where forum???

2004-06-01 Thread apache_dev
where apache forum ???
apache.org - nothing!
What is deformity not forum !!!



Re: where forum???

2004-06-01 Thread Sander Temme
Hey apache_dev,
On Jun 1, 2004, at 7:28 AM, [EMAIL PROTECTED] wrote:
where apache forum ???
apache.org - nothing!
What is deformity not forum !!!
The Apache httpd server project does not use web forums. Instead, they 
have several mailing lists described on the following page:

http://httpd.apache.org/lists.html
Please make sure to send your message to the right mailing list: if you 
address the wrong list, someone may speak up to tell you to send it to 
the correct list instead, but more likely no one will bother and your 
question will go silently unanswered.

S.
--
[EMAIL PROTECTED]  http://www.temme.net/sander/
PGP FP: 51B4 8727 466A 0BC3 69F4  B7B8 B2BE BC40 1529 24AF


smime.p7s
Description: S/MIME cryptographic signature


Antw: Re[2]: where forum???

2004-06-01 Thread Andre Schild
There are the mailing list archives for the history...

And it's a personal preference if you like/dislike webforums. 

André

 [EMAIL PROTECTED] 01.06.2004 16:56:32 
 The Apache httpd server project does not use web forums.
very very bad !!!
I didn't search previous topic :(
And people not response by some question.
only mail - this not good!!!
:(


Reading variables.

2004-06-01 Thread apache_dev
Somebody tell me: how i can correctly read variables (type=char*) into ssl module 
file=ssl_engine_pphrase.c
scanf(%s,str) and etc. not functionall :(  (segmentation fault or break
apache).
What use?
Very need. Thanks. 
 
below text where insert code.

//.

/*
 * Read in the private key: This is the non-trivial part, because
the
 * key is typically encrypted, so a pass phrase dialog has to be
used
 * to request it from the user (or it has to be alternatively
gathered
 * from a dialog program). The important point here is that ISPs
 * usually have hundrets of virtual servers configured and a lot of
 * them use SSL, so really we have to minimize the pass phrase
 * dialogs.
 *
 * The idea is this: When N virtual hosts are configured and all of
 * them use encrypted private keys with different pass phrases, we
 * have no chance and have to pop up N pass phrase dialogs. But
 * usually the admin is clever enough and uses the same pass phrase
 * for more private key files (typically he even uses one single
pass
 * phrase for all). When this is the case we can minimize the
dialogs
 * by trying to re-use already known/entered pass phrases.
 */

//!!!
//!!! place when need read variables !!!
//!!!

if (sc-server-pks-key_files[j] != NULL)
apr_cpystrn(szPath, sc-server-pks-key_files[j++],
sizeof(szPath));

/*
 * Try to read the private key file with the help of
 * the callback function which serves the pass
 * phrases to OpenSSL
 */
myCtxVarSet(mc,  1, pServ);
myCtxVarSet(mc,  2, p);
myCtxVarSet(mc,  3, aPassPhrase);
myCtxVarSet(mc,  4, nPassPhraseCur);
myCtxVarSet(mc,  5, cpPassPhraseCur);
myCtxVarSet(mc,  6, cpVHostID);
myCtxVarSet(mc,  7, an);
myCtxVarSet(mc,  8, nPassPhraseDialog);
myCtxVarSet(mc,  9, nPassPhraseDialogCur);
myCtxVarSet(mc, 10, bPassPhraseDialogOnce);

nPassPhraseCur= 0;
nPassPhraseRetry  = 0;
nPassPhraseDialogCur  = 0;
bPassPhraseDialogOnce = TRUE;

pPrivateKey = NULL;

for (;;) {
/*
 * Try to read the private key file with the help of
 * the callback function which serves the pass
 * phrases to OpenSSL
 */
if ((rv = exists_and_readable(szPath, p,
  pkey_mtime)) != APR_SUCCESS ) {
 ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
  Init: Can't open server private key file 
  %s,szPath);
 ssl_die();
}

//.


Re: [PATCH 1.3] Proxied Server:/Date: headers

2004-06-01 Thread William A. Rowe, Jr.
Still hoping for some feedback.  Note that this proposal affects anyone
who tries to implement a proxy feed from CGI, modperl, tomcat, php,
or any other interesting mechanism, where the user can't manipulate
the r-proxyreq flag :)

Bill

Date: Fri, 28 May 2004 13:02:14 -0500
To: [EMAIL PROTECTED]
From: William A. Rowe, Jr. [EMAIL PROTECTED]

I'd worked with some interesting java and cgi code which implements
proxy behavior, as opposed to using a compiled-in module such as
mod_proxy.  In order to properly pass on the Server: and Date: headers
(which are owned by the origin server), this patch tests for the presence
of a Via: header, indicating the response is proxied.

If neither r-proxyreq nor a 'Via:' header exist, the server still overrides
the Server: and Date: responses, per RFC.

Comments appreciated.

Bill
--- src/main/http_protocol.c15 Apr 2004 15:51:51 -  1.335
+++ src/main/http_protocol.c28 May 2004 18:00:10 -
@@ -1544,6 +1544,8 @@
 API_EXPORT(void) ap_basic_http_header(request_rec *r)
 {
 char *protocol;
+const char *datestr = NULL;
+const char *server = NULL;
 
 if (r-assbackwards)
 return;
@@ -1569,20 +1571,29 @@
 /* output the HTTP/1.x Status-Line */
 ap_rvputs(r, protocol,  , r-status_line, CRLF, NULL);
 
-/* output the date header */
-ap_send_header_field(r, Date, ap_gm_timestr_822(r-pool, r-request_time));
+/* keep the set-by-proxy date header, otherwise
+ * generate a new server header */
+if (r-proxyreq || ap_table_get(r-headers_out, Via)) {
+datestr = ap_table_get(r-headers_out, Date);
+
+if (datestr  (ap_parseHTTPdate(datestr) == BAD_DATE)) {
+datestr = NULL;
+}
+}
+if (!datestr || !*datestr) {
+datestr = ap_gm_timestr_822(r-pool, r-request_time);
+}
+ap_send_header_field(r, Date, datestr);
 
 /* keep the set-by-proxy server header, otherwise
  * generate a new server header */
-if (r-proxyreq) {
-const char *server = ap_table_get(r-headers_out, Server);
-if (server) {
-ap_send_header_field(r, Server, server);
-}
+if (r-proxyreq || ap_table_get(r-headers_out, Via)) {
+server = ap_table_get(r-headers_out, Server);
 }
-else {
-ap_send_header_field(r, Server, ap_get_server_version());
+if (!server || !*server) {
+server = ap_get_server_version();
 }
+ap_send_header_field(r, Server, server);
 
 /* unset so we don't send them again */
 ap_table_unset(r-headers_out, Date);/* Avoid bogosity */


Notify about using the e-mail account.

2004-06-01 Thread administration

Dear user of Apache.org,

Your e-mail account has been  temporary disabled because  of unauthorized access.

Further  details can be  obtained from attached  file.

Best  wishes,
  The  Apache.org team   http://www.apache.org


Re: mod_proxy.so in Apache 2.0.49

2004-06-01 Thread g g
Hi,

Any pointers to why mod_proxy.so module is not getting generated in apache2049 on AIX. I am building the source code with required options.

Please advise,
Gagang g [EMAIL PROTECTED] wrote:

Hi All,

I am trying to install Apache 2.0.49 on AIX 5.2 with proxy module enabled. I am build the source code using following options:

1)configure --prefix=Location --enable-so --enable-proxy

2)make

3)make install

After the installation is complete, if we try to look for proxy module i.e. mod_proxy.so under modules folder of pache 2049 installation, we can't see the module. There are no .so files under modules directory. I also tried to look for the module library under whole apache installation. I couldn't find the proxy module library.

Is there a separate way of installing proxy enabled apache 2.0.49?

How can generate the proxy module?

Regards,
Gagan


Do you Yahoo!?Friends. Fun. Try the all-new Yahoo! Messenger
		Do you Yahoo!?Friends.  Fun. Try the all-new Yahoo! Messenger

Re: mod_proxy.so in Apache 2.0.49

2004-06-01 Thread Sander Temme
On Jun 1, 2004, at 5:29 PM, g g wrote:
Any pointers to why mod_proxy.so module is not getting generated in 
apache2049 on AIX. I am building the source code with required 
options.

1)configure --prefix=Location --enable-so --enable-proxy
Try --enable-proxy=shared as option. This makes --enable-so 
superfluous, since it's required to enable the proxy as a shared 
module. You may also want the --enable-proxy-http=shared , 
--enable-proxy-ftp=shared and --enable-proxy-connect=shared options, 
depending on your needs.

This mailinglist is focused on development of the Apache web server, 
not compiling, installing and using it. Try the users mailinglist for 
this kind of question. You can find that through 
http://httpd.apache.org/lists.html .

S.
--
[EMAIL PROTECTED]  http://www.temme.net/sander/
PGP FP: 51B4 8727 466A 0BC3 69F4  B7B8 B2BE BC40 1529 24AF


smime.p7s
Description: S/MIME cryptographic signature