You are viewing a plain text version of this content. The canonical link for it is here.
Posted to cvs@httpd.apache.org by sl...@apache.org on 2002/02/04 16:18:45 UTC

cvs commit: httpd-2.0/support suexec.c

slive       02/02/04 07:18:45

  Modified:    .        CHANGES
               support  suexec.c
  Log:
  suexec: Allow HTTPS and SSL_* environment variables to be passed
  through to CGI scripts.
  
  PR: 9163
  Submitted by:	Brian Reid <br...@customlogic.com>, Zvi Har'El <rl...@math.technion.ac.il>
  Reviewed by:	Joshua Slive, Lars Eilebrecht, Martin Kraemer
  
  Revision  Changes    Path
  1.562     +5 -0      httpd-2.0/CHANGES
  
  Index: CHANGES
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/CHANGES,v
  retrieving revision 1.561
  retrieving revision 1.562
  diff -u -d -b -u -r1.561 -r1.562
  --- CHANGES	2 Feb 2002 20:30:03 -0000	1.561
  +++ CHANGES	4 Feb 2002 15:18:44 -0000	1.562
  @@ -1,5 +1,10 @@
   Changes with Apache 2.0.32-dev
   
  +  *) suexec: Allow HTTPS and SSL_* environment variables to be passed
  +     through to CGI scripts. PR 9163
  +     [Brian Reid <br...@customlogic.com>, 
  +      Zvi Har'El <rl...@math.technion.ac.il>]
  +
     *) binbuild.sh: Make sure that we use the expat from our source
        tree so that there aren't any surprises on the target machine.
        [Jeff Trawick]
  
  
  
  1.18      +2 -1      httpd-2.0/support/suexec.c
  
  Index: suexec.c
  ===================================================================
  RCS file: /home/cvs/httpd-2.0/support/suexec.c,v
  retrieving revision 1.17
  retrieving revision 1.18
  diff -u -d -b -u -r1.17 -r1.18
  --- suexec.c	22 Nov 2001 07:42:13 -0000	1.17
  +++ suexec.c	4 Feb 2002 15:18:45 -0000	1.18
  @@ -136,6 +136,7 @@
       "DOCUMENT_URI",
       "FILEPATH_INFO",
       "GATEWAY_INTERFACE",
  +    "HTTPS",
       "LAST_MODIFIED",
       "PATH_INFO",
       "PATH_TRANSLATED",
  @@ -227,7 +228,7 @@
       cidx++;
   
       for (ep = environ; *ep && cidx < AP_ENVBUF-1; ep++) {
  -        if (!strncmp(*ep, "HTTP_", 5)) {
  +        if (!strncmp(*ep, "HTTP_", 5) || !strncmp(*ep, "SSL_", 4)) {
               cleanenv[cidx] = *ep;
               cidx++;
           }