * mod_ldap: restore LDAP_UNAVAILABLE for windows SDK (PR 54140)
      trunk patch: http://svn.apache.org/viewvc?rev=1408402&view=rev
      2.4.x patch: http://svn.apache.org/viewvc?rev=1409773&view=rev
      2.2.x patch: http://people.apache.org/~covener/patches/httpd-2.2.x-ldap_unavailable.diff 
                  (just context conflicts)
-     +1: covener
+     +1: covener, wrowe
 
    * mod_ssl: PR 52162: log revoked certificates at level INFO instead of DEBUG
      trunk/2.4.x: Changed as part of http://svn.apache.org/viewvc?rev=1165056&view=rev
      2.2.x patch: https://issues.apache.org/bugzilla/attachment.cgi?id=27913
-     +1: sf
+     +1: sf, wrowe
 
    * mod_authnz_ldap: Allow using exec: callouts like SSLPassphraseDialog
      for AuthLDAPBindPassword.
@@ -239,6 +243,8 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
      2.2.x patch: http://people.apache.org/~druggeri/patches/AuthLDAPBindPasswordExec-2.2.patch
                   (20130119 - updated to include minor mmn bump)
      +1: druggeri
+     -1: wrowe (switch to +1 once ap_get_exec_line is made thread-safe)
+               kudos for using apr_tokenize_to_argv to allow spaces in args.
 
    * mod_proxy_ajp: Support unknown HTTP methods. PR54416.
      Forward unknown methods as request attributes
@@ -253,11 +259,7 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
      2.2.x patch: http://people.apache.org/~rjung/patches/httpd-2_2_x-ajp-unknown_-methods.patch
                   plus CHANGES
                   Difference to 2.4.x only in logging.
-     +1: rjung
-
-   * mod_ssl: fix UID env var regression introduced in 2.2.15. PR54510.
-     2.2.x patch: https://people.apache.org/~kbrand/ssl_vars_uid_PR54510.patch
-     +1: kbrand, druggeri
+     +1: rjung, wrowe
 
 PATCHES/ISSUES THAT ARE STALLED