summaryrefslogtreecommitdiffstats
path: root/modules (follow)
Commit message (Collapse)AuthorAgeFilesLines
* * Use iobuffersize set on worker level for the IO buffer size.HEADtrunkRuediger Pluem3 days1-0/+3
| | | | | | | | | PR: 69402 Submitted by: Jari Ahonen <jah@progress.com> Reviewed by: rpluem git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1922115 13f79535-47bb-0310-9956-ffa450edef68
* Make sure the Additional error is displayed.Jean-Frederic Clere4 days1-0/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1922079 13f79535-47bb-0310-9956-ffa450edef68
* rollback unrelated fix to my previous commit, sorry.Jean-Frederic Clere9 days1-1/+0
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921975 13f79535-47bb-0310-9956-ffa450edef68
* Merge PR#419: make sure the right method is displayed.Jean-Frederic Clere9 days2-4/+8
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921973 13f79535-47bb-0310-9956-ffa450edef68
* * modules/aaa/mod_authnz_ldap.c (create_authnz_ldap_dir_config): Fix allocationJoe Orton9 days1-1/+1
| | | | | | | | | | of sgAttributes, found by gcc -fanalyzer: modules/aaa/mod_authnz_ldap.c: scope_hint: In function 'create_authnz_ldap_dir_config' modules/aaa/mod_authnz_ldap.c:356:23: warning[-Wanalyzer-allocation-size]: allocated buffer size is not a multiple of the pointee's size git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921971 13f79535-47bb-0310-9956-ffa450edef68
* mod_http2, fix keepalive timeout on reset requestsStefan Eissing2024-11-072-5/+14
| | | | | | | | | | | | Count failed requests that are RST'ed, so that the connection enters keepalive timeout instead of the regular timeout if the first request fails. Add tests to verify. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921805 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Revert r1868929 on trunk (only).Yann Ylavic2024-10-161-8/+7
| | | | | | | | | | | | We discussed in 2019 that after 2.4.x's backport r1873907 we should apply normal/usual merging for SSLProtocol in next versions (thus trunk first). See: https://lists.apache.org/thread/76yh7j3fwj2tsmffsqcqpv4mcfph5vqx Make this happen finally. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921360 13f79535-47bb-0310-9956-ffa450edef68
* Revert r1921336.Joe Orton2024-10-161-4/+0
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921357 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Disallow SSLOpenSSLConfCmd within vhost context since itJoe Orton2024-10-151-0/+4
| | | | | | | | | | | | has global effect. * modules/ssl/ssl_engine_config.c (ssl_cmd_SSLOpenSSLConfCmd): Disallow use within vhost context. PR: 69397 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921336 13f79535-47bb-0310-9956-ffa450edef68
* mod_log_config: Fix config merging for the "LogFormat" directiveJoe Orton2024-10-141-1/+1
| | | | | | | | | Submitted by: Michael Kaufmann <mail michael-kaufmann.ch> PR: 65222 Github: closes #490 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921305 13f79535-47bb-0310-9956-ffa450edef68
* mod_lua: Make r.ap_auth_type writableJoe Orton2024-10-111-0/+6
| | | | | | | | | | | | | | | | | This completes the option of setting the remote user by the authentication mechanism which actually verified the user. One possible usecase is that a proxied (upstream) server performs the authentication, but the access log of HTTPd does not contain this information. The upstream server can pass this kind of information back to HTTPd and both servers will have consistent access logs. Submitted by: Michael Osipov <michaelo apache.org> PR: 62497 Github: closes #67 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921260 13f79535-47bb-0310-9956-ffa450edef68
* * modules/http/http_filters.c (parse_chunk_size): Joe Orton2024-10-111-2/+8
| | | | | | | | | Update comment after some investigation of a Squid interoperability issue handling BWS after chunk-size, which httpd allows although it is not permitted by RFC 7230 or RFC 9112. [skip ci] git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921254 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy_fggi: Follow up to r1919547: Accurate dirwalk for ↵Yann Ylavic2024-10-101-14/+50
| | | | | | | | | | | proxy-fcgi-pathinfo=full Use the proxied uri-path, and try to resolve the script's path first without then with the DocumentRoot prefix. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921238 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy_fgci: Follow up to r1919628: Simplify.Yann Ylavic2024-10-101-6/+6
| | | | | | | | Variable from_handler is used once so axe it. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921237 13f79535-47bb-0310-9956-ffa450edef68
* * modules/ssl/ssl_engine_pphrase.c (modssl_load_keypair_engine):Joe Orton2024-10-011-2/+2
| | | | | | | Downgrade non-fatal errors to APLOG_NOTICE from APLOG_EMERG. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921076 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Add SSLClientHelloVars directive which exposes variousJoe Orton2024-10-015-1/+161
| | | | | | | | | | | | | | | | | | | | | | | | | ClientHello properties in new SSL_CLIENTHELLO_* variables. * modules/ssl/ssl_engine_kernel.c (ssl_hook_Fixup_vars): Add SSL_CLIENTHELLO_* vars. (copy_clienthello_vars): New function. (ssl_callback_ClientHello): Call it when needed. * modules/ssl/ssl_engine_vars.c (ssl_var_lookup_ssl_clienthello): New function. (ssl_var_lookup_ssl): Call it for SSL_CLIENTHELLO_*. * modules/ssl/ssl_private.h (modssl_clienthello_vars): Add type. (SSLConnRec): Add clienthello_vars pointer. * modules/ssl/ssl_engine_config.c, modules/ssl/mod_ssl.c: Add handling of new SSLClientHelloVars directive. Submitted by: Charles Smutz <csmutz gmail.com> Github: closes #483 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921074 13f79535-47bb-0310-9956-ffa450edef68
* * Take care for the case where nkey is NULLRuediger Pluem2024-10-011-3/+5
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921067 13f79535-47bb-0310-9956-ffa450edef68
* *) mod_http2: Stefan Eissing2024-10-011-1/+2
| | | | | | | | | | | | | | | | h2_mplx: fix debug check when stream was not found A "this should never happen" check logic was wrong when looking *why* a stream that SHOULD be there was not. The loop did not properly match streams in "purge" state. The log warning issued has never been reported, so this code seems to never actually do anything. Still fix the logic to do what it is intended to. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1921066 13f79535-47bb-0310-9956-ffa450edef68
* *) mod_md: update to version 2.4.28Stefan Eissing2024-09-173-9/+11
| | | | | | | | | | | | | | | | | - When the server starts, it looks for new, staged certificates to activate. If the staged set of files in 'md/staging/<domain>' is messed up, this could prevent further renewals to happen. Now, when the staging set is present, but could not be activated due to an error, purge the whole directory. [icing] - Fix certificate retrieval on ACME renewal to not require a 'Location:' header returned by the ACME CA. This was the way it was done in ACME before it became an IETF standard. Let's Encrypt still supports this, but other CAs do not. [icing] - Restore compatibility with OpenSSL < 1.1. [ylavic] git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920747 13f79535-47bb-0310-9956-ffa450edef68
* removed experimental mod_tls. source, documenation and test casesStefan Eissing2024-09-1723-7255/+0
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920744 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Fix regression in r1914365 preventing pkcs11: key/cert lookupJoe Orton2024-09-121-11/+20
| | | | | | | | | | | | | | | | via the ENGINE API without SSLCryptoDevice configured. * modules/ssl/ssl_engine_pphrase.c (modssl_load_keypair_engine): Return APR_ENOTIMPL if the ENGINE could not be loaded for the key. (modssl_load_engine_keypair): Always try loading via ENGINE (as prior to r1914365) but fall back to the STORE API for the new APR_ENOTIMPL case. Github: closes #480 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920597 13f79535-47bb-0310-9956-ffa450edef68
* * modules/core/mod_macro.c (process_content): Return error if there'sJoe Orton2024-09-121-2/+7
| | | | | | | | | | | | enough not space to store the macro. Replaced MAX_STRING_LEN by sizeof(line). PR: 69258 Submitted by: Marc Stern <marc.stern approach-cyber.com> Github: closes #479 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920588 13f79535-47bb-0310-9956-ffa450edef68
* Add Multipath TCP (MPTCP) support (Proxy)Joe Orton2024-09-123-1/+14
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | | Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension that enables a TCP connection to use different paths. Multipath TCP has been used for several use cases. On smartphones, MPTCP enables seamless handovers between cellular and Wi-Fi networks while preserving established connections. This use-case is what pushed Apple to use MPTCP since 2013 in multiple applications [2]. On dual-stack hosts, Multipath TCP enables the TCP connection to automatically use the best performing path, either IPv4 or IPv6. If one path fails, MPTCP automatically uses the other path. To benefit from MPTCP, both the client and the server have to support it. Multipath TCP is a backward-compatible TCP extension that is enabled by default on recent Linux distributions (Debian, Ubuntu, Redhat, ...). Multipath TCP is included in the Linux kernel since version 5.6 [3]. To use it on Linux, an application must explicitly enable it when creating the socket. No need to change anything else in the application. Adding the possibility to create MPTCP sockets would thus be a really fine addition to httpd, by allowing clients to make use of their different interfaces. This patch introduces the possibilty to connect to backend servers using MPTCP. Note however that these changes are only available on Linux, as IPPROTO_MPTCP is Linux specific for the time being. For proxies, we can connect using MPTCP by passing the \"multipathtcp\" parameter: ProxyPass \"/example\" \"http://backend.example.com\" multipathtcp=On We then store this information in the worker and create sockets appropriately according to this value. Link: https://www.rfc-editor.org/rfc/rfc8684.html [1] Link: https://www.tessares.net/apples-mptcp-story-so-far/ [2] Link: https://www.mptcp.dev [3] Add Multipath TCP (MPTCP) support (Core) Multipath TCP (MPTCP), standardized in RFC8684 [1], is a TCP extension that enables a TCP connection to use different paths. Multipath TCP has been used for several use cases. On smartphones, MPTCP enables seamless handovers between cellular and Wi-Fi networks while preserving established connections. This use-case is what pushed Apple to use MPTCP since 2013 in multiple applications [2]. On dual-stack hosts, Multipath TCP enables the TCP connection to automatically use the best performing path, either IPv4 or IPv6. If one path fails, MPTCP automatically uses the other path. To benefit from MPTCP, both the client and the server have to support it. Multipath TCP is a backward-compatible TCP extension that is enabled by default on recent Linux distributions (Debian, Ubuntu, Redhat, ...). Multipath TCP is included in the Linux kernel since version 5.6 [3]. To use it on Linux, an application must explicitly enable it when creating the socket. No need to change anything else in the application. Adding the possibility to create MPTCP sockets would thus be a really fine addition to httpd, by allowing clients to make use of their different interfaces. This patch introduces the possibility to listen with MPTCP sockets. Note however that these changes are only available on Linux, as IPPROTO_MPTCP is Linux specific for the time being. To do so, we extended the Listen directive to include a \"multipathtcp\" option, allowing to create MPTCP sockets instead of regular TCP ones: Listen 80 options=multipathtcp We then store this information in flags for the listen directive and create sockets appropriately according to this value. Link: https://www.rfc-editor.org/rfc/rfc8684.html [1] Link: https://www.tessares.net/apples-mptcp-story-so-far/ [2] Link: https://www.mptcp.dev [3] Submitted by: Aperence <anthony.doeraene hotmail.com> Github: closes #476 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920586 13f79535-47bb-0310-9956-ffa450edef68
* * Leave the proper escaping of the URL and the adding of r->args to theRuediger Pluem2024-09-111-19/+10
| | | | | | | | | proxy module which runs after us after r1920570. Just take care to add r->args in case the proxy rule has the [NE] flag set and tell the proxy module to not escape in this case. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920571 13f79535-47bb-0310-9956-ffa450edef68
* mod_rewrite, mod_proxy: mod_proxy to cononicalize rewritten [P] URLs. PR 69235.Yann Ylavic2024-09-112-14/+11
| | | | | | | | | | | | | When mod_rewrite sets a "proxy:" URL with [P], it should be canonicalized by mod_proxy still, notably to handle any "unix:" local socket part. To avoid double encoding in perdir context, a follow up commit should remove the ap_escape_uri() done in mod_rewrite since it's now on mod_proxy to canonicalize, per PR 69260. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920570 13f79535-47bb-0310-9956-ffa450edef68
* mod_rewrite: Follow up to r1919325: Simplify QSLAST tracking.Yann Ylavic2024-09-111-18/+14
| | | | | | | | We don't need to loop to skip the safe qmarks (thanks rpluem!). git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920566 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Add SSL_HANDSHAKE_RTT environment variable.Joe Orton2024-08-302-0/+15
| | | | | | | | | | | | | | | * modules/ssl/ssl_engine_vars.c (ssl_var_lookup_ssl): Support SSL_HANDSHAKE_RTT. (ssl_var_lookup_ssl_handshake_rtt): New function. * modules/ssl/ssl_engine_kernel.c (ssl_hook_Fixup_vars): Add SSL_HANDSHAKE_RTT. Submitted by: csmutz Github: closes #477 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1920297 13f79535-47bb-0310-9956-ffa450edef68
* don't merge slashes on perdir prefixEric Covener2024-08-131-1/+4
| | | | | | | | | Submitted by: Eric Covener Github: closes #472 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919860 13f79535-47bb-0310-9956-ffa450edef68
* Follow up to r1919620: Restore r->filename re-encoding for ProxyPass URLs.Yann Ylavic2024-08-022-13/+37
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919628 13f79535-47bb-0310-9956-ffa450edef68
* Follow up to r1919620: init path after "proxy:" is skipped.Yann Ylavic2024-08-011-1/+2
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919623 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy_fcgi: Don't re-encode SCRIPT_FILENAME. PR 69203Yann Ylavic2024-08-011-24/+14
| | | | | | | | | | | | | | | | | | | Before r1918550 (r1918559 in 2.4.60), "SetHandler proxy:..." configurations did not pass through proxy_fixup() hence the proxy_canon_handler hooks, leaving fcgi's SCRIPT_FILENAME environment variable (from r->filename) decoded, or more exactly not re-encoded. We still want to call ap_proxy_canon_url() for "fcgi:" to handle/strip the UDS "unix:" case and check that r->filename is valid and contains no controls, but proxy_fcgi_canon() will not ap_proxy_canonenc_ex() thus re-encode anymore. Note that this will do the same for "ProxyPass fcgi:...", there is no reason that using SetHandler or ProxyPass don't result in the same thing. If an opt in/out makes sense we should probably look at ProxyFCGIBackendType. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919620 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy: Fix selection of ProxyPassMatch workers with host/port ↵Yann Ylavic2024-08-012-13/+18
| | | | | | | | | | | | | | | substitution. PR 69233. With "ProxyPassMatch ^/([^/]+)/(.*)$ https://$1/$2", ap_proxy_get_worker_ex() should not consider the length of scheme://host part of the given URL because of the globbing match on the host part. Fix it by setting worker->s>is_host_matchable when creating a worker with host substitution and avoiding the min_match check in worker_matches() in this case. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919617 13f79535-47bb-0310-9956-ffa450edef68
* * modules/dav/fs/repos.c (dav_fs_get_resource): Return a 404 ratherJoe Orton2024-07-291-2/+2
| | | | | | | | | | | than a 400 where r->path_info is not empty for a file; a valid but unsatisfiable request to a path which cannot exist, e.g. /dav/foo.txt/blah where /dav/foo.txt is not a directory. Github: closes #465 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919580 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy_fcgi: Use r->uri rather than r->filename for directory walk.Yann Ylavic2024-07-271-5/+5
| | | | | | | | | | | r->filename is a "proxy:" one for mod_proxy modules, and ap_directory_walk() can't cope with that, so force r->uri. Github: closes #468 git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919547 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy: Allow for empty UDS URL hostname in ProxyPass workers too.Yann Ylavic2024-07-262-5/+8
| | | | | | | | | Using "unix:/udspath|scheme:" or "unix:/udspath|scheme://" for a ProxyPass URL does not work currently, while it works for SetHandler "proxy:unix:...". git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919533 13f79535-47bb-0310-9956-ffa450edef68
* *) mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLsYann Ylavic2024-07-261-9/+27
| | | | | | | | | | | | | in <Location> (incomplete fix in 2.4.62). PR 69160. When SetHandler "unix:..." is used in a <Location "/path"> block, the path gets appended (including $DOCUMENT_ROOT somehow) to r->filename hence the current checks in fixup_uds_filename() to add "localhost" when missing don't work. Fix them. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919532 13f79535-47bb-0310-9956-ffa450edef68
* * modules/core/mod_so.c (load_module): Log the file/lineno for aJoe Orton2024-07-241-2/+4
| | | | | | | | duplicated LoadModule since it's often a symptom of some deeper mis-configuration. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919496 13f79535-47bb-0310-9956-ffa450edef68
* mod_rewrite: Better question mark tracking to avoid UnsafeAllow3F. PR 69197.Yann Ylavic2024-07-171-18/+90
| | | | | | | | | | | | | Track in do_expand() whether a '?' in the uri-path comes from a literal in the substitution string or from an expansion (variable, lookup, ...). In the former case it's safe to assume that it's the query-string separator but for the other case it's not (could be a decoded %3f from r->uri). This allows to avoid [UnsafeAllow3F] for most cases. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919325 13f79535-47bb-0310-9956-ffa450edef68
* copy the trusted flag from the subrequestEric Covener2024-07-151-1/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919247 13f79535-47bb-0310-9956-ffa450edef68
* merge leading slashes by defaultEric Covener2024-07-151-0/+14
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919246 13f79535-47bb-0310-9956-ffa450edef68
* mod_status: "Threads" span three colomns (busy, graceful, idle), not two.Yann Ylavic2024-07-111-1/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919148 13f79535-47bb-0310-9956-ffa450edef68
* mod_status: Follow up to r1918482: Bump colspan for the new wait-io colomnYann Ylavic2024-07-111-1/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919141 13f79535-47bb-0310-9956-ffa450edef68
* mod_md: Keep compat with openssl < 1.1Yann Ylavic2024-07-081-13/+38
| | | | | | | | | EVP_PKEY_get0_RSA() does not exist in openssl < 1.1, use EVP_PKEY_get1_RSA() instead, hence RSA_free() the returned ref to avoid a leak. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919026 13f79535-47bb-0310-9956-ffa450edef68
* Follow up to r1919023: fix compilation.Yann Ylavic2024-07-081-1/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919024 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy: Don't mangle r->filename when ap_proxy_canon_netloc() fails.Yann Ylavic2024-07-081-1/+1
| | | | | | | | | | | | | | | | | | | ap_proxy_canon_netloc() called from canon_handler hooks modifies its given url in pace, hence &r->filename[6] passed from ap_proxy_canon_url(). This is not an issue if every canon_handler hook succeeds (or declines) since r->filename is usually completely rewritten finally, but on failure it gets truncated. Avoid this by passing a copy of r->filename from the start, the proxy *url and r->filename don't need to point to the same data. * proxy/proxy_util.c(ap_proxy_canon_url): Pass a copy of r->filename to the canon_handler hooks. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919023 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy: Fix canonicalisation and FCGI env (PATH_INFO, SCRIPT_NAME) forYann Ylavic2024-07-085-181/+173
| | | | | | | | | | | | | | | | | | | | | | | | | | | | | | "balancer:" URLs set via SetHandler, also allowing for "unix:" sockets with BalancerMember(s). PR 69168. * modules/proxy/proxy_util.h, modules/proxy/proxy_util.c: Move proxy_interpolate() from mod_proxy.c to ap_proxy_interpolate(), exported locally only (non public). Move proxy_fixup() from mod_proxy.c to ap_proxy_canon_url(), exported locally only too (non public). Rollback ap_proxy_fixup_uds_filename() to a local fixup_uds_filename() usable from proxy_util.c only. The public function will be removed in a following commit. * modules/proxy/mod_proxy.h: Note that ap_proxy_fixup_uds_filename() is deprecated. * modules/proxy/mod_proxy.c: Just use ap_proxy_canon_url() from proxy_fixup() and proxy_handler() for SetHandler URLs. * modules/proxy/mod_proxy_balancer.c: Do not canonicalize the path from proxy_balancer_canon() anymore but rather from balancer_fixup() where the balancer URL is rewritten to the BalancerMember URL. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919022 13f79535-47bb-0310-9956-ffa450edef68
* Follow up to r1919015: fix compilation.Yann Ylavic2024-07-081-1/+1
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919019 13f79535-47bb-0310-9956-ffa450edef68
* mod_proxy: Avoid AH01059 parsing error for SetHandler "unix:" URLs. PR 69160Yann Ylavic2024-07-081-4/+21
| | | | | | | | | | | | The hostname part of the URL is not mandated for UDS though the canon_handler hooks will require it, so add "localhost" if it's missing (won't be used anyway for an AF_UNIX socket). This can trigger with SetHandler "unix:" URLs which are now also fixed up. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1919015 13f79535-47bb-0310-9956-ffa450edef68
* * Check for correct OpenSSL version for mod_ssl_ctRuediger Pluem2024-07-051-1/+11
| | | | git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1918935 13f79535-47bb-0310-9956-ffa450edef68
* mod_ssl: Let modssl_set_io_callbacks() whether which callback is needed.Yann Ylavic2024-07-033-13/+16
| | | | | | | | | | | | | | | | | | | | * modules/ssl/ssl_private.h: Add conn_rec and server_rec args to modssl_set_io_callbacks(). * modules/ssl/ssl_engine_io.c(modssl_set_io_callbacks): Don't set modssl_io_cb for log levels below TRACE4. * modules/ssl/ssl_engine_io.c(ssl_io_filter_init), modules/ssl/ssl_engine_kernel.c(ssl_find_vhost): Call modssl_set_io_callbacks() unconditionally. * modules/ssl/ssl_engine_io.c(modssl_io_cb): While at it, (cmd & BIO_CB_WRITE) is enough to differentiate a write from read. git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1918883 13f79535-47bb-0310-9956-ffa450edef68