cvs commit: apache-site/info/css-security encoding_examples.html
marc00/02/02 16:30:38 Modified:info/css-security encoding_examples.html Log: Fix typo. Submitted by: Sander van Zoest [EMAIL PROTECTED] Revision ChangesPath 1.5 +1 -1 apache-site/info/css-security/encoding_examples.html Index: encoding_examples.html === RCS file: /export/home/cvs/apache-site/info/css-security/encoding_examples.html,v retrieving revision 1.4 retrieving revision 1.5 diff -u -r1.4 -r1.5 --- encoding_examples.html2000/02/02 19:26:03 1.4 +++ encoding_examples.html2000/02/03 00:30:31 1.5 @@ -139,7 +139,7 @@ $Text = foolt;bgt;bar; $URL = foolt;bgt;bar.html; $r-gt;print(Apache::Util::escape_html($Text), lt;BRgt;); -$r-gt;print(lt;A HREF=\, Apache::Util::escape_html($URL), \gt;linklt;/Agt;); +$r-gt;print(lt;A HREF=\, Apache::Util::escape_uri($URL), \gt;linklt;/Agt;); /PRE PThis uses the same functions as in the Apache Module Example, called
cvs commit: apache-site/info/css-security index.html
marc00/02/02 21:16:05 Modified:info/css-security index.html Log: Could be some people with useful comments or suggestions. Maybe. Perhaps. Possibly. Revision ChangesPath 1.2 +7 -0 apache-site/info/css-security/index.html Index: index.html === RCS file: /export/home/cvs/apache-site/info/css-security/index.html,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- index.html2000/02/02 18:02:49 1.1 +++ index.html2000/02/03 05:16:04 1.2 @@ -128,6 +128,13 @@ have had more important things to do than think of a better name. lt;ggt;. +H2Comments and Suggestions/H2 + +PYou can send any comments or suggestions about this set of pages to +A HREF=mailto:[EMAIL PROTECTED][EMAIL PROTECTED]/A. Note that I +can not respond to questions or requests for assistance, so if that is +what you are about to send then please save yourself the effort. + H2Change History/H2 UL LIWed Feb 2 01:06:01 MST 2000: initial revision.
cvs commit: apache-site/info/css-security - New directory
marc00/02/02 09:56:16 apache-site/info/css-security - New directory
cvs commit: apache-site/info/css-security apache_1.3.11_css_patch.txt apache_specific.html encoding_examples.html index.html
marc00/02/02 10:02:51 Added: info/css-security apache_1.3.11_css_patch.txt apache_specific.html encoding_examples.html index.html Log: Added information about recently discovered cross site scripting security problem. Revision ChangesPath 1.1 apache-site/info/css-security/apache_1.3.11_css_patch.txt Index: apache_1.3.11_css_patch.txt === This patch is against Apache 1.3.11. It may be updated as the situation warrants. Last updated: Wed Feb 2 01:09:23 MST 2000 Index: htdocs/manual/mod/core.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.162 diff -u -r1.162 core.html --- core.html 2000/01/18 19:32:49 1.162 +++ core.html 2000/02/02 07:59:17 @@ -23,6 +23,8 @@ UL LIA HREF=#accessconfigAccessConfig/A LIA HREF=#accessfilenameAccessFileName/A +LIA HREF=#adddefaultcharsetAddDefaultCharset/A +LIA HREF=#adddefaultcharsetnameAddDefaultCharsetName/A LIA HREF=#addmoduleAddModule/A LIA HREF=#allowoverrideAllowOverride/A LIA HREF=#authnameAuthName/A @@ -162,6 +164,42 @@ lt;Directory /gt;BR AllowOverride NoneBR lt;/Directorygt;/CODE/BLOCKQUOTEPHR + +H2A NAME=adddefaultcharsetAddDefaultCharset directive/A/H2 +A HREF=directive-dict.html#Syntax REL=HelpSTRONGSyntax:/STRONG/A +AddDefaultCharset EMon / off/EMBR +A HREF=directive-dict.html#Context REL=Help STRONGContext:/STRONG/A +allBR +A HREF=directive-dict.html#Status REL=Help STRONGStatus:/STRONG/A +coreBR +A HREF=directive-dict.html#Default REL=HelpSTRONGDefault:/STRONG/A +CODEAddDefaultCharset off/CODEBR +A HREF=directive-dict.html#Compatibility REL=HelpSTRONGCompatibility: +/STRONG/A AddDefaultCharset is only available in Apache 1.3.12 and laterP +If enabled, any response that does not have any parameter on the content +type in the HTTP headers will have a charset parameter added specifying +the character set the client should use for the document. This will +override any character set specified in the body of the document via a +CODEMETA/CODE tag. The character set added is specified by the +CODEAddDefaultCharsetName/CODE directive. +PHR + +H2A NAME=adddefaultcharsetnameAddDefaultCharsetName directive/A/H2 +A HREF=directive-dict.html#Syntax REL=HelpSTRONGSyntax:/STRONG/A +AddDefaultCharsetName EMcharset/EMBR +A HREF=directive-dict.html#Context REL=Help STRONGContext:/STRONG/A +allBR +A HREF=directive-dict.html#Status REL=Help STRONGStatus:/STRONG/A +coreBR +A HREF=directive-dict.html#Default REL=HelpSTRONGDefault:/STRONG/A +CODEAddDefaultCharsetName iso-8859-1/CODEBR +A HREF=directive-dict.html#Compatibility REL=HelpSTRONGCompatibility: +/STRONG/A AddDefaultCharsetName is only available in Apache 1.3.12 and +laterP +This directive specifies the name of the character set that will be added +if the A HREF=#adddefaultcharsetAddDefaultCharset/A directive is +enabled. +PHR H2A NAME=addmoduleAddModule directive/A/H2 !--%plaintext lt;?INDEX {\tt AddModule} directivegt; -- Index: htdocs/manual/mod/directives.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/directives.html,v retrieving revision 1.60 diff -u -r1.60 directives.html --- directives.html 1999/12/19 16:34:32 1.60 +++ directives.html 2000/02/02 08:09:07 @@ -30,6 +30,9 @@ LIA HREF=mod_autoindex.html#addaltAddAlt/A LIA HREF=mod_autoindex.html#addaltbyencodingAddAltByEncoding/A LIA HREF=mod_autoindex.html#addaltbytypeAddAltByType/A +LIA HREF=mod_mime.html#addcharsetAddCharset/A +LIA HREF=core.html#adddefaultcharsetAddDefaultCharset/A +LIA HREF=core.html#adddefaultcharsetnameAddDefaultCharsetName/A LIA HREF=mod_autoindex.html#adddescriptionAddDescription/A LIA HREF=mod_mime.html#addencodingAddEncoding/A LIA HREF=mod_mime.html#addhandlerAddHandler/A Index: htdocs/manual/mod/mod_include.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/mod_include.html,v retrieving revision 1.23 diff -u -r1.23 mod_include.html --- mod_include.html 1998/09/17 12:06:40 1.23 +++ mod_include.html 2000/02/02 07:59:18 @@ -89,15 +89,34 @@ routine when printing dates. /DL +A NAME=echo DTSTRONGecho/STRONG DD This command prints one of the include variables, defined below. If the variable is unset, it is printed as CODE(none)/CODE. Any dates printed are subject to the currently configured CODEtimefmt/CODE. + Attributes: DL DTvar DDThe value is the name of the variable to print. +DTencoding +DDSpecifies how Apache should encode
cvs commit: apache-site httpd.html
marc00/02/02 10:04:23 Modified:.httpd.html Log: Add link to info about security issue. Revision ChangesPath 1.85 +9 -0 apache-site/httpd.html Index: httpd.html === RCS file: /home/cvs/apache-site/httpd.html,v retrieving revision 1.84 retrieving revision 1.85 diff -u -r1.84 -r1.85 --- httpd.html2000/01/22 21:11:23 1.84 +++ httpd.html2000/02/02 18:04:11 1.85 @@ -61,6 +61,15 @@ /DIV PHR +H2 ALIGN=CENTERCross Site Scripting Security Problem/H2 +PBLOCKQUOTE +We have added information about the recently discovered +A HREF=info/css-security/Cross Site Scripting security problem/A +that was announced in a recent +A HREF=http://www.cert.org/advisories/CA-2000-02.html;CERT Advisory/A. +/BLOCKQUOTE + +PHR H2 ALIGN=CENTERApache 1.3.11 Now Available/H2
cvs commit: apache-site/info/css-security encoding_examples.html
marc00/02/02 11:16:55 Modified:info/css-security encoding_examples.html Log: Add info on Java methods, even though it isn't specifically Apache related. Revision ChangesPath 1.2 +45 -1 apache-site/info/css-security/encoding_examples.html Index: encoding_examples.html === RCS file: /export/home/cvs/apache-site/info/css-security/encoding_examples.html,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- encoding_examples.html2000/02/02 18:02:48 1.1 +++ encoding_examples.html2000/02/02 19:16:54 1.2 @@ -163,5 +163,49 @@ http://stein.cshl.org/WWW/software/CGI//A for more details on what this module can do. - /BODY +H2Java Example:/H2 + +Unfortunately, Java does not include a standard method for entity +encoding data. One possible method, taken from the A +HREF=http://www.bitmechanic.com/projects/gsp/;GSP/A code, is: + +PRE + +public static String escapeValue(String str) { +str = replace(str, 'amp;', amp;amp;); +str = replace(str, '', amp;quot;); +str = replace(str, 'lt;', amp;lt;); +str = replace(str, 'gt;', amp;gt;); +return str; +} + +public static String replace(String str, char ch, String replace) { +int pos = str.indexOf(ch); +if(pos == -1) return str; +StringBuffer buff = new StringBuffer(str.length() + 32); +int start = 0; +while(pos != -1 amp;amp; start lt; str.length()) { +buff.append(str.substring(start, pos)); +buff.append(replace); + +start = pos + 1; +if(start lt; str.length()) pos = str.indexOf(ch, start); +} +if(start lt; str.length()) buff.append(str.substring(start)); +return buff.toString(); +} + +/PRE + +You would use this in a manner such as: + +PRE +String Text = foolt;bgt;bar; +String URL = foolt;bgt;bar.html; + +System.out.println(escapeValue(Text)); +System.out.println(java.net.URLEncoder.encode(URL)); +/PRE + +/BODY /HTML
cvs commit: apache-site/info/css-security encoding_examples.html
marc00/02/02 11:17:43 Modified:info/css-security encoding_examples.html Log: Minor HTML fix. Revision ChangesPath 1.3 +2 -2 apache-site/info/css-security/encoding_examples.html Index: encoding_examples.html === RCS file: /export/home/cvs/apache-site/info/css-security/encoding_examples.html,v retrieving revision 1.2 retrieving revision 1.3 diff -u -r1.2 -r1.3 --- encoding_examples.html2000/02/02 19:16:54 1.2 +++ encoding_examples.html2000/02/02 19:17:41 1.3 @@ -129,8 +129,8 @@ PRE char *Text = foolt;bgt;bar; char *URL = foolt;bgt;bar.html; -ap_rvputs(r, ap_escape_html(r-pool, Text), lt;BRgt;, NULL); -ap_rvputs(r, lt;A HREF=\, ap_escape_uri(r-pool, URL), \gt;linklt;/Agt;, NULL); +ap_rvputs(r, ap_escape_html(r-gt;pool, Text), lt;BRgt;, NULL); +ap_rvputs(r, lt;A HREF=\, ap_escape_uri(r-gt;pool, URL), \gt;linklt;/Agt;, NULL); /PRE H2mod_perl Example:/H2
cvs commit: apache-site/info/css-security encoding_examples.html
marc00/02/02 11:26:04 Modified:info/css-security encoding_examples.html Log: Sigh. The Java code is GPLed, so I am removing it. Revision ChangesPath 1.4 +0 -44 apache-site/info/css-security/encoding_examples.html Index: encoding_examples.html === RCS file: /export/home/cvs/apache-site/info/css-security/encoding_examples.html,v retrieving revision 1.3 retrieving revision 1.4 diff -u -r1.3 -r1.4 --- encoding_examples.html2000/02/02 19:17:41 1.3 +++ encoding_examples.html2000/02/02 19:26:03 1.4 @@ -163,49 +163,5 @@ http://stein.cshl.org/WWW/software/CGI//A for more details on what this module can do. -H2Java Example:/H2 - -Unfortunately, Java does not include a standard method for entity -encoding data. One possible method, taken from the A -HREF=http://www.bitmechanic.com/projects/gsp/;GSP/A code, is: - -PRE - -public static String escapeValue(String str) { -str = replace(str, 'amp;', amp;amp;); -str = replace(str, '', amp;quot;); -str = replace(str, 'lt;', amp;lt;); -str = replace(str, 'gt;', amp;gt;); -return str; -} - -public static String replace(String str, char ch, String replace) { -int pos = str.indexOf(ch); -if(pos == -1) return str; -StringBuffer buff = new StringBuffer(str.length() + 32); -int start = 0; -while(pos != -1 amp;amp; start lt; str.length()) { -buff.append(str.substring(start, pos)); -buff.append(replace); - -start = pos + 1; -if(start lt; str.length()) pos = str.indexOf(ch, start); -} -if(start lt; str.length()) buff.append(str.substring(start)); -return buff.toString(); -} - -/PRE - -You would use this in a manner such as: - -PRE -String Text = foolt;bgt;bar; -String URL = foolt;bgt;bar.html; - -System.out.println(escapeValue(Text)); -System.out.println(java.net.URLEncoder.encode(URL)); -/PRE - /BODY /HTML
cvs commit: apache-1.3/htdocs/manual/mod directives.html
marc00/01/31 14:56:50 Modified:htdocs/manual/mod directives.html Log: Add missing AddCharset directive. Revision ChangesPath 1.61 +1 -0 apache-1.3/htdocs/manual/mod/directives.html Index: directives.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/directives.html,v retrieving revision 1.60 retrieving revision 1.61 diff -u -r1.60 -r1.61 --- directives.html 1999/12/19 16:34:32 1.60 +++ directives.html 2000/01/31 22:56:48 1.61 @@ -30,6 +30,7 @@ LIA HREF=mod_autoindex.html#addaltAddAlt/A LIA HREF=mod_autoindex.html#addaltbyencodingAddAltByEncoding/A LIA HREF=mod_autoindex.html#addaltbytypeAddAltByType/A +LIA HREF=mod_mime.html#addcharsetAddCharset/A LIA HREF=mod_autoindex.html#adddescriptionAddDescription/A LIA HREF=mod_mime.html#addencodingAddEncoding/A LIA HREF=mod_mime.html#addhandlerAddHandler/A
cvs commit: apache-1.3/src/ap ap_getpass.c
marc00/01/29 19:15:43 Modified:src/ap ap_getpass.c Log: Fix broken proprocessor syntax added by beos change in previous revision. Revision ChangesPath 1.5 +1 -1 apache-1.3/src/ap/ap_getpass.c Index: ap_getpass.c === RCS file: /export/home/cvs/apache-1.3/src/ap/ap_getpass.c,v retrieving revision 1.4 retrieving revision 1.5 diff -u -r1.4 -r1.5 --- ap_getpass.c 2000/01/26 04:39:00 1.4 +++ ap_getpass.c 2000/01/30 03:15:41 1.5 @@ -84,7 +84,7 @@ #define ERR_OVERFLOW 5 -#ifdef defined(MPE) || defined(BEOS) +#if defined(MPE) || defined(BEOS) #include termios.h char *
cvs commit: apache-1.3/src/main util.c
marc00/01/12 12:58:00 Modified:src/main util.c Log: Fixup sizing of a string to be more intuitive and consistent. The only functional change that this introduces is to bump down the maximum hostname length by one, to what it should be. Submitted by: Theo de Raadt [EMAIL PROTECTED] Revision ChangesPath 1.176 +2 -2 apache-1.3/src/main/util.c Index: util.c === RCS file: /export/home/cvs/apache-1.3/src/main/util.c,v retrieving revision 1.175 retrieving revision 1.176 diff -u -r1.175 -r1.176 --- util.c1999/12/01 20:55:03 1.175 +++ util.c2000/01/12 20:57:48 1.176 @@ -1937,7 +1937,7 @@ #ifndef MAXHOSTNAMELEN #define MAXHOSTNAMELEN 256 #endif -char str[MAXHOSTNAMELEN + 1]; +char str[MAXHOSTNAMELEN]; char *server_hostname; struct hostent *p; @@ -1949,7 +1949,7 @@ perror(Unable to gethostname); exit(1); } -str[MAXHOSTNAMELEN] = '\0'; +str[sizeof(str) - 1] = '\0'; if ((!(p = gethostbyname(str))) || (!(server_hostname = find_fqdn(a, p { fprintf(stderr, %s: cannot determine local host name.\n, ap_server_argv0);
Re: cvs commit: apache-1.3/cgi-bin printenv
On 24 Nov 1999 [EMAIL PROTECTED] wrote: 4. make sure very large lines (usually from $PATH) do not destroy the total optical view on the table by cutting values and replacing the missing stuff with [...]. Erm... this makes it less useful. If there is a long variable, then it is saying something and you should see it. I don't buy that it is destroying the total optical view on the table. You can make it even prettier by not displaying more than the first 50 characters, but you lose even more information. 5. surround values with quotes to allow one to better recognize newlines (as in SERVER_SIGNATURE) and whitespaces and also print newlines as \n and as \ for a more Shell- and C-style syntax. Is it really standard to not display 's normally, but to stick a \ in front of them? I don't see that much.
cvs commit: apache-site/contributors index.html
marc99/10/10 16:45:41 Modified:contributors index.html Log: Minor update. The things I thought would be wrong were old enough to be right. Revision ChangesPath 1.76 +1 -1 apache-site/contributors/index.html Index: index.html === RCS file: /export/home/cvs/apache-site/contributors/index.html,v retrieving revision 1.75 retrieving revision 1.76 diff -u -r1.75 -r1.76 --- index.html1999/10/09 02:50:05 1.75 +++ index.html1999/10/10 23:45:40 1.76 @@ -480,7 +480,7 @@ STRONGLocation:/STRONG Edmonton, Alberta, CanadaBR STRONGContributions:/STRONG Security patches, bug hunting and debugging of networking issues.BR -STRONGOS Expertise:/STRONG *BSDBR +STRONGOS Expertise:/STRONGLinux, *BSD, SolarisBR P
cvs commit: apache-site bugdb.cgi
marc99/10/08 10:33:13 Modified:.bugdb.cgi Log: Update bugdb script to refer people to the swish-e bugdb search form first. It is far more efficient and far more useful for the vast majority of people, despite a few problems like not always display the title of the PR in the search results. Revision ChangesPath 1.43 +41 -1 apache-site/bugdb.cgi Index: bugdb.cgi === RCS file: /export/home/cvs/apache-site/bugdb.cgi,v retrieving revision 1.42 retrieving revision 1.43 diff -u -r1.42 -r1.43 --- bugdb.cgi 1999/05/24 17:55:50 1.42 +++ bugdb.cgi 1999/10/08 17:33:11 1.43 @@ -1699,6 +1699,10 @@ just using our software and we have nothing to do with them. Don't waste your time or ours by telling us about it. /LI +LIDo NOT submit a problem report without searching the existing ones + first to ensure that the issue you are reporting has not already been + addressed +/LI /UL /STRONG/BIG /TD @@ -1715,8 +1719,44 @@ #EOM #-- # Quick query +print EOT; + +PHRP +H2Search the Apache problem report database by keyword or phrase:/H2 + +P + +The Boolean AND, OR, and NOT are supported. The asterisk (*) can be +used as a truncation character. If you enter multiple words +iwithout/i an AND or an OR they are automagically iAND/Ied +together. The search is not case sensitive. Email addresses and other +words with a dot, a dash, a hyphen or an '\@' sign are taken as one +searchable token. Thus you are istrongly/i encouraged to use +asterisk '*' completion. + +FORM ACTION=http://search.apache.org/; METHOD=POST + +PINPUT TYPE=text NAME=keyword SIZE=50 + +P + +Maximum number of records to return: +select name=results +option value=2020 +option value=20100 +option value=20200 +/select + +input name=what value=bugs type=hidden + +P +INPUT TYPE=submit VALUE=Start Search + +/FORM +EOT print PhrP\n; -print Use the following form to search the problem report database. ; +print Alternatively, if you have a more specific query you can use\n; +print the following form to search the problem report database. ; print Narrow your search by specifying a value for one or more a href=\$GNUINFOSCRIPT?(gnats)Problem%20Report%20fields\problem report fields/a.\n; print PFORM ACTION=\$SCRIPT_NAME/quick\\n;
cvs commit: apache-1.3/src/main util.c
marc99/06/16 23:03:21 Modified:src/main util.c Log: Fix bug in ap_field_noparam() that resulted in SEGVs when used with content types that don't have a ';' in them. Revision ChangesPath 1.164 +4 -2 apache-1.3/src/main/util.c Index: util.c === RCS file: /export/home/cvs/apache-1.3/src/main/util.c,v retrieving revision 1.163 retrieving revision 1.164 diff -u -r1.163 -r1.164 --- util.c1999/06/04 18:30:31 1.163 +++ util.c1999/06/17 06:03:20 1.164 @@ -128,12 +128,14 @@ const char *semi; semi = strchr(intype, ';'); -if (semi != NULL) { +if (!semi) { + return ap_pstrdup(p, intype); +} else { while ((semi intype) ap_isspace(semi[-1])) { semi--; } + return ap_pstrndup(p, intype, semi - intype); } -return ap_pstrndup(p, intype, semi - intype); } API_EXPORT(char *) ap_ht_time(pool *p, time_t t, const char *fmt, int gmt)
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc99/02/20 16:16:37 Modified:htdocs/manual/misc FAQ.html Log: Spelling fixes. Revision ChangesPath 1.142 +4 -4 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.141 retrieving revision 1.142 diff -u -r1.141 -r1.142 --- FAQ.html 1999/02/20 02:37:44 1.141 +++ FAQ.html 1999/02/21 00:16:36 1.142 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.141 $ ($Date: 1999/02/20 02:37:44 $) + $Revision: 1.142 $ ($Date: 1999/02/21 00:16:36 $) /P P The latest version of this FAQ is always available from the main @@ -272,7 +272,7 @@ /LI /OL /LI - LISTRONGG. Authentification and Access Restrictions/STRONG + LISTRONGG. Authentication and Access Restrictions/STRONG OL LIA HREF=#dnsauthWhy isn't restricting access by host or domain name working correctly?/A @@ -1427,7 +1427,7 @@ You may want to check out the CITEApache Week/CITE article entitled: quot;A HREF=http://www.apacheweek.com/features/logfiles; REL=Help -CITEGathering Visitor Information: Customising Your +CITEGathering Visitor Information: Customizing Your Logfiles/CITE/Aquot;. /P HR @@ -1950,7 +1950,7 @@ /OL - H3G. Authentification and Access Restrictions/H3 + H3G. Authentication and Access Restrictions/H3 OL LIA NAME=dnsauth
cvs commit: apache-1.3 STATUS
marc99/01/31 13:54:02 Modified:.STATUS Log: purple. Revision ChangesPath 1.608 +3 -1 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.607 retrieving revision 1.608 diff -u -r1.607 -r1.608 --- STATUS1999/01/25 22:55:31 1.607 +++ STATUS1999/01/31 21:54:01 1.608 @@ -1,5 +1,5 @@ 1.3 STATUS: - Last modified at [$Date: 1999/01/25 22:55:31 $] + Last modified at [$Date: 1999/01/31 21:54:01 $] Release: @@ -14,6 +14,8 @@ 2.0 : In pre-alpha development, see apache-2.0 repository RELEASE SHOWSTOPPERS: + +* md5 passwd stuff incompatible with FreeBSD implementation. RELEASE NON-SHOWSTOPPERS BUT WOULD BE REAL NICE TO WRAP THESE UP:
cvs commit: apache-1.3/src/modules/standard mod_auth.c mod_auth_db.c mod_auth_dbm.c
marc99/01/31 14:01:36 Modified:src/modules/standard mod_auth.c mod_auth_db.c mod_auth_dbm.c Log: We have found the prototype for crypt. Since people actually once in a while are nice enough to write in telling me that they know where the prototype is on their system based on that comment, plus we don't do the casting associated with the comment any more, it can go away. Revision ChangesPath 1.44 +0 -1 apache-1.3/src/modules/standard/mod_auth.c Index: mod_auth.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth.c,v retrieving revision 1.43 retrieving revision 1.44 diff -u -r1.43 -r1.44 --- mod_auth.c1999/01/25 22:55:38 1.43 +++ mod_auth.c1999/01/31 22:01:34 1.44 @@ -220,7 +220,6 @@ ap_note_basic_auth_failure(r); return AUTH_REQUIRED; } -/* anyone know where the prototype for crypt is? */ if (real_pw[0] == '$' real_pw[1] == '1') { const char *salt = real_pw + 3; salt = ap_getword(r-pool, salt, '$'); 1.39 +0 -1 apache-1.3/src/modules/standard/mod_auth_db.c Index: mod_auth_db.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth_db.c,v retrieving revision 1.38 retrieving revision 1.39 diff -u -r1.38 -r1.39 --- mod_auth_db.c 1999/01/26 00:15:21 1.38 +++ mod_auth_db.c 1999/01/31 22:01:34 1.39 @@ -251,7 +251,6 @@ if (colon_pw) { *colon_pw = '\0'; } -/* anyone know where the prototype for crypt is? */ if (real_pw[0] == '$' real_pw[1] == '1') { char *salt = real_pw + 3; salt = ap_getword(r-pool, salt, '$'); 1.44 +0 -1 apache-1.3/src/modules/standard/mod_auth_dbm.c Index: mod_auth_dbm.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth_dbm.c,v retrieving revision 1.43 retrieving revision 1.44 diff -u -r1.43 -r1.44 --- mod_auth_dbm.c1999/01/26 00:15:21 1.43 +++ mod_auth_dbm.c1999/01/31 22:01:34 1.44 @@ -232,7 +232,6 @@ colon_pw = strchr(real_pw, ':'); if (colon_pw) *colon_pw = '\0'; -/* anyone know where the prototype for crypt is? */ if (real_pw[0] == '$' real_pw[1] == '1') { char *salt = real_pw + 3; salt = ap_getword(r-pool, salt, '$');
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc99/01/26 19:36:38 Modified:htdocs/manual/misc FAQ.html Log: One item already added by someone sometime, one that should be. Revision ChangesPath 1.136 +2 -3 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.135 retrieving revision 1.136 diff -u -r1.135 -r1.136 --- FAQ.html 1998/11/07 00:10:38 1.135 +++ FAQ.html 1999/01/27 03:36:37 1.136 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.135 $ ($Date: 1998/11/07 00:10:38 $) + $Revision: 1.136 $ ($Date: 1999/01/27 03:36:37 $) /P P The latest version of this FAQ is always available from the main @@ -79,8 +79,7 @@ !-- (A: you can't but satisfy any; allow from all can be close -- !-- - '400 malformed request' on Win32 might mean stale proxy; see -- !-- PR #2300.-- -!-- - expected /Directory saw /Directory due to buggy AIX -- -!-- compiler.-- +!-- - how do I tell what version of Apache I am running? -- UL LISTRONGBackground/STRONG OL START=1
cvs commit: apache-1.3 STATUS
marc99/01/04 22:14:38 Modified:.STATUS Log: Sun isn't supposed to be in Seattle. Revision ChangesPath 1.590 +3 -1 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.589 retrieving revision 1.590 diff -u -r1.589 -r1.590 --- STATUS1999/01/05 05:14:49 1.589 +++ STATUS1999/01/05 06:14:37 1.590 @@ -1,5 +1,5 @@ 1.3 STATUS: - Last modified at [$Date: 1999/01/05 05:14:49 $] + Last modified at [$Date: 1999/01/05 06:14:37 $] Release: @@ -32,6 +32,8 @@ Status: Marc is looking at it RELEASE NON-SHOWSTOPPERS BUT WOULD BE REAL NICE TO WRAP THESE UP: + +* RemoveHandler directive needs docs * Randy's proposed changes for binbuild:
cvs commit: apache-1.3/src/modules/standard mod_cgi.c
marc98/10/31 17:08:45 Modified:src/modules/standard mod_cgi.c Log: If we can't find a script and magically try adding .EXE to it, then do not log can't find foo.EXE, but just foo. This avoids confusing people. Revision ChangesPath 1.87 +5 -2 apache-1.3/src/modules/standard/mod_cgi.c Index: mod_cgi.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_cgi.c,v retrieving revision 1.86 retrieving revision 1.87 diff -u -r1.86 -r1.87 --- mod_cgi.c 1998/09/21 21:09:51 1.86 +++ mod_cgi.c 1998/11/01 01:08:45 1.87 @@ -386,12 +386,15 @@ /* Allow for cgi files without the .EXE extension on them under OS/2 */ if (r-finfo.st_mode == 0) { struct stat statbuf; + char *newfile; - r-filename = ap_pstrcat(r-pool, r-filename, .EXE, NULL); + newfile = ap_pstrcat(r-pool, r-filename, .EXE, NULL); - if ((stat(r-filename, statbuf) != 0) || (!S_ISREG(statbuf.st_mode))) { + if ((stat(newfile, statbuf) != 0) || (!S_ISREG(statbuf.st_mode))) { return log_scripterror(r, conf, NOT_FOUND, 0, script not found or unable to stat); + } else { + r-filename = newfile; } } #else
cvs commit: apache-1.3/src Makefile.nt
marc98/11/01 00:56:34 Modified:src Makefile.nt Log: Make Makefile.nt clean mod_rewrite properly. PR: 3100 Submitted by: Tetsu Maenaka [EMAIL PROTECTED] Revision ChangesPath 1.29 +1 -0 apache-1.3/src/Makefile.nt Index: Makefile.nt === RCS file: /export/home/cvs/apache-1.3/src/Makefile.nt,v retrieving revision 1.28 retrieving revision 1.29 diff -u -r1.28 -r1.29 --- Makefile.nt 1998/04/17 14:58:51 1.28 +++ Makefile.nt 1998/11/01 08:56:34 1.29 @@ -126,6 +126,7 @@ nmake /nologo CFG=ApacheModuleHeaders - Win32 %LONG% -f ApacheModuleHeaders.mak clean nmake /nologo CFG=ApacheModuleSpeling - Win32 %LONG% -f ApacheModuleSpeling.mak clean nmake /nologo CFG=ApacheModuleUserTrack - Win32 %LONG% -f ApacheModuleUserTrack.mak clean + nmake /nologo CFG=ApacheModuleRewrite - Win32 %LONG% -f ApacheModuleRewrite.mak clean cd ..\.. cd modules\proxy nmake /nologo CFG=ApacheModuleProxy - Win32 %LONG% -f ApacheModuleProxy.mak clean
cvs commit: apache-1.3/src/main util_script.c
marc98/11/01 00:45:29 Modified:src CHANGES src/main util_script.c Log: If we are trying to execute a script, the exact thing we are executing currently isn't logged if it fails. This fixes it so it is logged, with the Win32 error code returned from the failed CreateProcess() call. Revision ChangesPath 1.1131+4 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1130 retrieving revision 1.1131 diff -u -r1.1130 -r1.1131 --- CHANGES 1998/10/30 22:41:21 1.1130 +++ CHANGES 1998/11/01 08:45:27 1.1131 @@ -1,5 +1,9 @@ Changes with Apache 1.3.4 + *) WIN32: Log more explicit error messages if spawning an interpreted + script failed, including the command line used to attempt to execute + the interpreter and the Win32 error code returned. [Marc Slemko] + *) Disable sending of error-notes on a 500 (Internal Server Error) response since it often includes file path info. Enable sending of error-notes on a 501 (Method Not Implemented). [Roy Fielding] PR#3173 1.135 +10 -1 apache-1.3/src/main/util_script.c Index: util_script.c === RCS file: /export/home/cvs/apache-1.3/src/main/util_script.c,v retrieving revision 1.134 retrieving revision 1.135 diff -u -r1.134 -r1.135 --- util_script.c 1998/10/12 13:48:26 1.134 +++ util_script.c 1998/11/01 08:45:29 1.135 @@ -1052,7 +1052,16 @@ */ CloseHandle(pi.hProcess); CloseHandle(pi.hThread); -} +} else { + if (is_script) { + /* since we are doing magic to find what we are executing + * if running a script, log what we think we should have + * executed + */ + ap_log_rerror(APLOG_MARK, APLOG_ERR|APLOG_WIN32ERROR, r, + could not run script interpreter: %s, pCommand); + } + } #if 0 if ((!r-args) || (!r-args[0]) || strchr(r-args, '=')) { if (is_exe || is_binary) {
cvs commit: apache-site index.html
marc98/10/24 15:59:21 Modified:.index.html Log: ApacheCon is over for now, so remove banner. Revision ChangesPath 1.71 +0 -4 apache-site/index.html Index: index.html === RCS file: /home/cvs/apache-site/index.html,v retrieving revision 1.70 retrieving revision 1.71 diff -u -r1.70 -r1.71 --- index.html1998/10/09 23:16:00 1.70 +++ index.html1998/10/24 22:59:20 1.71 @@ -20,10 +20,6 @@ H3A HREF=http://www.apache.org/dyn/closer.cgi; Mirrored worldwide - find your closest mirror/A/H3 -A HREF=http://www.apachecon.com/; TARGET=new -IMG SRC=images/apachecon.gif ALT=See Us At ApacheCon WIDTH=460 -HEIGHT=60/A - TABLETRTD UL LI A HREF=ABOUT_APACHE.htmlAbout the Apache Project/A
cvs commit: apache-1.3/src/main http_log.c
marc98/10/22 17:34:21 Modified:src/main http_log.c Log: apache -- Apache in log message. Revision ChangesPath 1.73 +1 -1 apache-1.3/src/main/http_log.c Index: http_log.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_log.c,v retrieving revision 1.72 retrieving revision 1.73 diff -u -r1.72 -r1.73 --- http_log.c1998/10/03 14:28:55 1.72 +++ http_log.c1998/10/23 00:34:20 1.73 @@ -481,7 +481,7 @@ */ ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_WARNING, NULL, ap_psprintf(p, -pid file %s overwritten -- Unclean shutdown of previous apache run?, +pid file %s overwritten -- Unclean shutdown of previous Apache run?, fname) ); }
cvs commit: apache-1.3/htdocs/manual handler.html
marc98/10/20 22:57:58 Modified:src/main http_core.c src CHANGES htdocs/manual handler.html Log: Add a default-handler handler that calls the default_hander() function which is normally called for static content. This allows you to override a specific handler. This is not a complete solution to being able to unconfigure things as asked for in PR#2979, but it is still useful. Revision ChangesPath 1.235 +1 -0 apache-1.3/src/main/http_core.c Index: http_core.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v retrieving revision 1.234 retrieving revision 1.235 diff -u -r1.234 -r1.235 --- http_core.c 1998/10/16 07:04:43 1.234 +++ http_core.c 1998/10/21 05:57:53 1.235 @@ -2879,6 +2879,7 @@ static const handler_rec core_handlers[] = { { */*, default_handler }, +{ default-handler, default_handler }, { NULL } }; 1.1114+4 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1113 retrieving revision 1.1114 diff -u -r1.1113 -r1.1114 --- CHANGES 1998/10/20 17:44:58 1.1113 +++ CHANGES 1998/10/21 05:57:55 1.1114 @@ -1,5 +1,9 @@ Changes with Apache 1.3.4 + *) Add a default-handler handler that calls the default_hander() + function which is normally called for static content. This allows + you to override a specific handler. [Marc Slemko] + *) Further simplify checking for absolute paths by replacing an hard-coded syntax check with a call to a routine we already created to do this. [Ken Parzygnat [EMAIL PROTECTED]] PR#2976, 3074 1.15 +4 -0 apache-1.3/htdocs/manual/handler.html Index: handler.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/handler.html,v retrieving revision 1.14 retrieving revision 1.15 diff -u -r1.14 -r1.15 --- handler.html 1998/05/20 14:22:30 1.14 +++ handler.html 1998/10/21 05:57:58 1.15 @@ -36,6 +36,10 @@ handlers in the standard distribution are as follows:/P UL +LISTRONGdefault-handler/STRONG: +Send the file using the CODEdefault_handler()/CODE, which is the +handler used by default to handle static content. +(core) LISTRONGsend-as-is/STRONG: Send file with HTTP headers as is. (A HREF=mod/mod_asis.htmlmod_asis/A)
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/10/18 21:59:40 Modified:htdocs/manual/misc FAQ.html Log: Since this entry was based on a small number of reports some time ago and current versions of HP's compiler appear to be fine and I haven't seen anyone report this in a long time, remove the reference to problems with HP's compiler. Submitted by: Nathaniel McIntosh [EMAIL PROTECTED] Revision ChangesPath 1.132 +3 -16 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.131 retrieving revision 1.132 diff -u -r1.131 -r1.132 --- FAQ.html 1998/09/30 15:19:00 1.131 +++ FAQ.html 1998/10/19 04:59:36 1.132 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.131 $ ($Date: 1998/09/30 15:19:00 $) + $Revision: 1.132 $ ($Date: 1998/10/19 04:59:36 $) /P P The latest version of this FAQ is always available from the main @@ -79,6 +79,8 @@ !-- (A: you can't but satisfy any; allow from all can be close -- !-- - '400 malformed request' on Win32 might mean stale proxy; see -- !-- PR #2300.-- +!-- - expected /Directory saw /Directory due to buggy AIX -- +!-- compiler.-- UL LISTRONGBackground/STRONG OL START=1 @@ -188,9 +190,6 @@ /LI LIA HREF=#SSL-iWhy doesn't Apache include SSL?/A /LI - LIA HREF=#HPUX-coreWhy do I get core dumps under HPUX using -HP's ANSI C compiler?/A - /LI LIA HREF=#midiHow do I get Apache to send a MIDI file so the browser can play it?/A /LI @@ -1426,18 +1425,6 @@ article about A HREF=http://www.apacheweek.com/features/ssl; REL=Help CITEApache and Secure Transactions/CITE/A. - /P - HR - /LI - - LIA NAME=HPUX-core - STRONGWhy do I get core dumps under HPUX using HP's ANSI - C compiler?/STRONG - /A - P - We have had numerous reports of Apache dumping core when compiled - with HP's ANSI C compiler using optimization. Disabling the compiler - optimization has fixed these problems. /P HR /LI
cvs commit: apache-1.3 STATUS
marc98/10/18 22:35:20 Modified:.STATUS Log: Dean would get much Apache work done in Seattle right now. Revision ChangesPath 1.514 +3 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.513 retrieving revision 1.514 diff -u -r1.513 -r1.514 --- STATUS1998/10/17 14:10:53 1.513 +++ STATUS1998/10/19 05:35:20 1.514 @@ -13,6 +13,9 @@ RELEASE SHOWSTOPPERS: +* need to stop error messages sent to the client from revealing + error log information by default + * How should an Apache binary release tarball look? 1. The old way where it is just a source release tarball
cvs commit: apache-1.3/src/modules/standard mod_auth.c
marc98/10/18 22:43:35 Modified:src CHANGES src/modules/standard mod_auth.c Log: Log an error if we encounter a malformed require directive in mod_auth if we know that we know that no other module can deal with it. Revision ChangesPath 1.1112+4 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1. retrieving revision 1.1112 diff -u -r1. -r1.1112 --- CHANGES 1998/10/19 02:16:25 1. +++ CHANGES 1998/10/19 05:43:33 1.1112 @@ -1,5 +1,9 @@ Changes with Apache 1.3.4 + *) Log an error if we encounter a malformed require directive + in mod_auth if we know that we know that no other module can + deal with it. [Marc Slemko] + *) Remove ap_private_extern method of hiding conflicting symbols on the NEXT platform because it is not correct for all versions, and the versions for which it is correct are unknown. 1.41 +10 -0 apache-1.3/src/modules/standard/mod_auth.c Index: mod_auth.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth.c,v retrieving revision 1.40 retrieving revision 1.41 diff -u -r1.40 -r1.41 --- mod_auth.c1998/10/03 15:11:52 1.40 +++ mod_auth.c1998/10/19 05:43:34 1.41 @@ -283,6 +283,16 @@ if (ap_table_get(grpstatus, w)) return OK; } + } else if (sec-auth_authoritative) { + /* if we aren't authoritative, any require directive could be + * valid even if we don't grok it. However, if we are + * authoritative, we can warn the user they did something wrong. + * That something could be a missing AuthAuthoritative off, but + * more likely is a typo in the require directive. + */ + ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r, + access to %s failed, reason: unknown require directive: + \%s\, r-uri, reqs[x].requirement); } }
cvs commit: apache-1.3 STATUS
marc98/10/18 22:45:14 Modified:.STATUS Log: Minor update. Revision ChangesPath 1.515 +2 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.514 retrieving revision 1.515 diff -u -r1.514 -r1.515 --- STATUS1998/10/19 05:35:20 1.514 +++ STATUS1998/10/19 05:45:13 1.515 @@ -338,6 +338,8 @@ Help: +* should have a pretty little icon for Apache on Win32 + * proxy module doesn't load on Win95. Why? Good question. PR#1462. * Directory /, Directory C:/ both fail to do anything,
cvs commit: apache-1.3/src/main http_protocol.c
marc98/10/18 22:59:36 Modified:src/main http_protocol.c Log: After telling people to read the error log time after time, make it explicit in the 500 error message. Revision ChangesPath 1.246 +3 -1 apache-1.3/src/main/http_protocol.c Index: http_protocol.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_protocol.c,v retrieving revision 1.245 retrieving revision 1.246 diff -u -r1.245 -r1.246 --- http_protocol.c 1998/10/16 07:04:44 1.245 +++ http_protocol.c 1998/10/19 05:59:35 1.246 @@ -2384,7 +2384,9 @@ ap_escape_html(r-pool, r-server-server_admin), and inform them of the time the error occurred,\n and anything you might have done that may have\n - caused the error.P\n, NULL); + caused the error.P\n + More information about this error may be available\n + in the server error log.P\n, NULL); if ((error_notes = ap_table_get(r-notes, error-notes)) != NULL) { ap_bvputs(fd, error_notes, P\n, NULL); }
cvs commit: apache-1.3 STATUS
marc98/10/18 23:23:12 Modified:.STATUS Log: . Revision ChangesPath 1.516 +2 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.515 retrieving revision 1.516 diff -u -r1.515 -r1.516 --- STATUS1998/10/19 05:45:13 1.515 +++ STATUS1998/10/19 06:23:10 1.516 @@ -338,6 +338,8 @@ Help: +* should trap ^C when running not-as-service and do proper shutdown + * should have a pretty little icon for Apache on Win32 * proxy module doesn't load on Win95. Why? Good question. PR#1462.
cvs commit: apache-1.3/src/main http_main.c
marc98/10/19 00:10:17 Modified:src/main http_main.c Log: Be more explicit in OS2/Win32 console box message; ie. print Apache/x.x.x running... instead of just Apache/x.x.x. Revision ChangesPath 1.401 +2 -2 apache-1.3/src/main/http_main.c Index: http_main.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_main.c,v retrieving revision 1.400 retrieving revision 1.401 diff -u -r1.400 -r1.401 --- http_main.c 1998/10/12 17:15:25 1.400 +++ http_main.c 1998/10/19 07:10:15 1.401 @@ -5887,11 +5887,11 @@ set_group_privs(); #ifdef OS2 -printf(%s \n, ap_get_server_version()); +printf(%s running...\n, ap_get_server_version()); #endif #ifdef WIN32 if (!child) { - printf(%s \n, ap_get_server_version()); + printf(%s running...\n, ap_get_server_version()); } #endif
cvs commit: apache-1.3/htdocs/manual upgrading_to_1_3.html
marc98/10/18 13:08:51 Modified:htdocs/manual upgrading_to_1_3.html Log: While it is fairly obvious that if you upgrade your config files they are upgraded, make it explicit. PR: 3212 Revision ChangesPath 1.33 +9 -2 apache-1.3/htdocs/manual/upgrading_to_1_3.html Index: upgrading_to_1_3.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/upgrading_to_1_3.html,v retrieving revision 1.32 retrieving revision 1.33 diff -u -r1.32 -r1.33 --- upgrading_to_1_3.html 1998/09/17 14:52:01 1.32 +++ upgrading_to_1_3.html 1998/10/18 20:08:51 1.33 @@ -72,6 +72,13 @@ H3Run-Time Configuration Changes/H3 UL + LIThere have been numerous changes to the default config files. +Ensure that you compare your existing configuration files with the +new ones to ensure there aren't any undesired differences. In +particular, the current config files apply different +A HREF=mod/core.html#optionsOptions/A and +A HREF=mod/core.html#allowoverrideAllowOverride/A settings to +various directories. LIAs of 1.3.2, A HREF=mod/mod_expires.htmlCODEmod_expires/CODE/A will add Expires headers to content that does not come from a file on disk, unless you are using a modification time based setting. @@ -110,7 +117,7 @@ SAMPlt;Limitnbsp;Getnbsp;postgt;/SAMP in your configuration files, you need to correct them to use uppercase names. P -Unrecognised method names in the server configuration files will +Unrecognized method names in the server configuration files will result in the server logging an error message and failing to start. In SAMP.htaccess/SAMP files, unknown methods will cause the server to log an error to its error log and return an 'Internal @@ -180,7 +187,7 @@ LIlt;Filesgt; sections previously could take a full pathname, and were matched against the full pathnames. This had some - inconsistancies, and was removed. To emulate this older behaviour + inconsistencies, and was removed. To emulate this older behaviour use a lt;Filesgt; section nested inside a lt;Directorygt; section.
cvs commit: apache-1.3/htdocs/manual/mod directives.html
marc98/10/15 09:54:10 Modified:htdocs/manual/mod directives.html Log: Add missing ProxyVia directive. Revision ChangesPath 1.52 +1 -0 apache-1.3/htdocs/manual/mod/directives.html Index: directives.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/directives.html,v retrieving revision 1.51 retrieving revision 1.52 diff -u -r1.51 -r1.52 --- directives.html 1998/09/17 20:23:38 1.51 +++ directives.html 1998/10/15 16:54:09 1.52 @@ -158,6 +158,7 @@ LIA HREF=mod_proxy.html#proxyreceivebuffersizeProxyReceiveBufferSize/A LIA HREF=mod_proxy.html#proxyremoteProxyRemote/A LIA HREF=mod_proxy.html#proxyrequestsProxyRequests/A +LIA HREF=mod_proxy.html#proxyviaProxyVia/A LIA HREF=mod_autoindex.html#readmenameReadmeName/A LIA HREF=mod_alias.html#redirectRedirect/A LIA HREF=mod_alias.html#redirectmatchRedirectMatch/A
cvs commit: apache-1.3/src/helpers GuessOS
marc98/10/03 22:45:56 Modified:src/helpers GuessOS Log: Words with spaces have to be quoted. Revision ChangesPath 1.50 +1 -1 apache-1.3/src/helpers/GuessOS Index: GuessOS === RCS file: /export/home/cvs/apache-1.3/src/helpers/GuessOS,v retrieving revision 1.49 retrieving revision 1.50 diff -u -r1.49 -r1.50 --- GuessOS 1998/10/03 19:28:19 1.49 +++ GuessOS 1998/10/04 05:45:55 1.50 @@ -252,7 +252,7 @@ echo pyramid-pyramid-svr4; exit 0; ;; -*:*:*:DRS 6000) +*:*:*:DRS 6000) echo drs6000-whatever-whatever; exit 0; ;; esac
cvs commit: apache-1.3/src/modules/standard mod_autoindex.c
marc98/10/03 23:13:19 Modified:src CHANGES src/modules/standard mod_autoindex.c Log: Fix mod_autoindex bug where directories got a size of 0k instead of -. This was introduced by a bogus cleanup in rev 1.31; -1 was changed to 0 to avoid storing -1 in a size_t, when the correct fix is to change the size_t to an off_t. Submitter's patch modified for correctness. PR: 3130 Submitted by: Martin Plechsmid [EMAIL PROTECTED] Revision ChangesPath 1.1099+4 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1098 retrieving revision 1.1099 diff -u -r1.1098 -r1.1099 --- CHANGES 1998/10/03 19:28:16 1.1098 +++ CHANGES 1998/10/04 06:13:16 1.1099 @@ -1,5 +1,9 @@ Changes with Apache 1.3.3 + *) Fix mod_autoindex bug where directories got a size of 0k instead + of -. [Martin Plechsmid [EMAIL PROTECTED], Marc Slemko] + PR#3130 + *) PORT: DRS 6000 machine. [Paul Debleecker [EMAIL PROTECTED]] *) Add the server signature text (from the core ServerSignature directive) 1.96 +3 -3 apache-1.3/src/modules/standard/mod_autoindex.c Index: mod_autoindex.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_autoindex.c,v retrieving revision 1.95 retrieving revision 1.96 diff -u -r1.95 -r1.96 --- mod_autoindex.c 1998/10/02 21:35:38 1.95 +++ mod_autoindex.c 1998/10/04 06:13:18 1.96 @@ -569,7 +569,7 @@ char *icon; char *alt; char *desc; -size_t size; +off_t size; time_t lm; struct ent *next; int ascending; @@ -859,7 +859,7 @@ p = (struct ent *) ap_pcalloc(r-pool, sizeof(struct ent)); p-name = ap_pstrdup(r-pool, name); -p-size = 0; +p-size = -1; p-icon = NULL; p-alt = NULL; p-desc = NULL; @@ -879,7 +879,7 @@ if (!(p-alt = find_alt(d, rr, 1))) { p-alt = DIR; } - p-size = 0; + p-size = -1; p-name = ap_pstrcat(r-pool, name, /, NULL); } else {
cvs commit: apache-1.3/src CHANGES
marc98/10/04 12:05:15 Modified:src CHANGES Log: Style cleanup. Revision ChangesPath 1.1100+6 -5 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1099 retrieving revision 1.1100 diff -u -r1.1099 -r1.1100 --- CHANGES 1998/10/04 06:13:16 1.1099 +++ CHANGES 1998/10/04 19:05:13 1.1100 @@ -19,9 +19,10 @@ [Dave Dykstra [EMAIL PROTECTED]] PR#3055 *) Fix `require ...' directive parsing in mod_auth, mod_auth_dbm and - mod_auth_db by using ap_getword_white() (which uses ap_isspace()) instead of - ap_getword(..., ' ') (which parses only according to spaces but not tabs). - [James Morris [EMAIL PROTECTED], Ralf S. Engelschall] PR#3105 + mod_auth_db by using ap_getword_white() (which uses ap_isspace()) + instead of ap_getword(..., ' ') (which parses only according to spaces + but not tabs). [James Morris [EMAIL PROTECTED], + Ralf S. Engelschall] PR#3105 *) Fix the SERVER_NAME variable under sub-request situations (where `UseCanonicalName off' is used) like CGI's called from SSI pages or @@ -43,7 +44,7 @@ it is now taken care of properly by the header file tests. [Wilfredo Sanchez [EMAIL PROTECTED]] - *) Fix problem with scripts and finehandle inheritance on Win32. + *) Fix problem with scripts and filehandle inheritance on Win32. [Ken Parzygnat [EMAIL PROTECTED]] PR#2884, 2910 *) Win32 name canonicalisation could end up using the server's @@ -70,7 +71,7 @@ *) The ap_pfopen and ap_pfdopen routines were failing to protect the errno on an error, which leads to one error being mistaken for - another when reading non-existant .htaccess files. + another when reading non-existent .htaccess files. [Jim Jagielski] *) OS/2: The new header tests get things right, need to update
cvs commit: apache-1.3/src/include ap_config.h
marc98/09/28 18:22:57 Modified:src/include ap_config.h Log: Unserialized accept() should be safe (in all versions) and efficient (in anything vaguely recent) on FreeBSD. Revision ChangesPath 1.237 +1 -0 apache-1.3/src/include/ap_config.h Index: ap_config.h === RCS file: /export/home/cvs/apache-1.3/src/include/ap_config.h,v retrieving revision 1.236 retrieving revision 1.237 diff -u -r1.236 -r1.237 --- ap_config.h 1998/09/24 17:25:55 1.236 +++ ap_config.h 1998/09/29 01:22:57 1.237 @@ -646,6 +646,7 @@ typedef quad_t rlim_t; #endif #define USE_FLOCK_SERIALIZED_ACCEPT +#define SINGLE_LISTEN_UNSERIALIZED_ACCEPT #define HAVE_SYSLOG 1 #define SYS_SIGLIST sys_siglist
cvs commit: apache-1.3 STATUS
marc98/09/20 18:06:52 Modified:.STATUS Log: Add back entry that was removed. Revision ChangesPath 1.482 +3 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.481 retrieving revision 1.482 diff -u -r1.481 -r1.482 --- STATUS1998/09/20 17:54:44 1.481 +++ STATUS1998/09/21 01:06:51 1.482 @@ -109,6 +109,9 @@ Needs patch: +* TestCompile creates bogus code with void main( main + always returns an int. + * Ralf: mod_so doesn't correctly initialise modules. For instance the handlers of mod_perl are not initialised. An ap_init_modules() could be done from mod_so but this is too much.
cvs commit: apache-1.3 WARNING-NT.TXT
marc98/09/21 11:09:10 Added: .WARNING-NT.TXT Log: Veto removal of WARNING-NT.TXT, under c-t-r guidelines. Before it is revmobed again, standard full voting procedures should apply. Revision ChangesPath 1.3 +0 -0 apache-1.3/WARNING-NT.TXT
cvs commit: apache-1.3 STATUS
marc98/09/20 10:54:45 Modified:.STATUS Log: Cloud. Revision ChangesPath 1.481 +7 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.480 retrieving revision 1.481 diff -u -r1.480 -r1.481 --- STATUS1998/09/20 06:50:56 1.480 +++ STATUS1998/09/20 17:54:44 1.481 @@ -53,6 +53,13 @@ Does the current cvs work with existing db files, or not? If not, let's fix it. If unknown, it isn't a showstopper. +* need to ensure it compiles properly on win32 before rolling the + tarball, and that no last minute changes break it + +* WARNING-NT.TXT; why did Roy remove it? Either we have to agree to + remove it from the installer, etc. or it has to go back. + Marc: -1 on a release without it without some justification + Documentation that needs writing: * Need a document explaining mod_rewrite/UseCanonicalName off based
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/09/09 09:01:05 Modified:htdocs/manual/misc FAQ.html Log: Be explicit about the obvious; if you enable SSIs for a directory tree the setting only applies to that directory tree! Revision ChangesPath 1.127 +16 -1 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.126 retrieving revision 1.127 diff -u -r1.126 -r1.127 --- FAQ.html 1998/08/06 20:46:12 1.126 +++ FAQ.html 1998/09/09 16:01:03 1.127 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.126 $ ($Date: 1998/08/06 20:46:12 $) + $Revision: 1.127 $ ($Date: 1998/09/09 16:01:03 $) /P P The latest version of this FAQ is always available from the main @@ -126,6 +126,9 @@ /LI LIA HREF=#ssi-part-iiiHow can I have my script output parsed?/A /LI + LIA HREF=#ssi-part-ivSSIs don't work for VirtualHosts and/or +user home directories/A + /LI LIA HREF=#proxyDoes or will Apache act as a Proxy server?/A /LI LIA HREF=#multiviewsWhat are quot;multiviewsquot;?/A @@ -829,6 +832,18 @@ release after 1.3. /P HR + /LI + + LIA NAME=ssi-part-iv + STRONGSSIs don't work for VirtualHosts and/or +user home directories./STRONG + /A + P + This is almost always due to having some setting in your config file that + sets Options Includes or some other setting for your DocumentRoot + but not for other directories. If you set it inside a Directory + section, then that setting will only apply to that directory. + /P /LI LIA NAME=proxy
cvs commit: apache-1.3/htdocs/manual/mod core.html
marc98/09/07 01:31:46 Modified:htdocs/manual/mod core.html Log: Add some more detailed information about ListenBacklog and MaxClients, plus a few misc cleanups. Revision ChangesPath 1.134 +22 -9 apache-1.3/htdocs/manual/mod/core.html Index: core.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.133 retrieving revision 1.134 diff -u -r1.133 -r1.134 --- core.html 1998/08/27 06:49:24 1.133 +++ core.html 1998/09/07 08:31:45 1.134 @@ -1135,7 +1135,7 @@ The second format reverses the test, and only processes the directives if EMparameter-name/EM is STRONGnot/STRONG defined. -PThe EMparamater-name/EM argument is a define as given on the +PThe EMparameter-name/EM argument is a define as given on the CODEhttpd/CODE command line via CODE-D/CODEEMparameter-/EM, at the time the server was started. @@ -1613,13 +1613,19 @@ HREF=directive-dict.html#Compatibility REL=Help STRONGCompatibility:/STRONG/A ListenBacklog is only available in Apache -versions after 1.2.0.P +versions after 1.2.0. -The maximum length of the queue of pending connections. Generally no +PThe maximum length of the queue of pending connections. Generally no tuning is needed or desired, however on some systems it is desirable to increase this when under a TCP SYN flood attack. See -the backlog parameter to the CODElisten(2)/CODE system call./PHR +the backlog parameter to the CODElisten(2)/CODE system call. +PThis will often be limited to a smaller number by the operating +system. This varies from OS to OS. Also note that many OSes do not +use exactly what is specified as the backlog, but use a number based on +(but normally larger than) what is set. +HR + H2A NAME=locationlt;Locationgt; directive/A/H2 A @@ -1878,10 +1884,17 @@ REL=Help STRONGStatus:/STRONG/A coreP -The MaxClients directive sets the limit on the number of simultaneous +PThe MaxClients directive sets the limit on the number of simultaneous requests that can be supported; not more than this number of child server processes will be created. To configure more than 256 clients, you must -edit the HARD_SERVER_LIMIT entry in httpd.h and recompile.PHR +edit the HARD_SERVER_LIMIT entry in httpd.h and recompile. + +PAny connection attempts over the MaxClients limit will normally +be queued, up to a number based on the A HREF=#listenbacklog +ListenBacklog/A directive. Once a child process is freed at the +end of a different request, the connection will then be serviced. + +HR H2A NAME=maxkeepaliverequestsMaxKeepAliveRequests directive/A/H2 A @@ -2928,7 +2941,7 @@ HREF=directive-dict.html#Status REL=Help STRONGStatus:/STRONG/A core (Windows)BR -STRONGCompatbility:/STRONG Available only with Apache 1.3 and later +STRONGCompatibility:/STRONG Available only with Apache 1.3 and later with Windows PThis directive tells the server how many threads it should use. This @@ -3072,8 +3085,8 @@ group specifically for running the server. Some admins use user CODEnobody/CODE, but this is not always possible or desirable. For example mod_proxy's cache, when enabled, must be accessible to this user -(see the A href=mod_proxy.html#cacherootCODECacheRoot/CODE/a -directive/a).P +(see the A href=mod_proxy.html#cacherootCODECacheRoot/CODE +directive/A).P Notes: If you start the server as a non-root user, it will fail to change to the lesser privileged user, and will instead continue to run as
cvs commit: apache-1.3/src/main util.c
marc98/09/06 13:03:36 Modified:src/main util.c Log: fix typo hidden behind DEFINE. PR: 2945 Submitted by: Larry Lipsmeyer [EMAIL PROTECTED] Revision ChangesPath 1.132 +2 -1 apache-1.3/src/main/util.c Index: util.c === RCS file: /export/home/cvs/apache-1.3/src/main/util.c,v retrieving revision 1.131 retrieving revision 1.132 diff -u -r1.131 -r1.132 --- util.c1998/09/03 17:09:30 1.131 +++ util.c1998/09/06 20:03:35 1.132 @@ -701,7 +701,8 @@ API_EXPORT(int) ap_cfg_closefile(configfile_t *cfp) { #ifdef DEBUG -ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, NULL, Done with config file %s, fp-name); +ap_log_error(APLOG_MARK, APLOG_DEBUG|APLOG_NOERRNO, NULL, +Done with config file %s, cfp-name); #endif return (cfp-close == NULL) ? 0 : cfp-close(cfp-param); }
cvs commit: apache-1.3/src/modules/standard mod_expires.c
marc98/09/04 11:15:48 Modified:htdocs/manual upgrading_to_1_3.html htdocs/manual/mod mod_expires.html src CHANGES src/modules/standard mod_expires.c Log: Fix mod_expires to add Expires headers for content that isn't served from disk (ie. the case where r-finfo.st_mode == 0), unless it is a modification date based setting. Submitted by: Paul Phillips [EMAIL PROTECTED] Revision ChangesPath 1.29 +6 -0 apache-1.3/htdocs/manual/upgrading_to_1_3.html Index: upgrading_to_1_3.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/upgrading_to_1_3.html,v retrieving revision 1.28 retrieving revision 1.29 diff -u -r1.28 -r1.29 --- upgrading_to_1_3.html 1998/08/31 01:18:45 1.28 +++ upgrading_to_1_3.html 1998/09/04 18:15:44 1.29 @@ -72,6 +72,12 @@ H3Run-Time Configuration Changes/H3 UL + LIAs of 1.3.2, A HREF=mod/mod_expires.htmlCODEmod_expires/CODE/A +will add Expires headers to content that does not come from a file +on disk, unless you are using a modification time based setting. +Previously, it would never add an Expires header unless content came +from a file on disk. This could result in Expires headers being added +in places where they were not previously added. LIStandalone STRONGSAMPFancyIndexing/SAMP/STRONG directives are now combined with the settings of any SAMPIndexOptions/SAMP directive already in effect, rather than replacing them. 1.11 +5 -0 apache-1.3/htdocs/manual/mod/mod_expires.html Index: mod_expires.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/mod_expires.html,v retrieving revision 1.10 retrieving revision 1.11 diff -u -r1.10 -r1.11 --- mod_expires.html 1998/05/20 14:12:56 1.10 +++ mod_expires.html 1998/09/04 18:15:45 1.11 @@ -316,6 +316,11 @@ ExpiresByType image/gif modification plus 5 hours 3 minutes/CODE /DD /DL + P + Note that if you use a modification date based setting, the Expires + header will STRONGnot/STRONG be added to content that does + not come from a file on disk. This is due to the fact that there is + no modification time for such content. !--#include virtual=footer.html -- /BODY 1.1046+7 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1045 retrieving revision 1.1046 diff -u -r1.1045 -r1.1046 --- CHANGES 1998/09/03 22:40:39 1.1045 +++ CHANGES 1998/09/04 18:15:46 1.1046 @@ -1,5 +1,12 @@ Changes with Apache 1.3.2 + *) mod_expires will now act on content that is not sent from a file + on disk. Previously it would never add an Expires: header to + any response that did not come from a file on disk; the only + case where it still doesn't (and can't) add one for that type of + content is if you are using a modification date based setting. + [Marc Slemko, Paul Phillips [EMAIL PROTECTED]] + *) Problems encountered during .htaccess parsing or CGI execution that lead to a 500 Server Error condition now provide explanatory text (in the *ERROR_NOTES envariable) to ErrorDocument 500 scripts. 1.31 +6 -3 apache-1.3/src/modules/standard/mod_expires.c Index: mod_expires.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_expires.c,v retrieving revision 1.30 retrieving revision 1.31 diff -u -r1.30 -r1.31 --- mod_expires.c 1998/08/25 09:15:38 1.30 +++ mod_expires.c 1998/09/04 18:15:47 1.31 @@ -413,9 +413,6 @@ if (r-main != NULL)/* Say no to subrequests */ return DECLINED; -if (r-finfo.st_mode == 0) /* no file ? shame. */ -return DECLINED; - conf = (expires_dir_config *) ap_get_module_config(r-per_dir_config, expires_module); if (conf == NULL) { ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r, @@ -454,6 +451,12 @@ switch (code[0]) { case 'M': + if (r-finfo.st_mode == 0) { + /* file doesn't exist on disk, so we can't do anything based on + * modification time. Note that this does _not_ log an error. + */ + return DECLINED; + } base = r-finfo.st_mtime; additional = atoi(code[1]); break;
cvs commit: apache-1.3/htdocs/manual/mod core.html
marc98/08/26 23:49:25 Modified:htdocs/manual/mod core.html Log: LocationMatch, not Location, is only 1.3+. Submitted by: Paul Phillips [EMAIL PROTECTED] Revision ChangesPath 1.133 +2 -2 apache-1.3/htdocs/manual/mod/core.html Index: core.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.132 retrieving revision 1.133 diff -u -r1.132 -r1.133 --- core.html 1998/08/12 00:31:44 1.132 +++ core.html 1998/08/27 06:49:24 1.133 @@ -1737,8 +1737,8 @@ A HREF=directive-dict.html#Compatibility REL=Help -STRONGCompatibility:/STRONG/A Location is only available in Apache -1.3 and later.P +STRONGCompatibility:/STRONG/A LocationMatch is only available in +Apache 1.3 and later.P PThe lt;LocationMatchgt; directive provides for access control by URL, in an identical manner to A
cvs commit: apache-1.3 STATUS
marc98/08/15 21:00:09 Modified:.STATUS Log: Walla walla wacko wham. Woah. Revision ChangesPath 1.457 +6 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.456 retrieving revision 1.457 diff -u -r1.456 -r1.457 --- STATUS1998/08/14 02:54:20 1.456 +++ STATUS1998/08/16 04:00:08 1.457 @@ -21,6 +21,12 @@ * fix O(n^2) attack in mod_isapi.c ... i.e. recopy the code from scan_script_headers_err_core. +Unix 1.3.2 RELEASE SHOWSTOPPERS: + +* header detection is broken; eg. sys/resource.h often requires + other includes first, etc. This breaks things like RLimit* + on many platforms. + Documentation that needs writing: * Need a document explaining mod_rewrite/UseCanonicalName off based
cvs commit: apache-1.3/src CHANGES
marc98/08/10 10:11:18 Modified:src CHANGES Log: Finch, not Fincg. PR: 2820 Submitted by: Tony Finch [EMAIL PROTECTED] Revision ChangesPath 1.1016+1 -1 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.1015 retrieving revision 1.1016 diff -u -r1.1015 -r1.1016 --- CHANGES 1998/08/10 04:16:11 1.1015 +++ CHANGES 1998/08/10 17:11:16 1.1016 @@ -1346,7 +1346,7 @@ *) The CGI spec says that REMOTE_HOST should be set to the remote hosts's name, or left unset if this value is unavailable. Apache was setting it to the IP address when unavailable. - [Tony Fincg [EMAIL PROTECTED]] PR#1925 + [Tony Finch [EMAIL PROTECTED]] PR#1925 *) Various improvements to the configuration and build support for compiling modules as shared objects. Especially Solaris 2.x, SunOS 4.1, IRIX and
cvs commit: apache-1.3/src/modules/standard mod_digest.c
marc98/08/09 14:03:25 Modified:src/modules/standard mod_digest.c Log: Wrap line properly for 80 cols. Revision ChangesPath 1.39 +2 -1 apache-1.3/src/modules/standard/mod_digest.c Index: mod_digest.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_digest.c,v retrieving revision 1.38 retrieving revision 1.39 diff -u -r1.38 -r1.39 --- mod_digest.c 1998/08/09 12:34:17 1.38 +++ mod_digest.c 1998/08/09 21:03:25 1.39 @@ -162,7 +162,8 @@ if (strcasecmp(scheme=ap_getword(r-pool, auth_line, ' '), Digest)) { /* Client tried to authenticate using wrong auth scheme */ ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r-server, - client used wrong authentication scheme: %s for %s, scheme, r-uri); + client used wrong authentication scheme: %s for %s, + scheme, r-uri); ap_note_digest_auth_failure(r); return AUTH_REQUIRED; }
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/08/05 11:04:54 Modified:htdocs/manual/misc FAQ.html Log: Q: my htaccess files are being ignored A: yea, Apache listens to you if you tell it to. Revision ChangesPath 1.125 +33 -20apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.124 retrieving revision 1.125 diff -u -r1.124 -r1.125 --- FAQ.html 1998/07/19 05:30:02 1.124 +++ FAQ.html 1998/08/05 18:04:50 1.125 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.124 $ ($Date: 1998/07/19 05:30:02 $) + $Revision: 1.125 $ ($Date: 1998/08/05 18:04:50 $) /P P The latest version of this FAQ is always available from the main @@ -74,7 +74,6 @@ !-- the simple fact that older versions of Apache (and new ones -- !-- that have been upgraded without upgrading the mime.types -- !-- file) don't have the type listed at all. -- -!-- - Why is my .htaccess ignored? -- !-- - RewriteRule /~fraggle/* /cgi-bin/fraggle.pl does not work-- !-- - how do I disable authentication for a subdirectory? -- !-- (A: you can't but satisfy any; allow from all can be close -- @@ -286,9 +285,11 @@ /LI LIA HREF=#regexWhat are regular expressions?/A /LI - lia href=#broken-gccI'm using gcc and I get some compilation errors, what - is wrong?/a - /li + LIA HREF=#broken-gccI'm using gcc and I get some compilation errors, + what is wrong?/A + /LI + LIA HREF=#htaccess-workMy CODE.htaccess/CODE files are being + ignored./A /OL /LI /UL @@ -2251,11 +2252,12 @@ LIA NAME=regex STRONGWhat are regular expressions?/STRONG/A P - Regular expressions are a way of describing a pattern - for example, all the words - that begin with the letter A or every 10-digit phone number or even Every sentence - with two commas in it, and no capital letter Q. Regular expressions (aka regexps) - are useful in Apache because they let you apply certain attributes against collections - of files or resources in very flexible ways - for example, all .gif and .jpg files under + Regular expressions are a way of describing a pattern - for example, all + the words that begin with the letter A or every 10-digit phone number + or even Every sentence with two commas in it, and no capital letter Q. + Regular expressions (aka regexps) are useful in Apache because they + let you apply certain attributes against collections of files or resources + in very flexible ways - for example, all .gif and .jpg files under any images directory could be written as /.*\/images\/.*[jpg|gif]/. PThe best overview around is probably the one which comes with @@ -2266,24 +2268,35 @@ page on regular expressions/A, and branching out from there. HR - /LI - lia name=broken-gccstrongI'm using gcc and I get some - compilation errors, what is wrong?/strong/a -p -GCC parses your system header files and produces a modified subset which + /LI + LIA NAME=broken-gccSTRONGI'm using gcc and I get some + compilation errors, what is wrong?/STRONG/A +P GCC parses your system header files and produces a modified subset which it uses for compiling. This behaviour ties GCC tightly to the version of your operating system. So, for example, if you were running IRIX 5.3 when you built GCC and then upgrade to IRIX 6.2 later, you will have to rebuild GCC. Similarly for Solaris 2.4, 2.5, or 2.5.1 when you upgrade to 2.6. Sometimes you can type gcc -v and it will tell you the version of the operating system it was built against. -p +P If you fail to do this, then it is very likely that Apache will fail -to build. One of the most common errors is with codereadv/code, -codewritev/code, or codeuio.h/code. This is bnot/b a +to build. One of the most common errors is with CODEreadv/CODE, +CODEwritev/CODE, or CODEuio.h/CODE. This is Bnot/B a bug with Apache. You will need to re-install GCC. - hr - /li + HR + /LI + LIA NAME=htaccess-work + STRONGMy CODE.htaccess/CODE files are being ignored./STRONG/A + P + This is almost always due to your A HREF=../mod/core.html#allowoverride + AllowOverride/A directive being set incorrectly for the directory in + question. If it is set to CODENone/CODE then .htaccess files will + not even be looked for. If you do have one that is set, then be certain + it covers the directory you are trying to use the .htaccess file
cvs commit: apache-1.3/src/main http_core.c
marc98/08/05 11:52:51 Modified:src/main http_core.c Log: Fix src/httpd.h -- src/include/httpd.h path in error message that wasn't updated. Revision ChangesPath 1.215 +1 -1 apache-1.3/src/main/http_core.c Index: http_core.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v retrieving revision 1.214 retrieving revision 1.215 diff -u -r1.214 -r1.215 --- http_core.c 1998/08/03 09:14:52 1.214 +++ http_core.c 1998/08/05 18:52:50 1.215 @@ -1917,7 +1917,7 @@ of %d servers,\n, ap_daemons_limit, HARD_SERVER_LIMIT); fprintf(stderr, lowering MaxClients to %d. To increase, please see the\n, HARD_SERVER_LIMIT); - fprintf(stderr, HARD_SERVER_LIMIT define in src/httpd.h.\n); + fprintf(stderr, HARD_SERVER_LIMIT define in src/include/httpd.h.\n); ap_daemons_limit = HARD_SERVER_LIMIT; } else if (ap_daemons_limit 1) {
cvs commit: apache-1.3/htdocs/manual/mod core.html
marc98/07/27 22:57:15 Modified:htdocs/manual/mod core.html Log: Digest is mostly supported, for all the good it does. PR: 2715 Submitted by: Youichirou Koga [EMAIL PROTECTED] Revision ChangesPath 1.128 +1 -1 apache-1.3/htdocs/manual/mod/core.html Index: core.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.127 retrieving revision 1.128 diff -u -r1.127 -r1.128 --- core.html 1998/07/06 17:42:11 1.127 +++ core.html 1998/07/28 05:57:13 1.128 @@ -303,7 +303,7 @@ STRONGStatus:/STRONG/A coreP This directive selects the type of user authentication for a directory. -Only CODEBasic/CODE is currently implemented. +Only CODEBasic/CODE and CODEDigest/CODE are currently implemented. !--%plaintext lt;?INDEX {\tt Basic} authentication schemegt; -- It must be accompanied by A HREF=#authnameAuthName/A and A HREF=#requirerequire/A directives, and directives such as
cvs commit: apache-site/dist .htaccess
marc98/07/22 14:03:51 Modified:dist .htaccess Log: Revision ChangesPath 1.7 +3 -0 apache-site/dist/.htaccess Index: .htaccess === RCS file: /export/home/cvs/apache-site/dist/.htaccess,v retrieving revision 1.6 retrieving revision 1.7 diff -u -r1.6 -r1.7 --- .htaccess 1998/05/08 23:48:57 1.6 +++ .htaccess 1998/07/22 21:03:49 1.7 @@ -8,6 +8,9 @@ AddDescription 1.3b6 Win32 binary apache_1_3b6_1.exe AddDescription 1.2.5 compressed source apache_1.2.5.tar.Z AddDescription 1.2.5 gzipped source apache_1.2.5.tar.gz +AddDescription 1.3.1 compressed source apache_1.3.1.tar.Z +AddDescription 1.3.1 gzipped source apache_1.3.1.tar.gz +AddDescription 1.3.1 Win32 binary apache_1_3_1.exe AddDescription List of changes in 1.3 /export/pub/apache/dist/CHANGES AddDescription List of changes in 1.2 /export/pub/apache/dist/CHANGES_1.2 AddDescription Developer PGP keys /export/pub/apache/dist/KEYS
cvs commit: apache-1.3/src/os/win32 registry.c
marc98/07/18 16:35:43 Modified:src/include httpd.h src/os/win32 registry.c Log: And bump to 1.3.2-dev after roll. Revision ChangesPath 1.228 +2 -2 apache-1.3/src/include/httpd.h Index: httpd.h === RCS file: /export/home/cvs/apache-1.3/src/include/httpd.h,v retrieving revision 1.227 retrieving revision 1.228 diff -u -r1.227 -r1.228 --- httpd.h 1998/07/18 22:57:27 1.227 +++ httpd.h 1998/07/18 23:35:40 1.228 @@ -382,7 +382,7 @@ * Example: Apache/1.1.0 MrWidget/0.1-alpha */ -#define SERVER_BASEVERSION Apache/1.3.1/* SEE COMMENTS ABOVE */ +#define SERVER_BASEVERSION Apache/1.3.2-dev/* SEE COMMENTS ABOVE */ #define SERVER_VERSION SERVER_BASEVERSION enum server_token_type { SrvTk_MIN, /* eg: Apache/1.3.0 */ @@ -399,7 +399,7 @@ * For a final release, 'betaseq' should be set to '99'. * For example, Apache 1.4.2 should be '1040299' */ -#define APACHE_RELEASE 1030199 +#define APACHE_RELEASE 1030201 #define SERVER_PROTOCOL HTTP/1.1 #ifndef SERVER_SUPPORT 1.8 +1 -1 apache-1.3/src/os/win32/registry.c Index: registry.c === RCS file: /export/home/cvs/apache-1.3/src/os/win32/registry.c,v retrieving revision 1.7 retrieving revision 1.8 diff -u -r1.7 -r1.8 --- registry.c1998/07/18 22:57:31 1.7 +++ registry.c1998/07/18 23:35:43 1.8 @@ -28,7 +28,7 @@ #define VENDOR Apache Group #define SOFTWARE Apache -#define VERSION 1.3.1 +#define VERSION 1.3.2 dev #define REGKEY SOFTWARE\\ VENDOR \\ SOFTWARE \\ VERSION
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/07/18 22:30:03 Modified:htdocs/manual/misc FAQ.html Log: A few minor updates. Submitted by: Singly Bertrand de (X1995) [EMAIL PROTECTED] Revision ChangesPath 1.124 +5 -5 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.123 retrieving revision 1.124 diff -u -r1.123 -r1.124 --- FAQ.html 1998/07/10 00:25:35 1.123 +++ FAQ.html 1998/07/19 05:30:02 1.124 @@ -14,7 +14,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.123 $ ($Date: 1998/07/10 00:25:35 $) + $Revision: 1.124 $ ($Date: 1998/07/19 05:30:02 $) /P P The latest version of this FAQ is always available from the main @@ -260,7 +260,7 @@ /LI LIA HREF=#year2000Is Apache Year 2000 compliant?/A /LI - LIA HREF=#namevhostI upgraded to Apache 1.3.0 and now my + LIA HREF=#namevhostI upgraded to Apache 1.3 and now my virtual hosts don't work!/A /LI LIA HREF=#redhatI'm using RedHat Linux and I have problems with httpd @@ -380,10 +380,10 @@ STRONGHow thoroughly tested is Apache?/STRONG /A P - Apache is run on over 500,000 Internet servers (as of July 1997). It has + Apache is run on over 1.2 million Internet servers (as of July 1998). It has been tested thoroughly by both developers and users. The Apache Group maintains rigorous standards before releasing new versions of their - server, and our server runs without a hitch on over one third of all + server, and our server runs without a hitch on over one half of all WWW servers available on the Internet. When bugs do show up, we release patches and new versions as soon as they are available. /P @@ -2052,7 +2052,7 @@ /LI LIA NAME=namevhost - STRONGI upgraded to Apache 1.3.0 and now my virtual hosts don't + STRONGI upgraded to Apache 1.3 and now my virtual hosts don't work!/STRONG /A P
cvs commit: apache-1.3/conf mime.types
marc98/07/19 00:10:03 Modified:conf mime.types Log: Add mime type for .js. See http://help.netscape.com/kb/client/970303-2.html for details on .js files. PR: 2635 Submitted by: Hinnerk Gnutzmann [EMAIL PROTECTED] Revision ChangesPath 1.13 +1 -0 apache-1.3/conf/mime.types Index: mime.types === RCS file: /export/home/cvs/apache-1.3/conf/mime.types,v retrieving revision 1.12 retrieving revision 1.13 diff -u -r1.12 -r1.13 --- mime.types1998/03/11 06:21:41 1.12 +++ mime.types1998/07/19 07:10:03 1.13 @@ -37,6 +37,7 @@ application/x-gtar gtar application/x-gzip application/x-hdfhdf +application/x-javascript js application/x-koan skp skd skt skm application/x-latex latex application/x-mifmif
cvs commit: apache-1.3/htdocs/manual suexec.html
marc98/07/18 14:43:13 Modified:htdocs/manual suexec.html Log: No longer correct (and never really was) to tell them to type cc ... to compile suexec. PR: 2517 Revision ChangesPath 1.19 +2 -1 apache-1.3/htdocs/manual/suexec.html Index: suexec.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/suexec.html,v retrieving revision 1.18 retrieving revision 1.19 diff -u -r1.18 -r1.19 --- suexec.html 1998/05/20 14:22:33 1.18 +++ suexec.html 1998/07/18 21:43:13 1.19 @@ -377,7 +377,8 @@ P ALIGN=LEFT STRONGCOMPILING THE SUEXEC WRAPPER/STRONGBR You now need to compile the suEXEC wrapper. At the shell command prompt, -type:nbsp;nbsp;STRONGCODEcc suexec.c -o suexec [ENTER]/CODE/STRONG. +after compiling Apache, +type:nbsp;nbsp;STRONGCODEmake suexec[ENTER]/CODE/STRONG. This should create the STRONGEMsuexec/EM/STRONG wrapper executable. /P
cvs commit: apache-1.3/src CHANGES
marc98/07/18 15:50:17 Modified:.Announcement src CHANGES Log: Minor cleanups. Revision ChangesPath 1.34 +2 -2 apache-1.3/Announcement Index: Announcement === RCS file: /export/home/cvs/apache-1.3/Announcement,v retrieving revision 1.33 retrieving revision 1.34 diff -u -r1.33 -r1.34 --- Announcement 1998/07/16 00:19:54 1.33 +++ Announcement 1998/07/18 22:50:14 1.34 @@ -12,7 +12,7 @@ Users on other platforms should review the CHANGES file and decide on their upgrade plans; the security issues apply only to Apache -on Win32. We consider Apache 1.3.1 to be the most stable version +on Win32. We consider Apache 1.3.1 to be the most stable version of Apache available. Apache 1.3.1 is available for download from @@ -32,7 +32,7 @@ In general, Apache 1.3 offers several substantial improvements over version 1.2, including better performance, reliability and a wider-range of supported platforms, including Windows 95 and -NT (these 2 platforms are collectively termed Win32). +NT (which both fall under the Win32 label). Apache is the most popular web-server in the known universe; over half of the servers on the Internet are running Apache or one of its 1.970 +3 -4 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.969 retrieving revision 1.970 diff -u -r1.969 -r1.970 --- CHANGES 1998/07/18 11:35:51 1.969 +++ CHANGES 1998/07/18 22:50:15 1.970 @@ -1,9 +1,8 @@ Changes with Apache 1.3.1 - *) Disable a too problematic entry for application/msword in the magic file - for mod_mime_magic. It matched also other Office documents for which - application/msword is incorrect. - [Ralf S. Engelschall] PR#2608 + *) Disable the incorrect entry for application/msword in the + mod_mime_magic magic file because it also matches other Office + documents. [Ralf S. Engelschall] PR#2608 *) Fix broken RANLIB handling in src/Configure (the entry from src/Configuration.tmpl was ignored) and additionally force RANLIB to
cvs commit: apache-1.3/src/os/win32/installer apache.iwz
marc98/07/18 15:57:34 Modified:src/include httpd.h src/os/win32 registry.c src/os/win32/installer apache.iwz Log: Update for rolling 1.3.1 release. Revision ChangesPath 1.227 +2 -2 apache-1.3/src/include/httpd.h Index: httpd.h === RCS file: /export/home/cvs/apache-1.3/src/include/httpd.h,v retrieving revision 1.226 retrieving revision 1.227 diff -u -r1.226 -r1.227 --- httpd.h 1998/07/13 11:32:35 1.226 +++ httpd.h 1998/07/18 22:57:27 1.227 @@ -382,7 +382,7 @@ * Example: Apache/1.1.0 MrWidget/0.1-alpha */ -#define SERVER_BASEVERSION Apache/1.3.1-dev/* SEE COMMENTS ABOVE */ +#define SERVER_BASEVERSION Apache/1.3.1/* SEE COMMENTS ABOVE */ #define SERVER_VERSION SERVER_BASEVERSION enum server_token_type { SrvTk_MIN, /* eg: Apache/1.3.0 */ @@ -399,7 +399,7 @@ * For a final release, 'betaseq' should be set to '99'. * For example, Apache 1.4.2 should be '1040299' */ -#define APACHE_RELEASE 1030101 +#define APACHE_RELEASE 1030199 #define SERVER_PROTOCOL HTTP/1.1 #ifndef SERVER_SUPPORT 1.7 +1 -1 apache-1.3/src/os/win32/registry.c Index: registry.c === RCS file: /export/home/cvs/apache-1.3/src/os/win32/registry.c,v retrieving revision 1.6 retrieving revision 1.7 diff -u -r1.6 -r1.7 --- registry.c1998/06/02 11:24:39 1.6 +++ registry.c1998/07/18 22:57:31 1.7 @@ -28,7 +28,7 @@ #define VENDOR Apache Group #define SOFTWARE Apache -#define VERSION 1.3.1 dev +#define VERSION 1.3.1 #define REGKEY SOFTWARE\\ VENDOR \\ SOFTWARE \\ VERSION 1.10 +5 -5 apache-1.3/src/os/win32/installer/apache.iwz Index: apache.iwz === RCS file: /export/home/cvs/apache-1.3/src/os/win32/installer/apache.iwz,v retrieving revision 1.9 retrieving revision 1.10 diff -u -r1.9 -r1.10 --- apache.iwz1998/06/14 14:31:07 1.9 +++ apache.iwz1998/07/18 22:57:34 1.10 @@ -46,9 +46,9 @@ AppName=Apache AppExe= AppExeFile= -Version=1.3.0 +Version=1.3.1 Company=Apache Group -Title=Apache Web Server 1.3.0 +Title=Apache Web Server 1.3.1 TitleType=1 BackgrndBmp= BackgrndAlign=4 @@ -795,7 +795,7 @@ Reg9Val1Name=(Default) Reg9Val1Data=(value not set) Reg9Vals=1 -Reg10Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.0 +Reg10Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.1 Reg10Val1Type=0 Reg10Val1Name=(Default) Reg10Val1Data=(value not set) @@ -809,8 +809,8 @@ Reg1Path=HKEY_LOCAL_MACHINE\SOFTWARE Reg2Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group Reg3Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache -Reg4Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.0 -Reg5Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.0 +Reg4Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.1 +Reg5Path=HKEY_LOCAL_MACHINE\SOFTWARE\Apache Group\Apache\1.3.1 Reg5ValName=ServerRoot Reg5ValType=0 Reg5ValData=INSTALLDIR
cvs commit: apache-1.3/conf access.conf-dist-win httpd.conf-dist-win
marc98/07/16 13:24:41 Modified:conf access.conf-dist-win httpd.conf-dist-win Log: A few minor win32 cleanups. More work is required to make the *-win files make sense. Revision ChangesPath 1.9 +5 -4 apache-1.3/conf/access.conf-dist-win Index: access.conf-dist-win === RCS file: /export/home/cvs/apache-1.3/conf/access.conf-dist-win,v retrieving revision 1.8 retrieving revision 1.9 diff -u -r1.8 -r1.9 --- access.conf-dist-win 1998/06/08 14:37:26 1.8 +++ access.conf-dist-win 1998/07/16 20:24:40 1.9 @@ -18,10 +18,11 @@ # First, we configure the default to be a very restrictive set of # permissions. -Directory / -Options FollowSymLinks -AllowOverride None -/Directory +# disabled because it is currently broken on Win32 +#Directory / +#Options FollowSymLinks +#AllowOverride None +#/Directory # Note that from this point forward you must specifically allow # particular features to be enabled - so if something's not working as 1.16 +0 -5 apache-1.3/conf/httpd.conf-dist-win Index: httpd.conf-dist-win === RCS file: /export/home/cvs/apache-1.3/conf/httpd.conf-dist-win,v retrieving revision 1.15 retrieving revision 1.16 diff -u -r1.15 -r1.16 --- httpd.conf-dist-win 1998/06/08 14:37:26 1.15 +++ httpd.conf-dist-win 1998/07/16 20:24:40 1.16 @@ -47,11 +47,6 @@ # If you wish httpd to run as a different user or group, you must run # httpd as root initially and it will switch. - -# User/Group: The name (or #number) of the user/group to run httpd as. -User nobody -Group #-1 - # ServerAdmin: Your address, where problems with the server should be # e-mailed.
cvs commit: apache-1.3/htdocs/manual/mod mod_auth_anon.html
marc98/07/14 20:04:24 Modified:htdocs/manual/mod mod_auth_anon.html Log: Addresses specified for mod_log_anon are logged in the error log, not the httpd-log. PR: 2610 Submitted by: Ron Klatchko [EMAIL PROTECTED] Revision ChangesPath 1.20 +2 -2 apache-1.3/htdocs/manual/mod/mod_auth_anon.html Index: mod_auth_anon.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/mod_auth_anon.html,v retrieving revision 1.19 retrieving revision 1.20 diff -u -r1.19 -r1.20 --- mod_auth_anon.html1998/05/20 14:12:53 1.19 +++ mod_auth_anon.html1998/07/15 03:04:24 1.20 @@ -162,7 +162,7 @@ STRONGModule:/STRONG/A mod_auth_anonP When set 'on', the default, the 'password' entered (which hopefully -contains a sensible email address) is logged in the httpd-log file. +contains a sensible email address) is logged in the error log. HR H2A NAME=MustGiveEmailAnonymous_MustGiveEmail directive/A/H2 @@ -282,7 +282,7 @@ and comparison is STRONGnot/STRONG case sensitive. LI And the Email addresses entered in the passwd field are logged to -the httpd-log file +the error log file (CODEAnonymous_LogEmail/CODE) /UL P
cvs commit: apache-1.3/src/include compat.h conf.h
marc98/07/14 20:27:04 Modified:src/include compat.h conf.h Log: Fix up compat.h and conf.h legacy support. Revision ChangesPath 1.15 +2 -3 apache-1.3/src/include/compat.h Index: compat.h === RCS file: /export/home/cvs/apache-1.3/src/include/compat.h,v retrieving revision 1.14 retrieving revision 1.15 diff -u -r1.14 -r1.15 --- compat.h 1998/07/13 11:32:34 1.14 +++ compat.h 1998/07/15 03:27:03 1.15 @@ -2,9 +2,8 @@ * compat.h -- backward compatibility header for ap_compat.h */ -#if __GNUC__ -#warning This header becomes obsolete, use ap_compat.h instead +#ifdef __GNUC__ +#warning This header is obsolete, use ap_compat.h instead #endif #include ap_compat.h - 1.226 +3 -4 apache-1.3/src/include/conf.h Index: conf.h === RCS file: /export/home/cvs/apache-1.3/src/include/conf.h,v retrieving revision 1.225 retrieving revision 1.226 diff -u -r1.225 -r1.226 --- conf.h1998/07/13 11:32:35 1.225 +++ conf.h1998/07/15 03:27:03 1.226 @@ -2,9 +2,8 @@ * conf.h -- backward compatibility header for ap_config.h */ -#if __GNUC__ -#warning This header becomes obsolete, use ap_config.h instead +#ifdef __GNUC__ +#warning This header is obsolete, use ap_config.h instead #endif -#include ap_compat.h - +#include ap_config.h
cvs commit: apache-1.3/src CHANGES
marc98/07/14 21:14:00 Modified:src CHANGES Log: Assorted CHANGES cleanups. I mean not to step on toes. Revision ChangesPath 1.964 +35 -37apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.963 retrieving revision 1.964 diff -u -r1.963 -r1.964 --- CHANGES 1998/07/13 11:32:28 1.963 +++ CHANGES 1998/07/15 04:13:58 1.964 @@ -8,28 +8,28 @@ 4. compat.h- ap_compat.h 5. apctype.h - ap_ctype.h Backward compatibility files for conf.h and compat.h were created. - [The Apache Group] - *) Let mod_mmap_static be more reserved unless at least one mmapfile - directive is present in the configuration. Because this experimental - module has to do some black magic to operate inside the current API and - thus forces side-effects for other modules under some circumstances. + *) mod_mmap_static will no longer take action on requests unless at + least one mmapfile directive is present in the configuration. + This experimental module has to do some black magic to operate + inside the current API and thus creates side-effects for other + modules under some circumstances. [Ralf S. Engelschall] *) Add conservative ticks around more egrep arguments in top-level configure to avoid problems under brain-dead platforms like Digital Unix (OSF1). [Ralf S. Engelschall] PR#2596 - *) mod_rewrite created RewriteLock files under the uid of the parent + *) mod_rewrite created RewriteLock files under the UID of the parent process, thus the child processes had no write access to the files. - Now a chown() is done to the uid of the childs if applicable. - [Lars Eilebrecht, Ralf S. Engelschall] PR#2341 + Now a chown() is done on the file to the uid of the children, + if applicable. [Lars Eilebrecht, Ralf S. Engelschall] PR#2341 *) Autogenerate some HAVE_X_H defines in conf_auto.h (determined via TestCompile) instead of defining them manually in conf.h based on less - accurate platform definitions. This way we no longer have to fiddle with + accurate platform definitions. This way we no longer have to fiddle with OS-type and/or OS-version identifiers to discover whether a system header - file exists or not. Instead we now directly check for the existence of + file exists or not. Instead we now directly check for the existence of those esoteric ones. [Ralf S. Engelschall] PR#2093, PR#2361, PR#2377, PR#2434, PR#2524, PR#2525, PR#2533, PR#2569 @@ -39,12 +39,12 @@ *) Cache a proxied request in the event that the client cancels the transfer, provided that the configured percentage of the file has - already been transfered. It works for http transfers only. The - new httpd.conf directive is called CacheForceCompletion. + already been transfered. It works for HTTP transfers only. The + new configuration directive is called CacheForceCompletion. [Glen Parker [EMAIL PROTECTED]] PR#2277 *) Add the !DOCTYPE HTML magic cookie used by modern documents (and - required by HTML 3.2 and later) to conf/magic. + required by HTML 3.2 and later) to mod_mime_magic's conf/magic. [Anna Shergold [EMAIL PROTECTED]] *) Fix yet another signal-based race condition involving nested timers. @@ -66,14 +66,14 @@ [Ronald Record [EMAIL PROTECTED]] PR#2533 *) The APACI libexecdir was not extended with an apache/ subdir - if the installation prefix doesn't already contain apache. Although - it is useful because the DSO files are totally Apache-specific. Now + if the installation prefix didn't already contain apache, but + it should be because the DSO files are Apache-specific. Now libexecdir is treated the same way sysconfdir, datadir, localstatedir and includedir are already treated. [Charles Levert [EMAIL PROTECTED]] PR#2551 - *) The Limit parsing routine was incorrectly treating methods in - a case-insensitive way. [Ken Coar] + *) The Limit parsing routine was incorrectly treating methods as + case-insensitive. [Ken Coar] *) The ap_bprintf() code neglected to test if there was an error on the connection. ap_bflush() misdiagnosed a failure as a success. @@ -104,12 +104,12 @@ *) Add a flag so ap_fnmatch() can be used for case-blind pattern matching. [Ken Coar, Dean Gaudet] - *) Win32: Don't collapse multiple slashes in PATH_INFO. + *) WIN32: Don't collapse multiple slashes in PATH_INFO. [Ben Laurie, Bill Stoddard [EMAIL PROTECTED]] PR#2274 - *) Win32 (security
cvs commit: apache-1.3/src CHANGES
marc98/07/14 22:46:02 Modified:src CHANGES Log: A few more CHANGES updates. Revision ChangesPath 1.965 +10 -5 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.964 retrieving revision 1.965 diff -u -r1.964 -r1.965 --- CHANGES 1998/07/15 04:13:58 1.964 +++ CHANGES 1998/07/15 05:46:00 1.965 @@ -1,5 +1,10 @@ Changes with Apache 1.3.1 + *) WIN32: Canonicalize ServerRoot before checking to see if it + is a valid directory. The failure to do this caused certain + ServerRoot settings (eg. ServerRoot /apache) to be improperly + rejected. [Marc Slemko] + *) Global renaming of C header files to both get rid of conflicts with third party packages and to again reach consistency: 1. conf.h - ap_config.h @@ -37,6 +42,11 @@ *) mod_setenvif (BrowserMatch* and friends) will now match a missing field with ^$. [Ken Coar] + *) Set the RTLD_GLOBAL dlopen mode parameter to allow dynamically loaded + modules to load their own modules dynamically. This improves mod_perl + and mod_php3 when these modules are loaded dynamically into Apache. + [Rasmus Lerdorf] + *) Cache a proxied request in the event that the client cancels the transfer, provided that the configured percentage of the file has already been transfered. It works for HTTP transfers only. The @@ -300,11 +310,6 @@ to continue in background, use predefined types (off_t, size_t, time_t), log the current cache usage percentage at LogLevel debug [Martin Kraemer, based on discussion between Dean Gaudet Dirk vanGulik] - - *) Set the RTLD_GLOBAL dlopen mode parameter to allow dynamically loaded - modules to load their own modules dynamically. This improves mod_perl - and mod_php3 when these modules are loaded dynamically into Apache. - [Rasmus Lerdorf] Changes with Apache 1.3.0
cvs commit: apache-1.3 Announcement
marc98/07/14 23:51:59 Modified:.Announcement Log: Make up something resembling a 1.3.1 announcement. Comments or {ap|dis}proval please. Still needs to be reviewed, but get what I have now in for comment. Revision ChangesPath 1.31 +68 -28apache-1.3/Announcement Index: Announcement === RCS file: /export/home/cvs/apache-1.3/Announcement,v retrieving revision 1.30 retrieving revision 1.31 diff -u -r1.30 -r1.31 --- Announcement 1998/07/12 09:45:47 1.30 +++ Announcement 1998/07/15 06:51:58 1.31 @@ -1,31 +1,71 @@ +Apache 1.3.1 Released += - Apache 1.3.1 Released - = +The Apache Group is pleased to announce the release of version 1.3.1 +of the Apache HTTP server. - The Apache Group is pleased to announce the release of the 1.3.1 version - of the Apache HTTP server. This is mainly a bugfix release. +The changes in this release consist of UNIX portability fixes, Win32 +security issues, and assorted other minor features or fixes. - Apache 1.3.1 is the most stable version of Apache currently available; - everyone running 1.2.X servers or earlier should upgrade to 1.3, as we - will stop providing support for the 1.2.X tree, though we may make a - release of 1.2.7. At present, the Win95/NT port of Apache is not - as stable as the UNIX version. Further releases of the 1.3.x tree - will bring the Win95/NT port closer to parity. - - To grab the latest Apache distribution, check out - http://www.apache.org/dist/ - and the huge list of available International Mirror Sites at - http://www.apache.org/mirrors/ - - For an overview of new features in 1.3 please read see - - http://www.apache.org/docs/new_features_1_3.html - - In general, Apache 1.3.0 offers several substantial improvements - over previous versions, including better performance, reliability - and a wider-range of supported platforms, including Windows95 and - NT. - - Apache is the most popular web-server in the known universe; over - half of the servers on the Internet are running Apache or one of its - variants. +WE URGE ALL USERS RUNNING ANY PREVIOUS VERSION OF APACHE ON WIN32 +TO UPGRADE IMMEDIATELY. + +Users on other platforms should review the CHANGES file and decide +on their upgrade plans; the security issues apply only to Apache +on Win32. + +Apache 1.3.1 is available for download from + + http://www.apache.org/dist/ + +Please see the CHANGES file in the same directory for a full list of +changes. The distribution is also available via any of the mirrors +listed at + + http://www.apache.org/mirrors/ + +For an overview of new features in 1.3 please see + + http://www.apache.org/docs/new_features_1_3.html + +In general, Apache 1.3 offers several substantial improvements +over version 1.2, including better performance, reliability +and a wider-range of supported platforms, including Windows 95 and +NT. + +Apache is the most popular web-server in the known universe; over +half of the servers on the Internet are running Apache or one of its +variants. + +IMPORTANT NOTE FOR WIN32 USERS: Over the years, many users have +come to trust Apache as a secure and stable server. It must +be realized that the current Win32 code has not yet reached these +levels and should still be considered to be of beta quality. Any +Win32 stability or security problems do not impact, in any way, +Apache on other platforms. With the continued donation of time +and resources by individuals and companies, we hope that the Win32 +version of Apache will grow stronger through the 1.3.x release +cycle. + +Versions of Apache on Win32 prior to version 1.3.1 are vulnerable +to a number of security holes common to several Win32 servers. +The problems that impact Apache include: + + - trailing .s are ignored by the file system. This allowed + certain types of access restrictions to be bypassed. + - directory names of three or more dots (eg. ...) are + considered to be valid similar to ... This allowed people + to gain access to files outside of the configured document + trees. + +There have been at least four other similar instances of the same +basic problem: on Win32, there is more than one name for a file. +Some of these names are poorly documented or undocumented, and even +Microsoft's own IIS has been vulnerable to many of these problems. +This behavior of the Win32 file system and API makes it very difficult +to insure future security; problems of this type have been known +about for years, however each specific instance has been discovered +individually. It is unknown if there are other, yet unpublicized, +filename variants
cvs commit: apache-1.3/src/support ab.c
marc98/07/15 11:33:13 Modified:src/support ab.c Log: Use ap_select instead of select in ab, and replace hardcoded 256 with FD_SETSIZE. Should really dynamically track the highest descriptor and use that. PR: 2625 Submitted by: Richard Lloyd [EMAIL PROTECTED], Marc Slemko Revision ChangesPath 1.10 +1 -1 apache-1.3/src/support/ab.c Index: ab.c === RCS file: /export/home/cvs/apache-1.3/src/support/ab.c,v retrieving revision 1.9 retrieving revision 1.10 diff -u -r1.9 -r1.10 --- ab.c 1998/07/13 11:32:57 1.9 +++ ab.c 1998/07/15 18:33:12 1.10 @@ -551,7 +551,7 @@ /* Timeout of 30 seconds. */ timeout.tv_sec = 30; timeout.tv_usec = 0; -n = select(256, sel_read, sel_write, sel_except, timeout); +n = ap_select(FD_SETSIZE, sel_read, sel_write, sel_except, timeout); if (!n) { printf(\nServer timed out\n\n); exit(1);
cvs commit: apache-1.3/src/main http_core.c
marc98/07/12 19:44:26 Modified:src/main http_core.c Log: Canonicalize ServerRoot _before_ checking if it is a directory. Fixes problem where paths without a directory were rejected with a horrible error on Win32. Revision ChangesPath 1.211 +4 -1 apache-1.3/src/main/http_core.c Index: http_core.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v retrieving revision 1.210 retrieving revision 1.211 diff -u -r1.210 -r1.211 --- http_core.c 1998/07/10 05:44:46 1.210 +++ http_core.c 1998/07/13 02:44:24 1.211 @@ -1680,14 +1680,17 @@ static const char *set_server_root(cmd_parms *cmd, void *dummy, char *arg) { const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); + if (err != NULL) { return err; } +arg = ap_os_canonical_filename(cmd-pool, arg); + if (!ap_is_directory(arg)) { return ServerRoot must be a valid directory; } -ap_cpystrn(ap_server_root, ap_os_canonical_filename(cmd-pool, arg), +ap_cpystrn(ap_server_root, arg, sizeof(ap_server_root)); return NULL; }
cvs commit: apache-1.3/src/os/win32 util_win32.c
marc98/07/12 20:02:16 Modified:src/os/win32 util_win32.c Log: Give a proper error message in os_stat if we get something that doesn't have a drive letter and isn't UNC instead of dumping with a very unrewarding ap_assert(). Revision ChangesPath 1.21 +10 -1 apache-1.3/src/os/win32/util_win32.c Index: util_win32.c === RCS file: /export/home/cvs/apache-1.3/src/os/win32/util_win32.c,v retrieving revision 1.20 retrieving revision 1.21 diff -u -r1.20 -r1.21 --- util_win32.c 1998/07/08 17:47:25 1.20 +++ util_win32.c 1998/07/13 03:02:16 1.21 @@ -3,6 +3,7 @@ #include stdarg.h #include httpd.h +#include http_log.h /* Returns TRUE if the path is real, FALSE if it is PATH_INFO */ static BOOL sub_canonical_filename(char *szCanon, unsigned nCanon, const char *szFile) @@ -151,7 +152,15 @@ { int n; -ap_assert(szPath[1] == ':' || szPath[1] == '/'); // we are dealing with either UNC or a drive +/* be sure it is has a drive letter or is a UNC path; everything + * _must_ be canonicalized before getting to this point. + */ +if (szPath[1] != ':' szPath[1] != '/') { + ap_log_error(APLOG_MARK, APLOG_ERR, NULL, + Invalid path in os_stat: \%s\, should have a drive letter + or be a UNC path, szPath); + return (-1); +} if(szPath[0] == '/') { char buf[_MAX_PATH];
cvs commit: apache-1.3 STATUS
marc98/07/12 20:19:40 Modified:.STATUS Log: It always rains in Seattle. Revision ChangesPath 1.436 +7 -10 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.435 retrieving revision 1.436 diff -u -r1.435 -r1.436 --- STATUS1998/07/12 14:41:32 1.435 +++ STATUS1998/07/13 03:19:38 1.436 @@ -2,9 +2,12 @@ Release: -1.3.1: In development. Plan to release the next days... - Jim offers to be RM. +1.3.1: In development. Hopeful for rolling tarball on Monday + evening, with release a day or two later. This depends on +Win32 working and being ready. + Does Jim offer to be RM? + 1.3.0: Tagged and rolled on June 1. Announced and Released on the 6th. 2.0 : In pre-alpha development, see apache-2.0 repository @@ -30,13 +33,11 @@ WIN32 1.3 RELEASE SHOWSTOPPERS: -* SECURITY: numerous uses of strcpy and strcat have potential - for buffer overflow, someone should rewrite or verify - they're safe - * Win95: when authentication is required for directory /foobar/, direct access to /foobar/bletch is permitted. PR #2145 + UPDATE: may be false alarm, probably shouldn't hole 1.3.1. + Documentation that needs writing: * Need a document explaining mod_rewrite/UseCanonicalName off based @@ -277,9 +278,6 @@ Help: -* SECURITY: check if the magic con/aux/nul/etc names do anything - really bad - * chdir() for CGI scripts and mod_include #exec needs to be re-implemented now that CreateProcess is being used. @@ -346,7 +344,6 @@ That _really_ sucks. Can we recommend running Apache as some other user? - * need a crypt() of some sort. - sources are easy; problem is export restrictions on DES
cvs commit: apache-1.3 STATUS
marc98/07/12 20:23:39 Modified:.STATUS Log: It never snows in Seattle. Revision ChangesPath 1.437 +24 -18apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.436 retrieving revision 1.437 diff -u -r1.436 -r1.437 --- STATUS1998/07/13 03:19:38 1.436 +++ STATUS1998/07/13 03:23:38 1.437 @@ -14,29 +14,18 @@ RELEASE SHOWSTOPPERS: -* Ralf: mod_so doesn't correctly initialise modules. For instance - the handlers of mod_perl are not initialised. - An ap_init_modules() could be done from mod_so but this is too much. +* auto_conf.h include order is wrong? needs to be _before_ os.h? - I've already debugged this up to ap_invoke_handler() and it correctly - sees the handlers from mod_perl (perl-script) and actually runs them. - But under DSO situation it returns DECLINED while under non-DSO - situation it runs fine. Sure, its mod_perl's fault because its mod_perl - code which returns DECLINED. But it definitely seems to be caused by a - missing init in mod_so under DSO situation. I've already asked Doug for - hints but he has not had a chance to look into it. - - Currently at least mod_perl is broken under the DSO situation because of - this missing init in mod_so. But perhaps there are more modules which - have the same problem. This should be fixed for 1.3.1 or at least found - out why it is happening! +WIN32 1.3.1 RELEASE SHOWSTOPPERS: -WIN32 1.3 RELEASE SHOWSTOPPERS: - * Win95: when authentication is required for directory /foobar/, direct access to /foobar/bletch is permitted. PR #2145 + + UPDATE: may be false alarm, probably shouldn't hold 1.3.1. - UPDATE: may be false alarm, probably shouldn't hole 1.3.1. +* can not build tarball until someone verifies the final code + will build on win32. Want to avoid changes-after-tag that + happened with 1.3.0. Documentation that needs writing: @@ -104,6 +93,23 @@ CustomLog-like tailoring of directory listing formats Needs patch: + +* Ralf: mod_so doesn't correctly initialise modules. For instance + the handlers of mod_perl are not initialised. + An ap_init_modules() could be done from mod_so but this is too much. + + I've already debugged this up to ap_invoke_handler() and it correctly + sees the handlers from mod_perl (perl-script) and actually runs them. + But under DSO situation it returns DECLINED while under non-DSO + situation it runs fine. Sure, its mod_perl's fault because its mod_perl + code which returns DECLINED. But it definitely seems to be caused by a + missing init in mod_so under DSO situation. I've already asked Doug for + hints but he has not had a chance to look into it. + + Currently at least mod_perl is broken under the DSO situation because of + this missing init in mod_so. But perhaps there are more modules which + have the same problem. This should be fixed for 1.3.1 or at least found + out why it is happening! * get_path_info bug; ap_get_remote_host should be ap_vformatter instead. See: [EMAIL PROTECTED]
cvs commit: apache-1.3 STATUS
marc98/07/12 23:53:02 Modified:.STATUS Log: I want snow to wash away the MS. Revision ChangesPath 1.438 +3 -0 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.437 retrieving revision 1.438 diff -u -r1.437 -r1.438 --- STATUS1998/07/13 03:23:38 1.437 +++ STATUS1998/07/13 06:53:02 1.438 @@ -284,6 +284,9 @@ Help: +* Directory /, Directory C:/ both fail to do anything, + while Directory * SEGVs. + * chdir() for CGI scripts and mod_include #exec needs to be re-implemented now that CreateProcess is being used.
cvs commit: apache-1.3/src/os/win32 util_win32.c
marc98/07/13 00:06:17 Modified:src/os/win32 util_win32.c Log: Add some comments and error checking code to avoid wild memcpy. This doesn't fix any of the code, just makes it hurt less. Major bogosity here. Revision ChangesPath 1.22 +9 -5 apache-1.3/src/os/win32/util_win32.c Index: util_win32.c === RCS file: /export/home/cvs/apache-1.3/src/os/win32/util_win32.c,v retrieving revision 1.21 retrieving revision 1.22 diff -u -r1.21 -r1.22 --- util_win32.c 1998/07/13 03:02:16 1.21 +++ util_win32.c 1998/07/13 07:06:16 1.22 @@ -62,6 +62,8 @@ char b2[_MAX_PATH]; char b3[_MAX_PATH]; ap_assert(szFilePart buf+3); + /* avoid SEGVs on things like Directory * */ + ap_assert(s = szFile this is a known bug); memcpy(b3,szFile,s-szFile); b3[s-szFile]='\0'; @@ -94,9 +96,9 @@ } } -/* UNC requires backslashes, hence the conversion before canonicalisation. Not sure how - * many backslashes (could be that \\machine\share\some/path/is/ok for example). For now, do - * them all. +/* UNC requires backslashes, hence the conversion before canonicalisation. + * Not sure how * many backslashes (could be that + * \\machine\share\some/path/is/ok for example). For now, do them all. */ API_EXPORT(char *) ap_os_canonical_filename(pool *pPool, const char *szFile) { @@ -127,6 +129,7 @@ // Finally, a trailing slash(es) screws thing, so blow them away for(nSlashes=0 ; d b2 d[-1] == '\\' ; --d,++nSlashes) ; +/* this breaks '/' and 'c:/' cases */ *d='\0'; sub_canonical_filename(buf, sizeof buf, b2); @@ -142,8 +145,9 @@ /* Win95 doesn't like trailing /s. NT and Unix don't mind. This works * around the problem. - * Errr... except if it is UNC and we are referring to the root of the UNC, we MUST have - * a trailing \ and we can't use /s. Jeez. Not sure if this refers to all UNCs or just roots, + * Errr... except if it is UNC and we are referring to the root of + * the UNC, we MUST have a trailing \ and we can't use /s. Jeez. + * Not sure if this refers to all UNCs or just roots, * but I'm going to fix it for all cases for now. (Ben) */
cvs commit: apache-1.3/src/main http_core.c
marc98/07/09 22:44:46 Modified:src/main http_core.c Log: Warn that StartServers does nothing on Win32 instead of just ignoring it. Revision ChangesPath 1.210 +4 -0 apache-1.3/src/main/http_core.c Index: http_core.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v retrieving revision 1.209 retrieving revision 1.210 diff -u -r1.209 -r1.210 --- http_core.c 1998/07/07 04:06:21 1.209 +++ http_core.c 1998/07/10 05:44:46 1.210 @@ -1853,12 +1853,16 @@ static const char *set_daemons_to_start(cmd_parms *cmd, void *dummy, char *arg) { +#ifdef WIN32 +fprintf(stderr, WARNING: StartServers has no effect on Win32\n); +#else const char *err = ap_check_cmd_context(cmd, GLOBAL_ONLY); if (err != NULL) { return err; } ap_daemons_to_start = atoi(arg); +#endif return NULL; }
cvs commit: apache-1.3/src/modules/standard mod_auth.c
marc98/07/09 23:33:25 Modified:src/modules/standard mod_auth.c Log: Add a warning if a valid user that enters a proper password fails to get access to a directory because they aren't in the list of those allowed access. Revision ChangesPath 1.38 +6 -0 apache-1.3/src/modules/standard/mod_auth.c Index: mod_auth.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_auth.c,v retrieving revision 1.37 retrieving revision 1.38 diff -u -r1.37 -r1.38 --- mod_auth.c1998/07/03 22:08:49 1.37 +++ mod_auth.c1998/07/10 06:33:24 1.38 @@ -292,6 +292,12 @@ if (!(sec-auth_authoritative)) return DECLINED; +ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r-server, + access to %s failed for %s, reason: user %s not allowed access, + r-uri, + ap_get_remote_host(r-connection, r-per_dir_config, REMOTE_NAME), + user); + ap_note_basic_auth_failure(r); return AUTH_REQUIRED; }
cvs commit: apache-1.3/src/main util_script.c
marc98/07/10 01:33:36 Modified:src/main util_script.c Log: Logging that scripts aren't executable on Win32 if we can't figure out how is good; telling people the most probable cause (ie. lack of #! in a script) is even better. Revision ChangesPath 1.122 +4 -2 apache-1.3/src/main/util_script.c Index: util_script.c === RCS file: /export/home/cvs/apache-1.3/src/main/util_script.c,v retrieving revision 1.121 retrieving revision 1.122 diff -u -r1.121 -r1.122 --- util_script.c 1998/07/08 17:47:06 1.121 +++ util_script.c 1998/07/10 08:33:36 1.122 @@ -853,8 +853,10 @@ * file this is by now.. */ if (!is_exe !is_script !is_binary) { -ap_log_error(APLOG_MARK, APLOG_ERR, r-server, - %s is not executable, r-filename); +ap_log_error(APLOG_MARK, APLOG_ERR|APLOG_NOERRNO, r-server, + %s is not executable; ensure interpreted scripts have + \#!\ first line, + r-filename); return (pid); }
cvs commit: apache-1.3/htdocs/manual/mod core.html
marc98/07/06 10:42:13 Modified:htdocs/manual/mod core.html Log: Fix incorrect first available in statement for ifdefine. Revision ChangesPath 1.127 +2 -2 apache-1.3/htdocs/manual/mod/core.html Index: core.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/core.html,v retrieving revision 1.126 retrieving revision 1.127 diff -u -r1.126 -r1.127 --- core.html 1998/07/03 20:12:34 1.126 +++ core.html 1998/07/06 17:42:11 1.127 @@ -1106,8 +1106,8 @@ A HREF=directive-dict.html#Compatibility REL=Help -STRONGCompatibility:/STRONG/A lt;IfDefinegt; is only available in 1.3 and -later.P +STRONGCompatibility:/STRONG/A lt;IfDefinegt; is only available in +1.3.1 and later.P P
Re: cvs commit: apache-1.3/src/main http_core.c
On 3 Jul 1998 [EMAIL PROTECTED] wrote: coar98/07/03 13:06:02 Modified:src CHANGES src/main http_core.c Log: Fix Limit parsing; GET and get are distinct methods. Note that this introduces a security problem in that many users use something other than the uppercase method name in their config files. Previously it worked; this will magically stop authentication from being required for them. That is bad.
Re: cvs commit: apache-1.3/src/modules/proxy proxy_ftp.c
On 13 Jun 1998 [EMAIL PROTECTED] wrote: Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.912 retrieving revision 1.913 diff -u -r1.912 -r1.913 --- CHANGES 1998/06/13 11:24:07 1.912 +++ CHANGES 1998/06/13 12:05:58 1.913 @@ -1,5 +1,11 @@ Changes with Apache 1.3.1 + *) Fix parsing of FTP `SIZE' responses in proxy module: The newline was not + truncated which forced following HTTP headers to be data in the HTTP + reponse. Although the reponse now is copied out from the response buffer + because it is only temporary and overridden at other points. + [Ralf S. Engelschall, Charles Fu [EMAIL PROTECTED]] PR#2412 + Sorry, I'm not sure I understand what you are trying to say in the secnod sentence here. Could you perhaps clarify the entry a bit? Thanks. On a somewhat unrelated note, I have been noticing what seems like a tendency to have huge CHANGES entries lately that ramble on about things instead of succinctly saying what has been changed.
Re: cvs commit: apache-1.3/src/modules/standard mod_rewrite.c
On 3 Jun 1998 [EMAIL PROTECTED] wrote: rse 98/06/03 05:12:12 Modified:src CHANGES src/modules/standard mod_rewrite.c Log: Fix recently introduced Win32 child spawning code in mod_rewrite.c which was broken because of invalid ap_pstrcat() - strcat() transformation. I'm a little bit confused: Seems like no one has actually compiled Apache with all modules under Win32 just before Jim rolled the 1.3.0 tarball. Because else someone had received a compile error. Hmmm... I knew why I hates to put code into mod_rewrite I couldn't test myself... :-( Why is it using sprintf? No. Code. Should. Use. sprintf. Almost. We have an ap_snprintf. Use it. I don't care if it isn't necessary or you think it isn't necessary or it may not be necessary or you hope it isn't necessary. Always unless you shouldn't. And I see no reason why you shouldn't here. +++ mod_rewrite.c 1998/06/03 12:12:11 1.114 @@ -3190,11 +3190,11 @@ #if defined(WIN32) /* MS Windows */ { -char *pCommand; +char pCommand[MAX_STRING_LEN]; STARTUPINFO si; PROCESS_INFORMATION pi; -pCommand = strcat(SHELL_PATH, /C , cmd, NULL); +sprintf(pCommand, %s /C %s, SHELL_PATH, cmd); memset(si, 0, sizeof(si)); memset(pi, 0, sizeof(pi));
cvs commit: apache-1.3/htdocs/manual/mod directive-dict.html
marc98/05/11 07:51:24 Modified:htdocs/manual sections.html htdocs/manual/mod directive-dict.html Log: Fix AllowOverrides -- AllowOverride in docs. PR: 2213 Submitted by: Thomas Neumann [EMAIL PROTECTED] Revision ChangesPath 1.6 +1 -1 apache-1.3/htdocs/manual/sections.html Index: sections.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/sections.html,v retrieving revision 1.5 retrieving revision 1.6 diff -u -r1.5 -r1.6 --- sections.html 1998/02/05 20:04:14 1.5 +++ sections.html 1998/05/11 14:51:23 1.6 @@ -32,7 +32,7 @@ CODElt;Locationgt;/CODE (except a sub-CODElt;Filesgt;/CODE section, but the code doesn't test for that, Lars has an open bug report on that). Semantically however some things, and the most -notable is AllowOverrides, make no sense in +notable is AllowOverride, make no sense in CODElt;Locationgt;/CODE. The same for CODElt;Filesgt;/CODE -- syntactically everything is fine, but semantically some things are different. 1.2 +3 -3 apache-1.3/htdocs/manual/mod/directive-dict.html Index: directive-dict.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/mod/directive-dict.html,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- directive-dict.html 1997/10/15 14:45:24 1.1 +++ directive-dict.html 1998/05/11 14:51:24 1.2 @@ -179,12 +179,12 @@ P Overrides are activated by the A - HREF=core.html#allowoverrides + HREF=core.html#allowoverride REL=Help - SAMPAllowOverrides/SAMP/A + SAMPAllowOverride/SAMP/A directive, and apply to a particular scope (such as a directory) and all descendants, unless further modified by other - SAMPAllowOverrides/SAMP directives at lower levels. The + SAMPAllowOverride/SAMP directives at lower levels. The documentation for that directive also lists the possible override names available. /P
cvs commit: apache-1.3/src CHANGES
marc98/05/11 08:03:13 Modified:src CHANGES Log: Fix AllowOverrides -- AllowOverride. PR: 2213 Submitted by: Thomas Neumann [EMAIL PROTECTED] Revision ChangesPath 1.844 +1 -1 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.843 retrieving revision 1.844 diff -u -r1.843 -r1.844 --- CHANGES 1998/05/11 10:13:25 1.843 +++ CHANGES 1998/05/11 15:03:12 1.844 @@ -1065,7 +1065,7 @@ calls that use too small an initial guess, see alloc.c. [Dean Gaudet] - *) Options and AllowOverrides weren't properly merging in the main + *) Options and AllowOverride weren't properly merging in the main server setting inside vhosts (only an issue when you have no Directory or other section containing an Options that affects a request). Options +foo or -foo in the main_server wouldn't
cvs commit: apache-1.3/src CHANGES
marc98/05/05 22:09:15 Modified:src CHANGES Log: I am pedantic. Fix typos. Revision ChangesPath 1.823 +2 -2 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.822 retrieving revision 1.823 diff -u -r1.822 -r1.823 --- CHANGES 1998/05/06 03:24:14 1.822 +++ CHANGES 1998/05/06 05:09:13 1.823 @@ -1,11 +1,11 @@ Changes with Apache 1.3b7 *) Standardized the time format in mod_status to match that of other - places in the code (e.g. DATE_GMT)). + places in the code (e.g. DATE_GMT). PR#1551 *) Fix handling of %Z in timefmt strings for those platforms with no time zone information in their tm struct. [Paul Eggert [EMAIL PROTECTED]] - PR #754 + PR#754 *) Makes mod_rewrite, mod_log_config, mod_status and the ServerSignature feature compatible with 'UseCanonicalName off' by changing
cvs commit: apache-2.0/docs page_io
marc98/05/06 09:22:12 Modified:docs page_io Log: Silly HP docs. Revision ChangesPath 1.8 +3 -1 apache-2.0/docs/page_io Index: page_io === RCS file: /export/home/cvs/apache-2.0/docs/page_io,v retrieving revision 1.7 retrieving revision 1.8 diff -u -r1.7 -r1.8 --- page_io 1998/03/08 20:41:46 1.7 +++ page_io 1998/05/06 16:22:11 1.8 @@ -103,7 +103,9 @@ (allows you to add headers and trailers in the form of iovec structs) Marc has a man page; ask if you want a copy. Not included - due to copyright issues. + due to copyright issues. man page also available from + http://docs.hp.com/ (in particular, + http://docs.hp.com:80/dynaweb/hpux11/hpuxen1a/rvl3en1a/@Generic__BookTextView/59894;td=3 ) Windows NT:
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/04/25 11:48:44 Modified:htdocs/manual/misc FAQ.html Log: It is bogus to direct people only to .unix for the Win32 version. Revision ChangesPath 1.113 +7 -5 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.112 retrieving revision 1.113 diff -u -r1.112 -r1.113 --- FAQ.html 1998/04/16 15:36:51 1.112 +++ FAQ.html 1998/04/25 18:48:43 1.113 @@ -15,7 +15,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.112 $ ($Date: 1998/04/16 15:36:51 $) + $Revision: 1.113 $ ($Date: 1998/04/25 18:48:43 $) /P P The latest version of this FAQ is always available from the main @@ -419,10 +419,12 @@ A HREF=http://www.apache.org/bug_report.html;the bug report page/A. Other questions should be directed to the A HREF=news:comp.infosystems.www.servers.unix; - SAMPcomp.infosystems.www.servers.unix/SAMP/A - newsgroup, where some of the Apache team lurk, - in the company of many other httpd gurus who should be able - to help. + comp.infosystems.www.servers.unix/A or A HREF= + news:comp.infosystems.www.servers.ms-windows; + comp.infosystems.www.servers.ms-windows/A + newsgroup (as appropriate for the platform you use), where some of the + Apache team lurk, in the company of many other httpd gurus who + should be able to help. /P P Commercial support for Apache is, however, available from a number
cvs commit: apache-1.3/src CHANGES
marc98/04/21 09:55:38 Modified:src CHANGES Log: Fix non-standard formatting that slipped in. Revision ChangesPath 1.785 +32 -32apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.784 retrieving revision 1.785 diff -u -r1.784 -r1.785 --- CHANGES 1998/04/21 16:00:34 1.784 +++ CHANGES 1998/04/21 16:55:36 1.785 @@ -3,7 +3,7 @@ *) Let configure clear out the users parameters (provided as shell variables) to avoid side-effects in src/Configure when the user exported them (which is not needed, but some users do it). - [Ralf S. Engelschall, PR#2101] + [Ralf S. Engelschall] PR#2101 *) Provide backward compatibility from some old src/Configuration.tmpl parameter names to the canonical Autoconf-style shell variable names. For @@ -12,7 +12,7 @@ *) Make sure that make install doesn't overwrite the DocumentRoot and CGI scripts from an existing Apache installation. - [Ralf S. Engelschall, Jim Jagielski, PR#2084] + [Ralf S. Engelschall, Jim Jagielski] PR#2084 *) Make `configure --compat' more compatible by first let the libexecdir default to EPREFIX/libexec instead of EPREFIX/bin and @@ -20,12 +20,12 @@ appended to sysconfdir, datadir, localstatedir and includedir when --compat is used. [Ralf S. Engelschall, Lars Eilebrecht] - *) PR2082: Closed... NeXT required strdup() in support/logresolve.c + *) NeXT requires strdup() in support/logresolve.c. PR#2082 - *) PR2081: Closed... AIX required sys/select.h in support/ab.c + *) AIX requires sys/select.h in support/ab.c PR#2081 *) Fix the path to the MimeMagicFile in the install-config target, too. - [Ralf S. Engelschall, PR#2089] + [Ralf S. Engelschall] PR#2089 *) PORT: Added HP-UX 11 patches [Jeff Earickson [EMAIL PROTECTED]] @@ -125,7 +125,7 @@ user expects. [Ralf S. Engelschall] *) Fixed ordering of argument checks for RewriteBase directive. - [Todd Eigenschink [EMAIL PROTECTED], PR#2045] + [Todd Eigenschink [EMAIL PROTECTED]] PR#2045 *) Change Win32 IS_MODULE to SHARED_MODULE to match Unix' method of indicating that a module is being compiled for dynamic loading. Also @@ -179,8 +179,8 @@ first step to provide both a quick success event and to demonstrate the APXS mechanism to module authors. [Ralf S. Engelschall] - *) Fix core dumps in use of CONNECT in proxy. PR#1326, #1573, #1942 - [EMAIL PROTECTED] + *) Fix core dumps in use of CONNECT in proxy. + [EMAIL PROTECTED] PR#1326, #1573, #1942 *) Modify the log directives in httpd.conf-dist files to use CustomLog so that users have examples of how CustomLog can be used. @@ -232,7 +232,7 @@ *) Fix the check for symbolic links in ``RewriteCond ... -l'': stat() was used instead of lstat() and thus this flag didn't work as expected. - [Rein Tollevik [EMAIL PROTECTED], PR#2010] + [Rein Tollevik [EMAIL PROTECTED]] PR#2010 *) Fix the proxy pass-through feature of mod_rewrite for the case of existing QUERY_STRING now that mod_proxy was recently changed because of @@ -275,13 +275,13 @@ *) Now mod_proxy uses the response string (in addition to the response status code) from the already used FTP SIZE command to setup the Content-Length - header if available. [Ralf S. Engelschall, PR#1183] + header if available. [Ralf S. Engelschall] PR#1183 *) Reanimated the (still undocumented) proxy receive buffer size directive: Renamed from ReceiveBufferSize to ProxyReceiveBufferSize because the old name was really too generic, added documentation for this directive to the mod_proxy.html and corrected the hyperlink to it in the - new_features_1.3.html document. [Ralf S. Engelschall, PR#1348] + new_features_1.3.html document. [Ralf S. Engelschall] PR#1348 *) Fix a bug in the src/helpers/fp2rp script and make it a little bit faster [Martin Kraemer] @@ -455,13 +455,13 @@ remembering the server together with the config structure while configuring and later assuming there is no config when we see a difference between the remembered server and the one calling us. - [Ralf S. Engelschall, PR#1790] + [Ralf S. Engelschall] PR#1790 *) Fixed the DBM RewriteMap support for mod_rewrite: First the support now is automatically disabled under configure time when the dbm_xxx functions are not available. Second, two heavy source code errors in the DBM support code were fixed. This makes DBM RewriteMap's usable again after - a long time of brokenness. [Ralf S
cvs commit: apache-1.3/src/main http_core.c
marc98/04/18 14:38:00 Modified:src CHANGES src/main http_core.c Log: If an explict handler is set for a file yet we end up in the default handler anyway, something went wrong somewhere so we should tell people about it. The old behaviour was silently processing the request with the default handler, giving the user no warning that their configuration to use a specific handler is being ignored. Reviewed by: Ben Laurie, Dean Gaudet, Martin Kraemer Revision ChangesPath 1.773 +5 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.772 retrieving revision 1.773 diff -u -r1.772 -r1.773 --- CHANGES 1998/04/18 10:54:54 1.772 +++ CHANGES 1998/04/18 21:37:54 1.773 @@ -1,5 +1,10 @@ Changes with Apache 1.3b7 + *) If a specific handler is set for a file yet the request still + ends up being handled by the default handler, log an error + message before handling it. This catches things such as trying + to use SSIs without mod_include enabled. [Marc Slemko] + *) Fix error logging for the startup case where ap_log_error() still uses stderr as the target. Now the default log level is honored here, too. [Ralf S. Engelschall] 1.185 +6 -0 apache-1.3/src/main/http_core.c Index: http_core.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_core.c,v retrieving revision 1.184 retrieving revision 1.185 diff -u -r1.184 -r1.185 --- http_core.c 1998/04/18 11:53:35 1.184 +++ http_core.c 1998/04/18 21:37:58 1.185 @@ -2049,6 +2049,12 @@ caddr_t mm; #endif +if (r-handler) { + ap_log_error(APLOG_MARK, APLOG_NOERRNO|APLOG_WARNING, + r-server, handler \%s\ not found, using default + handler for: %s, r-handler, r-filename); +} + /* This handler has no use for a request body (yet), but we still * need to read and discard it if the client sent one. */
cvs commit: apache-1.3/htdocs/manual/misc FAQ.html
marc98/04/16 08:36:54 Modified:htdocs/manual/misc FAQ.html Log: Someone should add disable-auth-for-subdir hack. Revision ChangesPath 1.112 +3 -1 apache-1.3/htdocs/manual/misc/FAQ.html Index: FAQ.html === RCS file: /export/home/cvs/apache-1.3/htdocs/manual/misc/FAQ.html,v retrieving revision 1.111 retrieving revision 1.112 diff -u -r1.111 -r1.112 --- FAQ.html 1998/04/11 06:34:23 1.111 +++ FAQ.html 1998/04/16 15:36:51 1.112 @@ -15,7 +15,7 @@ !--#include virtual=header.html -- H1 ALIGN=CENTERApache Server Frequently Asked Questions/H1 P - $Revision: 1.111 $ ($Date: 1998/04/11 06:34:23 $) + $Revision: 1.112 $ ($Date: 1998/04/16 15:36:51 $) /P P The latest version of this FAQ is always available from the main @@ -77,6 +77,8 @@ !-- file) don't have the type listed at all. -- !-- - Why is my .htaccess ignored? -- !-- - RewriteRule /~fraggle/* /cgi-bin/fraggle.pl does not work-- +!-- - how do I disable authentication for a subdirectory? -- +!-- (A: you can't but satisfy any; allow from all can be close -- UL LISTRONGBackground/STRONG OL START=1
Re: cvs commit: apache-1.3 Makefile.tmpl
On 14 Apr 1998 [EMAIL PROTECTED] wrote: +# install the Apache C header files +install-include: + @echo === [include: Installing Apache C header files] + $(CP) $(SRC)/include/*.h $(includedir)/ + osdir=`grep '^OSDIR' $(SRC)/Makefile.config | sed -e 's:^OSDIR=::'`; \ + $(CP) $(SRC)/$$osdir/os.h $(includedir)/ + @echo === [include] Hang on a sec here! I haven't looked at any of this stuff before, but this is just plain broken. (yes, it was there before I just didn't notice...) I run configure on my system. I end up with a Makefile (by default) that installs things in completely different places from where all the docs say, that creates a /usr/local/var (I have never heard of any OS where this is legit to have!), screws with my /usr/local/include directory by installing all Apache includes in it, etc. This is _not_ good. Part of it is just the horrible hassles of having two recommended ways of installing things and having to support both, part is just brokenness in the current setup. Some good work has gone into this, and it has some good features, however I am still very leery of it and the pain it can cause, both for the user and for us trying to support it.
cvs commit: apache-1.3/src/modules/standard mod_include.c
marc98/04/11 22:50:37 Modified:src/modules/standard mod_include.c Log: Skip the nested include kludge of the subreq doesn't exist because it wasn't permitted. This avoids dereferencing a null pointer. PR: 2037 Revision ChangesPath 1.82 +2 -1 apache-1.3/src/modules/standard/mod_include.c Index: mod_include.c === RCS file: /export/home/cvs/apache-1.3/src/modules/standard/mod_include.c,v retrieving revision 1.81 retrieving revision 1.82 diff -u -r1.81 -r1.82 --- mod_include.c 1998/04/11 12:00:47 1.81 +++ mod_include.c 1998/04/12 05:50:36 1.82 @@ -689,7 +689,8 @@ } /* see the Kludge in send_parsed_file for why */ - ap_set_module_config(rr-request_config, includes_module, r); + if (rr) + ap_set_module_config(rr-request_config, includes_module, r); #ifdef CHARSET_EBCDIC ap_bsetflag(rr-connection-client, B_EBCDIC2ASCII, 0);
cvs commit: apache-1.3/src Configuration.tmpl
marc98/04/09 20:34:22 Modified:src Configuration.tmpl Log: Be more explicit about when IRIXNIS=yes is required. On recent systems, libsun is empty and on some it has been rumored to cause problems if you link against it. Inspired by PR: 2050 Revision ChangesPath 1.97 +5 -3 apache-1.3/src/Configuration.tmpl Index: Configuration.tmpl === RCS file: /export/home/cvs/apache-1.3/src/Configuration.tmpl,v retrieving revision 1.96 retrieving revision 1.97 diff -u -r1.96 -r1.97 --- Configuration.tmpl1998/04/09 08:20:19 1.96 +++ Configuration.tmpl1998/04/10 03:34:22 1.97 @@ -63,7 +63,7 @@ # # The Configure script currently has only limited built-in # knowledge on how to compile shared objects because this is -# heavily platform-dependend. The current state is this: +# heavily platform-dependent. The current state is this: # # Out-of-the-box supported platforms: # Linux, FreeBSD, Solaris, SunOS, IRIX, OSF1, UnixWare @@ -109,8 +109,10 @@ # # IRIXNIS: # Only takes effect if Configure determines that you are running -# SGI IRIX. If you are, and you are using NIS, you should set this -# to 'yes' +# SGI IRIX. If you are using a (ancient) 4.x version of IRIX, you +# need this if you are using NIS and Apache needs access to it for +# things like mod_userdir. This is not required on 5.x and later +# and you should not enable it on such systems. # # IRIXN32: # If you are running a version of IRIX and Configure detects
cvs commit: apache-1.3 STATUS
marc98/04/03 13:27:09 Modified:.STATUS Log: cloudy and overcast. That isn't the weather. Revision ChangesPath 1.261 +3 -1 apache-1.3/STATUS Index: STATUS === RCS file: /export/home/cvs/apache-1.3/STATUS,v retrieving revision 1.260 retrieving revision 1.261 diff -u -r1.260 -r1.261 --- STATUS1998/04/03 21:08:47 1.260 +++ STATUS1998/04/03 21:27:07 1.261 @@ -185,7 +185,9 @@ renaming. The used prefix or prefixes are configureable in the file, too. But we have to additionally vote on them in the next point. Votes: Ralf +1, Jim +1 (on the source-level renaming for - 1.3b6 and 1.3.0; how is still up for debate :) ) + 1.3b6 and 1.3.0; how is still up for debate :) ), + Marc -0 (this is not the time nor the place, but I don't have + time to veto this crap so it will be pushed through) * Use consistant prefixes for the renaming; suggestions:
cvs commit: apache-site bug_report.html
marc98/03/24 21:05:14 Modified:.bug_report.html Log: Let's shout even louder at people about submitting bug reports. Revision ChangesPath 1.9 +9 -3 apache-site/bug_report.html Index: bug_report.html === RCS file: /export/home/cvs/apache-site/bug_report.html,v retrieving revision 1.8 retrieving revision 1.9 diff -u -r1.8 -r1.9 --- bug_report.html 1997/11/08 23:29:59 1.8 +++ bug_report.html 1998/03/25 05:05:13 1.9 @@ -16,8 +16,8 @@ PWelcome to the Apache Bug Reporting Page! If you are having trouble with Apache, please fill out a problem report form and submit it. -Before you do that, though, make bsure/b you have done ball/b -of the following:/P +Before you do that, though, FONT COLOR=redmake bsure/b you have +done ball/b of the following:/FONT/P OL LIVerified that the bug exists in A href=mirrors/the most recent version/A @@ -33,7 +33,9 @@ codeMakefile/code. LITried compiling with only the distributed set of modules and with no other patches (so that we can make sure it's an Apache bug and -not a bug in a module or patch provided by someone else). +not a bug in a module or patch provided by someone else). It is +frustrating to take time and effort to track down a problem only +to figure out it caused by a broken third party module. LIChecked the A HREF=docs/misc/FAQ.htmlFAQ/A. LISearched the A HREF=http://www.apache.org/bugdb.cgi;bug report/A database. When you are doing this, you should be sure to search @@ -56,6 +58,10 @@ and you will help keep developer time free for improving Apache. Most bug reports submitted are actually user configuration problems that could be easily fixed by asking in the newsgroup. + + PFONT COLOR=redDo Bnot/B post to Usenet and submit a bug + report at the same time./FONT This wastes everyone's time. + Post to Usenet and wait a few days. /STRONG /BLOCKQUOTE
cvs commit: apache-site bug_report.html
marc98/03/25 15:47:33 Modified:.bug_report.html Log: The world isn't Unix any more (not that it ever completely was), plus Deja News is cool. Revision ChangesPath 1.10 +15 -9 apache-site/bug_report.html Index: bug_report.html === RCS file: /export/home/cvs/apache-site/bug_report.html,v retrieving revision 1.9 retrieving revision 1.10 diff -u -r1.9 -r1.10 --- bug_report.html 1998/03/25 05:05:13 1.9 +++ bug_report.html 1998/03/25 23:47:31 1.10 @@ -49,15 +49,21 @@ If you're not sure that your problem is specifically related to a bug in Apache (ie. not something like a client problem or configuration problem), we strongly recommend that you check in the - A - HREF=news:comp.infosystems.www.servers.unix; - SAMPcomp.infosystems.www.servers.unix/SAMP/A - USENET newsgroup first. If you don't receive a response within a few - days, then please submit it to the Apache bug database. If it's a - known issue, you'll probably get a faster response from the newsgroup - and you will help keep developer time free for improving Apache. Most - bug reports submitted are actually user configuration problems that - could be easily fixed by asking in the newsgroup. + A HREF=news:comp.infosystems.www.servers.unix;SAMP + comp.infosystems.www.servers.unix/SAMP/A or A HREF= + news:comp.infosystems.www.servers.ms-windows;SAMP + comp.infosystems.www.servers.ms-windows/SAMP/A (depending on + the platform being used) Usenet newsgroup first. If you don't + receive a response within a few days, then please submit it to + the Apache bug database. If it's a known issue, you'll probably + get a faster response from the newsgroup and you will help keep + developer time free for improving Apache. Most bug reports submitted + are actually user configuration problems that could be easily + fixed by asking in the newsgroup. + + PIf you do not have access to a Usenet server, there are + several web sites on the Internet that allow you to read and post + to Usenet, such as A HREF=http://www.dejanews.com/;Deja News/A. PFONT COLOR=redDo Bnot/B post to Usenet and submit a bug report at the same time./FONT This wastes everyone's time.
cvs commit: apache-1.3/src/support ab.c
marc98/03/21 17:31:50 Modified:src/support ab.c Log: Only need one break. Revision ChangesPath 1.3 +0 -1 apache-1.3/src/support/ab.c Index: ab.c === RCS file: /export/home/cvs/apache-1.3/src/support/ab.c,v retrieving revision 1.2 retrieving revision 1.3 diff -u -r1.2 -r1.3 --- ab.c 1998/03/19 09:56:41 1.2 +++ ab.c 1998/03/22 01:31:49 1.3 @@ -660,7 +660,6 @@ case 'c': concurrency = atoi(optarg); break; -break; case 't': tlimit = atoi(optarg); requests = MAX_REQUESTS;/* need to size data array on something */
cvs commit: apache-1.3/src/main http_main.c
marc98/03/20 18:06:06 Modified:src/main http_main.c Log: Cast getpid() return to unsigned long to stop compilers from whining. Possibly bogus, but without a smarter configuration script we have no other option. Revision ChangesPath 1.309 +2 -1 apache-1.3/src/main/http_main.c Index: http_main.c === RCS file: /export/home/cvs/apache-1.3/src/main/http_main.c,v retrieving revision 1.308 retrieving revision 1.309 diff -u -r1.308 -r1.309 --- http_main.c 1998/03/17 23:24:10 1.308 +++ http_main.c 1998/03/21 02:06:05 1.309 @@ -339,7 +339,8 @@ { char buf[20]; -ap_snprintf(buf, sizeof(buf), .%lu, getpid()); +/* possibly bogus cast */ +ap_snprintf(buf, sizeof(buf), .%lu, (unsigned long)getpid()); lock_fname = pstrcat(p, server_root_relative(p, lock_fname), buf, NULL); } #endif
cvs commit: apache-1.3/src Makefile.nt
marc98/03/20 21:02:53 Modified:src Makefile.nt Log: We have these, lets install them. Seem to work for me. Revision ChangesPath 1.24 +3 -0 apache-1.3/src/Makefile.nt Index: Makefile.nt === RCS file: /export/home/cvs/apache-1.3/src/Makefile.nt,v retrieving revision 1.23 retrieving revision 1.24 diff -u -r1.23 -r1.24 --- Makefile.nt 1998/02/24 14:36:48 1.23 +++ Makefile.nt 1998/03/21 05:02:52 1.24 @@ -113,6 +113,7 @@ copy os\win32\ApacheModuleCERNMetaR\ApacheModuleCERNMeta.dll \Apache\modules copy os\win32\ApacheModuleExpiresR\ApacheModuleExpires.dll \Apache\modules copy os\win32\ApacheModuleHeadersR\ApacheModuleHeaders.dll \Apache\modules + copy os\win32\ApacheModuleRewriteR\ApacheModuleRewrite.dll \Apache\modules copy os\win32\ApacheModuleSpelingR\ApacheModuleSpeling.dll \Apache\modules copy os\win32\ApacheModuleUserTrackR\ApacheModuleUserTrack.dll \Apache\modules copy modules\proxy\Release\ApacheModuleProxy.dll \Apache\modules @@ -130,6 +131,8 @@ copy os\win32\ApacheModuleDigestD\ApacheModuleDigest.dll \Apache\modules copy os\win32\ApacheModuleCERNMetaD\ApacheModuleCERNMeta.dll \Apache\modules copy os\win32\ApacheModuleExpiresD\ApacheModuleExpires.dll \Apache\modules + copy os\win32\ApacheModuleHeadersD\ApacheModuleHeaders.dll \Apache\modules + copy os\win32\ApacheModuleRewriteD\ApacheModuleRewrite.dll \Apache\modules copy os\win32\ApacheModuleSpelingD\ApacheModuleSpeling.dll \Apache\modules copy os\win32\ApacheModuleUserTrackD\ApacheModuleUserTrack.dll \Apache\modules copy modules\proxy\Debug\ApacheModuleProxy.dll \Apache\modules
cvs commit: apache-1.3/conf httpd.conf-dist-win
marc98/03/20 21:05:20 Modified:conf httpd.conf-dist-win Log: Be nice now; give people a list of read-made LoadModule lines to pick and choose from. Revision ChangesPath 1.10 +18 -0 apache-1.3/conf/httpd.conf-dist-win Index: httpd.conf-dist-win === RCS file: /export/home/cvs/apache-1.3/conf/httpd.conf-dist-win,v retrieving revision 1.9 retrieving revision 1.10 diff -u -r1.9 -r1.10 --- httpd.conf-dist-win 1998/03/06 19:56:24 1.9 +++ httpd.conf-dist-win 1998/03/21 05:05:19 1.10 @@ -16,6 +16,24 @@ ServerType standalone +# +# The following lists extra modules that can be uncommented to be loaded +# to enable extra functionality. See the manual +# (http://www.apache.org/docs/mod/) for details on the functionality +# of each module. +# +#LoadModule anon_auth_module modules/ApacheModuleAuthAnon.dll +#LoadModule cern_meta_module modules/ApacheModuleCERNMeta.dll +#LoadModule digest_module modules/ApacheModuleDigest.dll +#LoadModule expires_module modules/ApacheModuleExpires.dll +#LoadModule headers_module modules/ApacheModuleHeaders.dll +#LoadModule proxy_module modules/ApacheModuleProxy.dll +#LoadModule rewrite_module modules/ApacheModuleRewrite.dll +#LoadModule speling_module modules/ApacheModuleSpeling.dll +#LoadModule status_module modules/ApacheModuleStatus.dll +#LoadModule usertrack_module modules/ApacheModuleUserTrack.dll + + # Port: The port the standalone listens to. Port 80
cvs commit: apache-1.3/src/os/win32 registry.c
marc98/03/20 21:15:35 Modified:src/os/win32 registry.c Log: Two log messages indicating different things from different places in the code that have the same text are bad. Change the text of one to make it better represent what it is saying. Revision ChangesPath 1.2 +1 -1 apache-1.3/src/os/win32/registry.c Index: registry.c === RCS file: /export/home/cvs/apache-1.3/src/os/win32/registry.c,v retrieving revision 1.1 retrieving revision 1.2 diff -u -r1.1 -r1.2 --- registry.c1998/02/24 11:37:24 1.1 +++ registry.c1998/03/21 05:15:34 1.2 @@ -332,7 +332,7 @@ if (rv == ERROR_FILE_NOT_FOUND) { aplog_error(APLOG_MARK,APLOG_WARNING|APLOG_NOERRNO,NULL, - Registry does not contain key REGKEY); + Registry does not contain key REGKEY after creation); return -1; }
cvs commit: apache-1.3/src/modules/proxy proxy_util.c
marc98/03/20 21:32:20 Modified:src CHANGES src/modules/proxy proxy_util.c Log: The filenames were 4 chars short because during the change from 22 -- 26 chars to accomodate the fact that the fs isn't case sensitive, one change was missed. PR: 1890 Submitted by: Tim Costello [EMAIL PROTECTED] Revision ChangesPath 1.728 +5 -0 apache-1.3/src/CHANGES Index: CHANGES === RCS file: /export/home/cvs/apache-1.3/src/CHANGES,v retrieving revision 1.727 retrieving revision 1.728 diff -u -r1.727 -r1.728 --- CHANGES 1998/03/20 09:27:39 1.727 +++ CHANGES 1998/03/21 05:32:16 1.728 @@ -1,5 +1,10 @@ Changes with Apache 1.3b6 + *) WIN32: the proxy was creating filenames missing the last four + characters. While this normally doesn't stop anything from + working, it can result in extra collisions. + [Tim Costello [EMAIL PROTECTED]] PR#1890 + *) Now mod_proxy uses the response string (in addition to the response status code) from the already used FTP SIZE command to setup the Content-Length header if available. [Ralf S. Engelschall, PR#1183] 1.51 +2 -2 apache-1.3/src/modules/proxy/proxy_util.c Index: proxy_util.c === RCS file: /export/home/cvs/apache-1.3/src/modules/proxy/proxy_util.c,v retrieving revision 1.50 retrieving revision 1.51 diff -u -r1.50 -r1.51 --- proxy_util.c 1998/03/14 00:50:40 1.50 +++ proxy_util.c 1998/03/21 05:32:19 1.51 @@ -640,8 +640,8 @@ val[i + nlength] = '/'; i += nlength + 1; } -memcpy(val[i], tmp[k], 22 - k); -val[i + 22 - k] = '\0'; +memcpy(val[i], tmp[k], 26 - k); +val[i + 26 - k] = '\0'; } #else