You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by yl...@apache.org on 2019/05/24 07:45:12 UTC
svn commit: r1859842 - /httpd/httpd/branches/2.4.x/STATUS
Author: ylavic
Date: Fri May 24 07:45:12 2019
New Revision: 1859842
URL: http://svn.apache.org/viewvc?rev=1859842&view=rev
Log:
Vote, promote.
Modified:
httpd/httpd/branches/2.4.x/STATUS
Modified: httpd/httpd/branches/2.4.x/STATUS
URL: http://svn.apache.org/viewvc/httpd/httpd/branches/2.4.x/STATUS?rev=1859842&r1=1859841&r2=1859842&view=diff
==============================================================================
--- httpd/httpd/branches/2.4.x/STATUS (original)
+++ httpd/httpd/branches/2.4.x/STATUS Fri May 24 07:45:12 2019
@@ -164,6 +164,32 @@ PATCHES ACCEPTED TO BACKPORT FROM TRUNK:
+1: jailletc36, jim, rjung
jailletc36: this series relies on r1780280 backport (see above)
+ *) mod_proxy: allow SSLProxyCheckPeer* usage for all proxy modules.
+ PR 61857. [Yann Ylavic]
+ Proposed (for trunk) by: Markus Gausling <markusgausling googlemail.com>
+ Reviewed (for trunk) by: ylavic
+ This also makes backporting the fixes for PR 63430 simpler and reduces code drift.
+ trunk patch: http://svn.apache.org/r1818726
+ 2.4.x patch: http://home.apache.org/~rjung/patches/httpd-2.4.x-proxy-request-hostname.patch
+ +1: rjung, rpluem, ylavic
+ -1:
+
+ *) mod_proxy/ssl: Proxy SSL client certificate configuration and other proxy
+ SSL configurations broken inside <Proxy> context. PR 63430.
+ [Ruediger Pluem, Yann Ylavic]
+ Plus:
+ Follow up to r1859371: extend to other ap_proxy_connection_create[_ex]() users.
+ This function now now handles SSL reuse as well as the "proxy-request-hostname"
+ note (SNI), so let's also call it unconditionnaly in all proxy modules.
+ On the mod_ssl side, since this note has the lifetime of the connection, don't
+ reset/unset it during handshake (ssl_io_filter_handshake).
+ The 2.4 backport patch applies clean after backporting r1818726 above.
+ trunk patch: http://svn.apache.org/r1859371
+ http://svn.apache.org/r1859422
+ 2.4.x patch: http://home.apache.org/~rjung/patches/httpd-2.4.x-proxy-ssl-proxy-section-r1859371-r1859422.patch
+ +1: rjung, rpluem, ylavic
+ -1:
+
PATCHES PROPOSED TO BACKPORT FROM TRUNK:
[ New proposals should be added at the end of the list ]
@@ -255,32 +281,6 @@ PATCHES PROPOSED TO BACKPORT FROM TRUNK:
2.4.x patch: svn merge -c 1707084,1707093,1707159,1707362 ^/httpd/httpd/trunk .
+1: icing
- *) mod_proxy: allow SSLProxyCheckPeer* usage for all proxy modules.
- PR 61857. [Yann Ylavic]
- Proposed (for trunk) by: Markus Gausling <markusgausling googlemail.com>
- Reviewed (for trunk) by: ylavic
- This also makes backporting the fixes for PR 63430 simpler and reduces code drift.
- trunk patch: http://svn.apache.org/r1818726
- 2.4.x patch: http://home.apache.org/~rjung/patches/httpd-2.4.x-proxy-request-hostname.patch
- +1: rjung, rpluem
- -1:
-
- *) mod_proxy/ssl: Proxy SSL client certificate configuration and other proxy
- SSL configurations broken inside <Proxy> context. PR 63430.
- [Ruediger Pluem, Yann Ylavic]
- Plus:
- Follow up to r1859371: extend to other ap_proxy_connection_create[_ex]() users.
- This function now now handles SSL reuse as well as the "proxy-request-hostname"
- note (SNI), so let's also call it unconditionnaly in all proxy modules.
- On the mod_ssl side, since this note has the lifetime of the connection, don't
- reset/unset it during handshake (ssl_io_filter_handshake).
- The 2.4 backport patch applies clean after backporting r1818726 above.
- trunk patch: http://svn.apache.org/r1859371
- http://svn.apache.org/r1859422
- 2.4.x patch: http://home.apache.org/~rjung/patches/httpd-2.4.x-proxy-ssl-proxy-section-r1859371-r1859422.patch
- +1: rjung, rpluem
- -1:
-
*) mod_http2: Incorporate the lastest trunk revision with code improvements and
better connection reuse handling in mod_proxy_http2. [Ruediger Pluem, Stefan Eissing]
trunk patch: http://svn.apache.org/r1859213