Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package apache2 for openSUSE:Factory checked 
in at 2021-09-21 21:12:26
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/apache2 (Old)
 and      /work/SRC/openSUSE:Factory/.apache2.new.1899 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "apache2"

Tue Sep 21 21:12:26 2021 rev:185 rq:919684 version:2.4.49

Changes:
--------
--- /work/SRC/openSUSE:Factory/apache2/apache2.changes  2021-08-12 
09:02:02.846114529 +0200
+++ /work/SRC/openSUSE:Factory/.apache2.new.1899/apache2.changes        
2021-09-21 21:13:07.814637793 +0200
@@ -1,0 +2,113 @@
+Fri Sep 17 08:37:29 UTC 2021 - pgaj...@suse.com
+
+- version update to 2.4.49
+  *) core/mod_proxy/mod_ssl:
+     Adding `outgoing` flag to conn_rec, indicating a connection is
+     initiated by the server to somewhere, in contrast to incoming
+     connections from clients.
+     Adding 'ap_ssl_bind_outgoing()` function that marks a connection
+     as outgoing and is used by mod_proxy instead of the previous
+     optional function `ssl_engine_set`. This enables other SSL
+     module to secure proxy connections.
+     The optional functions `ssl_engine_set`, `ssl_engine_disable` and
+     `ssl_proxy_enable` are now provided by the core to have backward
+     compatibility with non-httpd modules that might use them. mod_ssl
+     itself no longer registers these functions, but keeps them in its
+     header for backward compatibility.
+     The core provided optional function wrap any registered function
+     like it was done for `ssl_is_ssl`.
+     [Stefan Eissing]
+  *) mod_ssl: Support logging private key material for use with
+     wireshark via log file given by SSLKEYLOGFILE environment
+     variable.  Requires OpenSSL 1.1.1.  PR 63391.  [Joe Orton]
+  *) mod_proxy: Do not canonicalize the proxied URL when both "nocanon" and
+     "ProxyPassInterpolateEnv On" are configured.  PR 65549.
+     [Joel Self <joelself gmail.com>]
+  *) mpm_event: Fix children processes possibly not stopped on graceful
+     restart.  PR 63169.  [Joel Self <joelself gmail.com>]
+  *) mod_proxy: Fix a potential infinite loop when tunneling Upgrade(d)
+     protocols from mod_proxy_http, and a timeout triggering falsely when
+     using mod_proxy_wstunnel, mod_proxy_connect or mod_proxy_http with
+     upgrade= setting.  PRs 65521 and 65519.  [Yann Ylavic]
+  *) mod_unique_id: Reduce the time window where duplicates may be generated
+     PR 65159
+     [Christophe Jaillet]
+  *) mpm_prefork: Block signals for child_init hooks to prevent potential
+     threads created from there to catch MPM's signals.
+     [Ruediger Pluem, Yann Ylavic]
+  *) Revert "mod_unique_id: Fix potential duplicated ID generation under heavy 
load.
+     PR 65159" added in 2.4.47.
+     This causes issue on Windows.
+     [Christophe Jaillet]
+  *) mod_proxy_uwsgi: Fix PATH_INFO setting for generic worker.  [Yann Ylavic]
+  *) mod_md: Certificate/keys pairs are verified as matching before a renewal 
is accepted
+     as successful or a staged renewal is replacing the existing certificates.
+     This avoid potential mess ups in the md store file system to render the 
active
+     certificates non-working. [@mkauf]
+  *) mod_proxy: Faster unix socket path parsing in the "proxy:" URL.
+     [Yann Ylavic]
+  *) mod_ssl: tighten the handling of ALPN for outgoing (proxy)
+     connections. If ALPN protocols are provided and sent to the
+     remote server, the received protocol selected is inspected
+     and checked for a match. Without match, the peer handshake
+     fails.
+     An exception is the proposal of "http/1.1" where it is
+     accepted if the remote server did not answer ALPN with
+     a selected protocol. This accomodates for hosts that do
+     not observe/support ALPN and speak http/1.x be default.
+  *) mod_proxy: Fix possible reuse/merging of Proxy(Pass)Match worker instances
+     with others when their URLs contain a '$' substitution.  PR 65419 + 65429.
+     [Yann Ylavic]
+  *) mod_dav: Add method_precondition hook. WebDAV extensions define
+     conditions that must exist before a WebDAV method can be executed.
+     This hook allows a WebDAV extension to verify these preconditions.
+     [Graham Leggett]
+  *) Add hooks deliver_report and gather_reports to mod_dav.h. Allows other
+     modules apart from versioning implementations to handle the REPORT method.
+     [Graham Leggett]
+  *) Add dav_get_provider(), dav_open_lockdb(), dav_close_lockdb() and
+     dav_get_resource() to mod_dav.h. [Graham Leggett]
+  *) core: fix ap_escape_quotes substitution logic. [Eric Covener]
+  *) Easy patches: synch 2.4.x and trunk
+     - mod_auth_basic: Use ap_cstr_casecmp instead of strcasecmp.
+     - mod_ldap: log and abort locking errors.
+     - mod_ldap: style fix for r1831165
+     - mod_ldap: build break fix for r1831165
+     - mod_deflate: Avoid hard-coded "%ld" format strings in mod_deflate's 
logging statements
+     - mod_deflate: Use apr_uint64_t instead of uint64_t (follow up to 
r1849590)
+     - mod_forensic: Follow up to r1856490: missing one mod_log_forensic 
test_char_table case.
+     - mod_rewrite: Save a few cycles.
+     - mod_request: Fix a comment (missing '_' in 'keep_body') and some style 
issues
+     - core: remove extra whitespace in HTTP_NOT_IMPLEMENTED
+    [Christophe Jaillet]
+  *) core/mpm: add hook 'child_stopping` that gets called when the MPM is
+     stopping a child process. The additional `graceful` parameter allows
+     registered hooks to free resources early during a graceful shutdown.
+     [Yann Ylavic, Stefan Eissing]
+  *) mod_proxy: Fix icomplete initialization of BalancerMember(s) from the
+     balancer-manager, which can lead to a crash.  [Yann Ylavic]
+  *) mpm_event: Fix graceful stop/restart of children processes if connections
+     are in lingering close for too long.  [Yann Ylavic]
+  *) mod_md: fixed a potential null pointer dereference if ACME/OCSP
+     server returned 2xx responses without content type. Reported by chuangwen.
+     [chuangwen, Stefan Eissing]
+  *) mod_md:
+     - Domain names in `<MDomain ...>` can now appear in quoted form.
+     - Fixed a failure in ACME challenge selection that aborted further 
searches
+       when the tls-alpn-01 method did not seem to be suitable.
+     - Changed the tls-alpn-01 setup to only become unsuitable when none of the
+       dns names showed support for a configured 'Protocols ... acme-tls/1'. 
This
+       allows use of tls-alpn-01 for dns names that are not mapped to a 
VirtualHost.
+  *) Add CPING to health check logic. [Jean-Frederic Clere]
+  *) core: Split ap_create_request() from ap_read_request(). [Graham Leggett]
+  *) core, h2: common ap_parse_request_line() and ap_check_request_header()
+     code. [Yann Ylavic]
+  *) core: Add StrictHostCheck to allow unconfigured hostnames to be
+     rejected. [Eric Covener]
+  *) htcacheclean: Improve help messages.  [Christophe Jaillet]
+- modified patches
+  % apache2-HttpContentLengthHeadZero-HttpExpectStrict.patch (refreshed)
+- modified sources
+  % apache2.keyring
+
+-------------------------------------------------------------------

Old:
----
  httpd-2.4.48.tar.bz2
  httpd-2.4.48.tar.bz2.asc

New:
----
  httpd-2.4.49.tar.bz2
  httpd-2.4.49.tar.bz2.asc

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ apache2.spec ++++++
--- /var/tmp/diff_new_pack.n9Soh7/_old  2021-09-21 21:13:09.510639710 +0200
+++ /var/tmp/diff_new_pack.n9Soh7/_new  2021-09-21 21:13:09.514639715 +0200
@@ -115,7 +115,7 @@
 %endif
 
 Name:           apache2%{psuffix}
-Version:        2.4.48
+Version:        2.4.49
 Release:        0
 Summary:        The Apache HTTPD Server
 License:        Apache-2.0

++++++ apache2-HttpContentLengthHeadZero-HttpExpectStrict.patch ++++++
--- /var/tmp/diff_new_pack.n9Soh7/_old  2021-09-21 21:13:09.578639787 +0200
+++ /var/tmp/diff_new_pack.n9Soh7/_new  2021-09-21 21:13:09.582639792 +0200
@@ -42,11 +42,11 @@
  server/protocol.c           | 25 +++++++++++++++++--------
  6 files changed, 77 insertions(+), 10 deletions(-)
 
-Index: httpd-2.4.46/modules/http/http_filters.c
+Index: httpd-2.4.49/modules/http/http_filters.c
 ===================================================================
---- httpd-2.4.46.orig/modules/http/http_filters.c      2020-07-08 
13:09:13.000000000 +0200
-+++ httpd-2.4.46/modules/http/http_filters.c   2020-11-10 16:16:44.663449886 
+0100
-@@ -1483,10 +1483,17 @@ AP_CORE_DECLARE_NONSTD(apr_status_t) ap_
+--- httpd-2.4.49.orig/modules/http/http_filters.c      2021-05-11 
17:21:43.000000000 +0200
++++ httpd-2.4.49/modules/http/http_filters.c   2021-09-17 09:33:49.496853894 
+0200
+@@ -1488,10 +1488,17 @@ AP_CORE_DECLARE_NONSTD(apr_status_t) ap_
       * zero C-L to the client.  We can't just remove the C-L filter,
       * because well behaved 2.0 handlers will send their data down the stack,
       * and we will compute a real C-L for the head request. RBB
@@ -65,11 +65,11 @@
          apr_table_unset(r->headers_out, "Content-Length");
      }
  
-Index: httpd-2.4.46/server/core.c
+Index: httpd-2.4.49/server/core.c
 ===================================================================
---- httpd-2.4.46.orig/server/core.c    2020-07-03 21:53:37.000000000 +0200
-+++ httpd-2.4.46/server/core.c 2020-11-10 16:16:44.695450065 +0100
-@@ -530,6 +530,12 @@ static void *merge_core_server_configs(a
+--- httpd-2.4.49.orig/server/core.c    2021-05-27 15:08:21.000000000 +0200
++++ httpd-2.4.49/server/core.c 2021-09-17 09:33:49.496853894 +0200
+@@ -551,6 +551,12 @@ static void *merge_core_server_configs(a
      if (virt->http_methods != AP_HTTP_METHODS_UNSET)
          conf->http_methods = virt->http_methods;
  
@@ -82,7 +82,7 @@
      /* no action for virt->accf_map, not allowed per-vhost */
  
      if (virt->protocol)
-@@ -4034,6 +4040,32 @@ static const char *set_http_method(cmd_p
+@@ -4142,6 +4148,32 @@ static const char *set_http_method(cmd_p
      return NULL;
  }
  
@@ -115,7 +115,7 @@
  static apr_hash_t *errorlog_hash;
  
  static int log_constant_item(const ap_errorlog_info *info, const char *arg,
-@@ -4567,6 +4599,10 @@ AP_INIT_TAKE1("TraceEnable", set_trace_e
+@@ -4685,6 +4717,10 @@ AP_INIT_TAKE1("TraceEnable", set_trace_e
                "'on' (default), 'off' or 'extended' to trace request body 
content"),
  AP_INIT_FLAG("MergeTrailers", set_merge_trailers, NULL, RSRC_CONF,
                "merge request trailers into request headers or not"),
@@ -126,47 +126,27 @@
  AP_INIT_ITERATE("Protocols", set_protocols, NULL, RSRC_CONF,
                  "Controls which protocols are allowed"),
  AP_INIT_TAKE1("ProtocolsHonorOrder", set_protocols_honor_order, NULL, 
RSRC_CONF,
-Index: httpd-2.4.46/server/protocol.c
+Index: httpd-2.4.49/server/protocol.c
 ===================================================================
---- httpd-2.4.46.orig/server/protocol.c        2020-07-08 13:09:13.000000000 
+0200
-+++ httpd-2.4.46/server/protocol.c     2020-11-10 16:16:44.695450065 +0100
-@@ -1502,14 +1502,23 @@ request_rec *ap_read_request(conn_rec *c
+--- httpd-2.4.49.orig/server/protocol.c        2021-09-17 09:33:49.496853894 
+0200
++++ httpd-2.4.49/server/protocol.c     2021-09-17 10:15:28.643596021 +0200
+@@ -1056,6 +1056,11 @@ AP_DECLARE(int) ap_check_request_header(
+         if (ap_cstr_casecmp(expect, "100-continue") == 0) {
              r->expecting_100 = 1;
          }
++        else if (conf->http_expect_strict == AP_HTTP_EXPECT_STRICT_DISABLE) {
++            ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(02595)
++                          "client sent an unrecognized expectation value "
++                          "of Expect (not fatal): %s", expect);
++        }
          else {
--            r->status = HTTP_EXPECTATION_FAILED;
--            ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00570)
--                          "client sent an unrecognized expectation value of "
--                          "Expect: %s", expect);
--            ap_send_error_response(r, 0);
--            ap_update_child_status(conn->sbh, SERVER_BUSY_LOG, r);
--            ap_run_log_transaction(r);
--            goto traceout;
-+            core_server_config *conf;
-+
-+            conf = ap_get_core_module_config(r->server->module_config);
-+            if (conf->http_expect_strict != AP_HTTP_EXPECT_STRICT_DISABLE) {
-+                r->status = HTTP_EXPECTATION_FAILED;
-+                ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00570)
-+                              "client sent an unrecognized expectation value "
-+                              "of Expect: %s", expect);
-+                ap_send_error_response(r, 0);
-+                ap_update_child_status(conn->sbh, SERVER_BUSY_LOG, r);
-+                ap_run_log_transaction(r);
-+                goto traceout;
-+            } else {
-+                ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r, APLOGNO(00570)
-+                              "client sent an unrecognized expectation value "
-+                              "of Expect (not fatal): %s", expect);
-+            }
-         }
-     }
- 
-Index: httpd-2.4.46/include/http_core.h
+             ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, APLOGNO(00570)
+                           "client sent an unrecognized expectation value "
+Index: httpd-2.4.49/include/http_core.h
 ===================================================================
---- httpd-2.4.46.orig/include/http_core.h      2019-03-18 09:49:59.000000000 
+0100
-+++ httpd-2.4.46/include/http_core.h   2020-11-10 16:16:44.695450065 +0100
-@@ -723,6 +723,16 @@ typedef struct {
+--- httpd-2.4.49.orig/include/http_core.h      2021-05-27 15:08:21.000000000 
+0200
++++ httpd-2.4.49/include/http_core.h   2021-09-17 09:33:49.496853894 +0200
+@@ -733,6 +733,16 @@ typedef struct {
  #define AP_MERGE_TRAILERS_DISABLE  2
      int merge_trailers;
  
@@ -183,7 +163,7 @@
      apr_array_header_t *protocols;
      int protocols_honor_order;
  
-@@ -762,7 +772,6 @@ apr_status_t ap_core_input_filter(ap_fil
+@@ -776,7 +786,6 @@ apr_status_t ap_core_input_filter(ap_fil
                                    apr_off_t readbytes);
  apr_status_t ap_core_output_filter(ap_filter_t *f, apr_bucket_brigade *b);
  

++++++ apache2.keyring ++++++
--- /var/tmp/diff_new_pack.n9Soh7/_old  2021-09-21 21:13:10.086640362 +0200
+++ /var/tmp/diff_new_pack.n9Soh7/_new  2021-09-21 21:13:10.086640362 +0200
@@ -441,3 +441,64 @@
 Ot6BQHeyFl0mtrYT1mI=
 =L7j3
 -----END PGP PUBLIC KEY BLOCK-----
+
+
+pub   rsa4096 2021-09-01 [SC]
+      26F51EF9A82F4ACB43F1903ED377C9E7D1944C66
+uid        [ ultimativ ] Stefan Eissing (icing) <ste...@eissing.org>
+sub   rsa4096 2021-09-01 [E]
+
+-----BEGIN PGP PUBLIC KEY BLOCK-----
+Comment: GPGTools - https://gpgtools.org
+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+=tHCM
+-----END PGP PUBLIC KEY BLOCK-----
+

++++++ httpd-2.4.48.tar.bz2 -> httpd-2.4.49.tar.bz2 ++++++
/work/SRC/openSUSE:Factory/apache2/httpd-2.4.48.tar.bz2 
/work/SRC/openSUSE:Factory/.apache2.new.1899/httpd-2.4.49.tar.bz2 differ: char 
11, line 1

Reply via email to