Hello,
Apparently the second argument to ap_rgetline serves as an upper bound for
the returned line, if the first argument points to NULL. This tripped me up (I
expected behaviour like ap_get_brigade(mode=AP_MODE_GETLINE,readbytes=0)), so I
thought it deserved mention in the header.
Jim
Howdy,
I have a question in the same vein as my last post. Can I rely on
ap_get_brigade(mode=AP_MODE_READBYTES, len=X) to return a brigade of length no
greater than X? It would appear not, which means I need to be prepared to set
aside extra bytes... But I thought this was exactly what the
On Thu, Mar 13, 2003 at 04:55:19PM -0800, David Burry wrote:
These are neat ideas. At a few companies I've worked for we already do
similar things but we have scripts that generate the httpd.conf files
and distribute them out to the web servers and gracefully restart.
Adding a new web server
You and someone else said the same thing. I currently have a setup where we
run several hundred vhosts (all individually specified) without issue, I'll
have to remember this if it ever grows to thousands. Thanks. With the lack
of a more powerful vhost-alias type thing, I'll probably have to
On Thu, Mar 13, 2003 at 08:27:30PM +0900, Nathan Ollerenshaw wrote:
Resending this to this list as I got no response on users list.
Currently, we are using flat config files generated by our website
provisioning software to support our mass hosted customers. The reason
for doing it this
The problem also occurs in 32-bit mode. Here are the backtraces from
pstack and dbx.
-- core.httpd.25359.u0 (pstack) --
core '/var/core/core.httpd.25359.u0' of 25359:
/usr/local/apache2/bin/httpd -f /etc/httpd2.conF
- lwp# 1 / thread# 1
On Saturday, March 15, 2003, at 12:02 AM, Thomas Eibner wrote:
On Thu, Mar 13, 2003 at 08:27:30PM +0900, Nathan Ollerenshaw wrote:
Resending this to this list as I got no response on users list.
Currently, we are using flat config files generated by our website
provisioning software to support
Craig...
we are waiting on only one issue; addressing the inherited apr
handles vulnerability discussed for httpd 2.0 cgi scripting on vuln-dev.
Bjoern Zeeb has spearheaded the effort for the Apache and APR
projects to adopt appropriate patches... and as soon as those are
evaluated and
Another citation;
http://marc.theaimsgroup.com/?l=apache-modsslm=104760046402468w=2
Bill
At 10:28 AM 3/14/2003, William A. Rowe, Jr. wrote:
Bjoern Zeeb has spearheaded the effort for the Apache and APR
projects to adopt appropriate patches... and as soon as those are
evaluated and committed you can expect APR 0.9.2 and very soon
after, Apache 2.0.45 built on that tag. It's unclear
Thomas Eibner wrote:
On Sat, Mar 15, 2003 at 01:00:18AM +0900, Nathan Ollerenshaw wrote:
On Saturday, March 15, 2003, at 12:02 AM, Thomas Eibner wrote:
On Thu, Mar 13, 2003 at 08:27:30PM +0900, Nathan Ollerenshaw wrote:
Resending this to this list as I got no response on users list.
On Saturday, March 15, 2003, at 01:13 AM, Thomas Eibner wrote:
On Sat, Mar 15, 2003 at 01:00:18AM +0900, Nathan Ollerenshaw wrote:
I wasn't thinking of anything radical. Just have a hook to set the
handler for a particular document (if it matches .php or .php4) to the
PHP module if it's allowed
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
Hi,
this is a summary for further discussion on the fd leak problematic in
httpd-2.0 and related apr (inherit) code.
History:
-
Christian Kratzer noticed a lot of open fds in http-2.0.44 and we
started to
Hi,
I cannot compile the latest snapshots (with OpenSSL 0.9.7a) without errors:
-Configuration: mod_ssl - Win32 Release
Generating ssl_expr_parse.c/.h from ssl_expr_parse.y
Compiling...
ssl_expr_parse.c
F:\Projects\MSVC\httpd-2.0\modules\ssl\ssl_toolkit_compat.h(139) :
14 matches
Mail list logo