head 1.9; access; symbols pkgsrc-2014Q1:1.8.0.54 pkgsrc-2014Q1-base:1.8 pkgsrc-2013Q4:1.8.0.52 pkgsrc-2013Q4-base:1.8 pkgsrc-2013Q3:1.8.0.50 pkgsrc-2013Q3-base:1.8 pkgsrc-2013Q2:1.8.0.48 pkgsrc-2013Q2-base:1.8 pkgsrc-2013Q1:1.8.0.46 pkgsrc-2013Q1-base:1.8 pkgsrc-2012Q4:1.8.0.44 pkgsrc-2012Q4-base:1.8 pkgsrc-2012Q3:1.8.0.42 pkgsrc-2012Q3-base:1.8 pkgsrc-2012Q2:1.8.0.40 pkgsrc-2012Q2-base:1.8 pkgsrc-2012Q1:1.8.0.38 pkgsrc-2012Q1-base:1.8 pkgsrc-2011Q4:1.8.0.36 pkgsrc-2011Q4-base:1.8 pkgsrc-2011Q3:1.8.0.34 pkgsrc-2011Q3-base:1.8 pkgsrc-2011Q2:1.8.0.32 pkgsrc-2011Q2-base:1.8 pkgsrc-2011Q1:1.8.0.30 pkgsrc-2011Q1-base:1.8 pkgsrc-2010Q4:1.8.0.28 pkgsrc-2010Q4-base:1.8 pkgsrc-2010Q3:1.8.0.26 pkgsrc-2010Q3-base:1.8 pkgsrc-2010Q2:1.8.0.24 pkgsrc-2010Q2-base:1.8 pkgsrc-2010Q1:1.8.0.22 pkgsrc-2010Q1-base:1.8 pkgsrc-2009Q4:1.8.0.20 pkgsrc-2009Q4-base:1.8 pkgsrc-2009Q3:1.8.0.18 pkgsrc-2009Q3-base:1.8 pkgsrc-2009Q2:1.8.0.16 pkgsrc-2009Q2-base:1.8 pkgsrc-2009Q1:1.8.0.14 pkgsrc-2009Q1-base:1.8 pkgsrc-2008Q4:1.8.0.12 pkgsrc-2008Q4-base:1.8 pkgsrc-2008Q3:1.8.0.10 pkgsrc-2008Q3-base:1.8 cube-native-xorg:1.8.0.8 cube-native-xorg-base:1.8 pkgsrc-2008Q2:1.8.0.6 pkgsrc-2008Q2-base:1.8 cwrapper:1.8.0.4 pkgsrc-2008Q1:1.8.0.2 pkgsrc-2008Q1-base:1.8 pkgsrc-2007Q4:1.7.0.26 pkgsrc-2007Q4-base:1.7 pkgsrc-2007Q3:1.7.0.24 pkgsrc-2007Q3-base:1.7 pkgsrc-2007Q2:1.7.0.22 pkgsrc-2007Q2-base:1.7 pkgsrc-2007Q1:1.7.0.20 pkgsrc-2007Q1-base:1.7 pkgsrc-2006Q4:1.7.0.18 pkgsrc-2006Q4-base:1.7 pkgsrc-2006Q3:1.7.0.16 pkgsrc-2006Q3-base:1.7 pkgsrc-2006Q2:1.7.0.14 pkgsrc-2006Q2-base:1.7 pkgsrc-2006Q1:1.7.0.12 pkgsrc-2006Q1-base:1.7 pkgsrc-2005Q4:1.7.0.10 pkgsrc-2005Q4-base:1.7 pkgsrc-2005Q3:1.7.0.8 pkgsrc-2005Q3-base:1.7 pkgsrc-2005Q2:1.7.0.6 pkgsrc-2005Q2-base:1.7 pkgsrc-2005Q1:1.7.0.4 pkgsrc-2005Q1-base:1.7 pkgsrc-2004Q4:1.7.0.2 pkgsrc-2004Q4-base:1.7 pkgsrc-2004Q3:1.6.0.16 pkgsrc-2004Q3-base:1.6 pkgsrc-2004Q2:1.6.0.14 pkgsrc-2004Q2-base:1.6 pkgsrc-2004Q1:1.6.0.12 pkgsrc-2004Q1-base:1.6 pkgsrc-2003Q4:1.6.0.10 pkgsrc-2003Q4-base:1.6 netbsd-1-6-1:1.6.0.6 netbsd-1-6-1-base:1.6 netbsd-1-6:1.6.0.8 netbsd-1-6-RELEASE-base:1.6 pkgviews:1.6.0.4 pkgviews-base:1.6 buildlink2:1.6.0.2 buildlink2-base:1.6 netbsd-1-5-PATCH003:1.6 netbsd-1-5-PATCH001:1.5 netbsd-1-5-RELEASE:1.3 netbsd-1-4-PATCH003:1.3 netbsd-1-4-PATCH002:1.1 comdex-fall-1999:1.1 netbsd-1-4-PATCH001:1.1 netbsd-1-4-RELEASE:1.1; locks; strict; comment @# @; 1.9 date 2014.06.10.15.22.18; author joerg; state dead; branches; next 1.8; commitid djgMkPoOrhNxnZDx; 1.8 date 2008.02.23.05.16.34; author obache; state Exp; branches; next 1.7; 1.7 date 2004.10.29.13.48.31; author abs; state Exp; branches; next 1.6; 1.6 date 2001.10.17.19.17.00; author jlam; state Exp; branches 1.6.16.1; next 1.5; 1.5 date 2001.03.13.20.52.28; author jlam; state Exp; branches; next 1.4; 1.4 date 2001.02.02.16.39.57; author jlam; state Exp; branches; next 1.3; 1.3 date 2000.10.13.21.46.46; author jlam; state Exp; branches; next 1.2; 1.2 date 2000.09.12.14.17.32; author jlam; state Exp; branches; next 1.1; 1.1 date 98.12.03.17.23.53; author tv; state Exp; branches; next ; 1.6.16.1 date 2004.12.01.00.25.56; author salo; state Exp; branches; next ; desc @@ 1.9 log @Retire Apache 1.3 and 2.0. @ text @$NetBSD: patch-ae,v 1.8 2008/02/23 05:16:34 obache Exp $ --- src/modules/standard/mod_include.c.orig 2006-07-12 08:16:05.000000000 +0000 +++ src/modules/standard/mod_include.c @@@@ -51,7 +51,10 @@@@ #include "http_log.h" #include "http_main.h" #include "util_script.h" +#include "ap_include_extern.h" +#include "ap_hook.h" #endif +#define parse_string ap_include_parse_string #define STARTING_SEQUENCE "" @@@@ -448,7 +451,8 @@@@ static int get_directive(FILE *in, char /* * Do variable substitution on strings */ -static void parse_string(request_rec *r, const char *in, char *out, +API_EXPORT(void) +ap_include_parse_string(request_rec *r, const char *in, char *out, size_t length, int leave_name) { char ch; @@@@ -646,7 +650,8 @@@@ static int handle_include(FILE *in, requ parse_string(r, tag_val, parsed_string, sizeof(parsed_string), 0); if (tag[0] == 'f') { /* be safe; only files in this directory or below allowed */ - if (!is_only_below(parsed_string)) { + if ((ap_allow_options(r) & OPT_INCNOEXEC) && + !is_only_below(parsed_string)) { error_fmt = "unable to include file \"%s\" " "in parsed file %s"; } @@@@ -1058,7 +1063,8 @@@@ static int find_file(request_rec *r, con "in parsed file %s"; } else { - ap_getparents(tag_val); /* get rid of any nasties */ + if (ap_allow_options(r) & OPT_INCNOEXEC) + ap_getparents(tag_val); /* get rid of any nasties */ rr = ap_sub_req_lookup_file(tag_val, r); if (rr->status == HTTP_OK && rr->finfo.st_mode != 0) { @@@@ -2141,6 +2147,16 @@@@ static int handle_printenv(FILE *in, req } } +API_EXPORT(int) +ap_include_register_extern(const char *cmd, ap_include_extern_func func) { + char cmdbuf[40] = "include::"; + + strncat(cmdbuf, cmd, 30); + ap_hook_configure(cmdbuf, AP_HOOK_SIG5(int,ptr,ptr,ptr,ptr), AP_HOOK_TOPMOST); + ap_hook_register(cmdbuf, func, NULL); + + return 0; +} /* -------------------------- The main function --------------------------- */ @@@@ -2276,6 +2292,13 @@@@ static void send_parsed_content(FILE *f, } #endif else { + char cmdbuf[40] = "include::"; + + strncat(cmdbuf, directive, 30); + if ((ap_hook_status(cmdbuf) >= AP_HOOK_STATE_CONFIGURED) && + (ap_hook_call(cmdbuf, &ret, f, r, error, timefmt) == TRUE)) + continue; + ap_log_rerror(APLOG_MARK, APLOG_NOERRNO|APLOG_ERR, r, "unknown directive \"%s\" " "in parsed doc %s", @ 1.8 log @Update apache to 1.3.41. Changes with Apache 1.3.41 *) SECURITY: CVE-2007-6388 (cve.mitre.org) mod_status: Ensure refresh parameter is numeric to prevent a possible XSS attack caused by redirecting to other URLs. Reported by SecurityReason. [Mark Cox] Changes with Apache 1.3.40 (not released) *) SECURITY: CVE-2007-5000 (cve.mitre.org) mod_imap: Fix cross-site scripting issue. Reported by JPCERT. [Joe Orton] *) SECURITY: CVE-2007-3847 (cve.mitre.org) mod_proxy: Prevent reading past the end of a buffer when parsing date-related headers. PR 41144. With Apache 1.3, the denial of service vulnerability applies only to the Windows and NetWare platforms. [Jeff Trawick] *) More efficient implementation of the CVE-2007-3304 PID table patch. This fixes issues with excessive memory usage by the parent process if long-running and with a high number of child process forks during that timeframe. Also fixes bogus "Bad pid" errors. [Jim Jagielski, Jeff Trawick] Changes with Apache 1.3.39 *) SECURITY: CVE-2006-5752 (cve.mitre.org) mod_status: Fix a possible XSS attack against a site with a public server-status page and ExtendedStatus enabled, for browsers which perform charset "detection". Reported by Stefan Esser. [Joe Orton] *) SECURITY: CVE-2007-3304 (cve.mitre.org) Ensure that the parent process cannot be forced to kill non-child processes by checking scoreboard PID data with parent process privately stored PID data. [Jim Jagielski] *) mime.types: Many updates to sync with IANA registry and common unregistered types that the owners refuse to register. Admins are encouraged to update their installed mime.types file. pr: 35550, 37798, 39317, 31483 [Roy T. Fielding] There was no Apache 1.3.38 @ text @d1 1 a1 1 $NetBSD: patch-ae,v 1.7 2004/10/29 13:48:31 abs Exp $ @ 1.7 log @Update apache to 1.3.33 The main security vulnerabilities addressed in 1.3.33 are: * CAN-2004-0940 (cve.mitre.org) Fix potential buffer overflow with escaped characters in SSI tag string. * CAN-2004-0492 (cve.mitre.org) Reject responses from a remote server if sent an invalid (negative) Content-Length. New features * Win32: Improve error reporting after a failed attempt to spawn a piped log process or rewrite map process. * Added new compile-time flag: UCN_OFF_HONOR_PHYSICAL_PORT. It controls how UseCanonicalName Off determines the port value if the client doesn't provide one in the Host header. If defined during compilation, UseCanonicalName Off will use the physical port number to generate the canonical name. If not defined, it tries the current Port value followed by the default port for the current scheme. The following bugs were found in Apache 1.3.31 (or earlier) and have been fixed in Apache 1.3.33: * mod_rewrite: Fix query string handling for proxied URLs. PR 14518. * mod_rewrite: Fix 0 bytes write into random memory position. PR 31036. * mod_digest: Fix nonce string calculation since 1.3.31 which would force re-authentication for every connection if AuthDigestRealmSeed was not configured. PR 30920. * Fix trivial bug in mod_log_forensic that caused the child to seg fault when certain invalid requests were fired at it with forensic logging is enabled. PR 29313. * No longer breaks mod_dav, frontpage and others. Repair a patch in 1.3.31 which prevented discarding the request body for requests that will be keptalive but are not currently keptalive. PR 29237. @ text @d1 1 a1 1 $NetBSD: patch-ae,v 1.6 2001/10/17 19:17:00 jlam Exp $ d3 1 a3 1 --- src/modules/standard/mod_include.c.orig 2004-10-25 16:44:04.000000000 +0100 d5 1 a5 1 @@@@ -50,7 +50,10 @@@@ d16 1 a16 1 @@@@ -447,7 +450,8 @@@@ static int get_directive(FILE *in, char d26 1 a26 1 @@@@ -645,7 +649,8 @@@@ static int handle_include(FILE *in, requ d36 1 a36 1 @@@@ -1057,7 +1062,8 @@@@ static int find_file(request_rec *r, con d46 1 a46 1 @@@@ -2140,6 +2146,16 @@@@ static int handle_printenv(FILE *in, req d63 1 a63 1 @@@@ -2275,6 +2291,13 @@@@ static void send_parsed_content(FILE *f, @ 1.6 log @Update apache to 1.3.22. Relevant changes from version 1.3.20 include using the pkgsrc expat library instead of the builtin one (this is to avoid conflicts between expat libraries when an expat XML parser is loaded by either mod_perl or mod_php), and: Security vulnerabilities * A vulnerability was found in the split-logfile support program. A request with a specially crafted Host: header could allow any file with a .log extension on the system to be written to. * A vulnerability was found when Multiviews are used to negotiate the directory index. In some configurations, requesting a URI with a QUERY_STRING of M=D could return a directory listing rather than the expected index page. General bug fixes and improvements * Bug fixes * The supplied icons are now also distributed in PNG format * New directives have been added to the mod_usertrack module, The first, CookieDomain, can be used to customise the Domain attribute. * A new directive, AcceptMutex, allows run-time configuration of the mutex type used for accept serialization. * mod_auth has been enhanced to allow access to a document to be controlled based on the owner of the file being served. * A new directive, AcceptFilter, has been added to control BSD accept filters at run-time. The functionality can postpone the requirement for a child process to handle a new connection until an HTTP request has arrived, therefore increasing the number of connections that a given number of child processes can handle @ text @d1 1 a1 1 $NetBSD$ d3 1 a3 1 --- src/modules/standard/mod_include.c.orig Thu Sep 20 23:51:54 2001 d5 1 a5 1 @@@@ -93,7 +93,11 @@@@ a11 1 +#define get_tag ap_include_get_tag d16 1 a16 11 @@@@ -352,7 +356,8 @@@@ * the tag value is html decoded if dodecode is non-zero */ -static char *get_tag(pool *p, FILE *in, char *tag, int tagbuf_len, int dodecode) +API_EXPORT(char *) +ap_include_get_tag(pool *p, FILE *in, char *tag, int tagbuf_len, int dodecode) { char *t = tag, *tag_val, c, term; @@@@ -471,7 +476,8 @@@@ d26 1 a26 1 @@@@ -669,7 +675,8 @@@@ d36 1 a36 1 @@@@ -1081,7 +1088,8 @@@@ d46 1 a46 1 @@@@ -2162,6 +2170,16 @@@@ d63 1 a63 1 @@@@ -2300,6 +2318,13 @@@@ @ 1.6.16.1 log @Pullup ticket 141 - requested by David Brownlee security fix for apache Module Name: pkgsrc Committed By: tron Date: Mon Oct 25 08:44:16 UTC 2004 Modified Files: pkgsrc/www/apache: Makefile PLIST distinfo Removed Files: pkgsrc/www/apache/patches: patch-ap Log Message: Update "apache" package to version 1.3.32. Changes since version 1.3.31: - mod_rewrite: Fix query string handling for proxied URLs. PR 14518. [michael teitler , Jan Kratochvil ] - mod_rewrite: Fix 0 bytes write into random memory position. PR 31036. [André Malo] - mod_digest: Fix nonce string calculation since 1.3.31 which would force re-authentication for every connection if AuthDigestRealmSeed was not configured. PR 30920. [Joe Orton] - Trigger an error when a LoadModule directive attempts to load a module which is built-in. This is a common error when switching from a DSO build to a static build. [Jeff Trawick, Geoffrey Young] - Fix trivial bug in mod_log_forensic that caused the child to seg fault when certain invalid requests were fired at it with forensic logging is enabled. PR 29313. [Will Slater ] - Fix memory leak in the cache handling of mod_rewrite. PR 27862. [chunyan sheng , André Malo] - mod_rewrite no longer confuses the RewriteMap caches if different maps defined in different virtual hosts use the same map name. PR 26462. [André Malo] - mod_setenvif: Remove "support" for Remote_User variable which never worked at all. PR 25725. [André Malo] - mod_usertrack: Escape the cookie name before pasting into the regexp. [André Malo] - Win32: Improve error reporting after a failed attempt to spawn a piped log process or rewrite map process. [Jeff Trawick] - SECURITY: CAN-2004-0492 (cve.mitre.org) Reject responses from a remote server if sent an invalid (negative) Content-Length. [Mark Cox] - Fix a bunch of cases where the return code of the regex compiler was not checked properly. This affects mod_usertrack and core. PR 28218. [André Malo] - No longer breaks mod_dav, frontpage and others. Repair a patch in 1.3.31 which prevented discarding the request body for requests that will be keptalive but are not currently keptalive. PR 29237. [Jim Jagielski, Rasmus Lerdorf] - COMPATIBILITY: Added new compile-time flag: UCN_OFF_HONOR_PHYSICAL_PORT. It controls how UseCanonicalName Off determines the port value if the client doesn't provide one in the Host header. If defined during compilation, UseCanonicalName Off will use the physical port number to generate the canonical name. If not defined, it tries the current Port value followed by the default port for the current scheme. [Jim Jagielski] --- Module Name: pkgsrc Committed By: abs Date: Fri Oct 29 13:48:31 UTC 2004 Modified Files: pkgsrc/www/apache: Makefile distinfo pkgsrc/www/apache/patches: patch-aa patch-ab patch-ac patch-ad patch-ae patch-af patch-ag patch-ah patch-ai patch-aj patch-ak patch-am patch-ao Removed Files: pkgsrc/www/apache/patches: patch-al Log Message: Update apache to 1.3.33 The main security vulnerabilities addressed in 1.3.33 are: * CAN-2004-0940 (cve.mitre.org) Fix potential buffer overflow with escaped characters in SSI tag string. * CAN-2004-0492 (cve.mitre.org) Reject responses from a remote server if sent an invalid (negative) Content-Length. New features * Win32: Improve error reporting after a failed attempt to spawn a piped log process or rewrite map process. * Added new compile-time flag: UCN_OFF_HONOR_PHYSICAL_PORT. It controls how UseCanonicalName Off determines the port value if the client doesn't provide one in the Host header. If defined during compilation, UseCanonicalName Off will use the physical port number to generate the canonical name. If not defined, it tries the current Port value followed by the default port for the current scheme. The following bugs were found in Apache 1.3.31 (or earlier) and have been fixed in Apache 1.3.33: * mod_rewrite: Fix query string handling for proxied URLs. PR 14518. * mod_rewrite: Fix 0 bytes write into random memory position. PR 31036. * mod_digest: Fix nonce string calculation since 1.3.31 which would force re-authentication for every connection if AuthDigestRealmSeed was not configured. PR 30920. * Fix trivial bug in mod_log_forensic that caused the child to seg fault when certain invalid requests were fired at it with forensic logging is enabled. PR 29313. * No longer breaks mod_dav, frontpage and others. Repair a patch in 1.3.31 which prevented discarding the request body for requests that will be keptalive but are not currently keptalive. PR 29237. --- Module Name: pkgsrc Committed By: salo Date: Mon Nov 15 19:13:41 UTC 2004 Modified Files: pkgsrc/www/apache/patches: patch-ai Log Message: Revert rev 1.9, do not expand @@INSTALL@@, it's done in post-patch. (hi abs!) --- Module Name: pkgsrc Committed By: tron Date: Tue Nov 16 08:23:45 UTC 2004 Modified Files: pkgsrc/www/apache: distinfo Log Message: Regen after "patch-ai" was changed. (hi salo!) @ text @d1 1 a1 1 $NetBSD: patch-ae,v 1.7 2004/10/29 13:48:31 abs Exp $ d3 1 a3 1 --- src/modules/standard/mod_include.c.orig 2004-10-25 16:44:04.000000000 +0100 d5 1 a5 1 @@@@ -50,7 +50,10 @@@@ d12 1 d17 11 a27 1 @@@@ -447,7 +450,8 @@@@ static int get_directive(FILE *in, char d37 1 a37 1 @@@@ -645,7 +649,8 @@@@ static int handle_include(FILE *in, requ d47 1 a47 1 @@@@ -1057,7 +1062,8 @@@@ static int find_file(request_rec *r, con d57 1 a57 1 @@@@ -2140,6 +2146,16 @@@@ static int handle_printenv(FILE *in, req d74 1 a74 1 @@@@ -2275,6 +2291,13 @@@@ static void send_parsed_content(FILE *f, @ 1.5 log @Update apache to 1.3.19. The pkgsrc-related changes include adding a config.layout file instead of specifying every directory as on option to the Apache configure script. This layout file might be useful later when we package Apache 2.x. I also reordered a few lines so that it's easier to diff apache/Makefile and apache6/Makefile (hi itojun!). Also build the mod_define shared module from the mod_ssl sources. Relevant changes from version 1.3.17.1 include: *) Rewrite ap_unparse_uri_components() to make it safer and more readable *) Under certain circumstances, Apache did not supply the right response headers when requiring authentication. *) Clean up some end-of-loop not reached warnings *) Add the correct language tag for interoperation with the Taiwanese versions of MSIE and Netscape. *) Workaround enabled for a core dump which appeared in broken NameVirtualHost configurations. *) Sporadic core dump in ap_default_port_for_scheme() with internal requests *) SECURITY: The default installation could lead to mod_negotiation and mod_dir/mod_autoindex displaying a directory listing instead of the index.html.* files, if a very long path was created artificially by using many slashes. Now a 403 FORBIDDEN is returned. *) Trailing slashes (if they exist) are now removed from ServerRoot, because there were known problems with them. *) TPF startup/shutdown fixes. *) Correct a typo in httpd.conf. *) Get the correct IP address if ServerName isn't set and we can't find a fully-qualified domain name at startup. *) Fix pointer arithmetic in mod_rewrite map expansion. *) Fixed a problem with file extensions being truncated during the call to ap_os_canonical_filename(). @ text @d3 1 a3 1 --- src/modules/standard/mod_include.c.orig Fri Feb 23 11:37:26 2001 d74 1 a74 1 @@@@ -2286,6 +2304,13 @@@@ @ 1.4 log @Update apache to 1.3.17. Important changes from version 1.3.14 include: -) Remove patch to avoid dlclose()ing on NetBSD. The mod_perl vs. perl CGI mis-interaction seems to be gone and I wasn't able to reproduce it on my system. *) Fix the declaration of the module structure in mod_example. *) Fix the handling of variable expansion look-ahead in mod_rewrite, i.e. syntax like %{LA-U:REMOTE_USER}, and also fix the parsing of more complicated nested RewriteMap lookups. *) mod_status now respects ?refresh=n of 1 or greater. If the given refresh value is not a number, ?refresh is set to 1 second. *) Accomodate an out-of-space condition in the piped logs and the rotatelogs.c code, and no longer churn log processes for this condition. *) Make cgi-bin work as a regular directory when using mod_vhost_alias with no VirtualScriptAlias directives. *) Move the check of the Expect request header field after the hook for ap_post_read_request, since that is the only opportunity for modules to handle Expect extensions. *) Eliminate caching problems of mod_autoindex results, so the last modified date of the directory is returned as the Last-Modified and ETag HTTP header tags are sent if IndexOptions TrackModified directive/option is used. *) Correct an issue with Alias and ScriptAlias directives that file path arguments were not normalized in canonical form. This correction makes no attempt to normalize regular expression forms of Alias or ScriptAlias. *) Add a new LogFormat directive, %c, that will log connection status at the end of the response. *) Update the mime.types file to the registered media types as of 2000-10-19. *) Restore functionality broken by the mod_rewrite security fix: rewrite map lookup keys and default values are now expanded so that the lookup can depend on the requested URI etc. @ text @d3 1 a3 1 --- src/modules/standard/mod_include.c.orig Mon Jan 15 12:05:42 2001 d57 1 a57 1 @@@@ -2160,6 +2168,16 @@@@ d74 1 a74 1 @@@@ -2284,6 +2302,13 @@@@ @ 1.3 log @Update apache to 1.3.14. Changes from version 1.3.12 are listed below. The security fixes are: * A problem with the Rewrite module, mod_rewrite, allowed access to any file on the web server under certain circumstances * The handling of Host: headers in mass virtual hosting configurations, mod_vhost_alias, could allow access to any file on the server * If a cgi-bin directory is under the document root, the source to the scripts inside it could be sent if using mass virtual hosting The main new features include: * Support for a directory-based configuration system. If any of the configuration directives point to directories instead of files, all files in that directory (and in subdirectories) will be also parsed as configuration files * Support name-based virtual hosting without needing to specify an IP address in the Apache configuration file. This enables sites that use dynamic IP addresses to support name-based virtual hosting as well as allowing identical machines to share a configuration file, say in a load-balanced cluster * The SetEnvIf and BrowserMatch range of directives are now able to be used in .htaccess files. * Administrators who are nervous about their full server version details being public can use the new keyword 'ProductOnly' in the ServerTokens directive. This keyword forces the server to only return the string "Apache" as the server version. * The new digest authentication module, mod_auth_digest has had a number of fixes and upgrades applied @ text @d3 1 a3 1 --- src/modules/standard/mod_include.c.orig Fri Sep 22 14:26:32 2000 d5 1 a5 1 @@@@ -92,7 +92,11 @@@@ d17 1 a17 1 @@@@ -351,7 +355,8 @@@@ d27 1 a27 1 @@@@ -470,7 +475,8 @@@@ d37 1 a37 1 @@@@ -668,7 +674,8 @@@@ d47 1 a47 1 @@@@ -1080,7 +1087,8 @@@@ d57 1 a57 1 @@@@ -2159,6 +2167,16 @@@@ d74 1 a74 1 @@@@ -2283,6 +2301,13 @@@@ @ 1.2 log @Update build to work with mod_ssl-2.6.6-1.3.12 to keep in sync with ap-ssl. EAPI didn't change so no need to change Apache's version number. Also standardize package builds to have Apache listen on ports 80/443 regardless of UID of user that builds the package, and make MAINTAINER point to me. @ text @d3 1 a3 1 --- src/modules/standard/mod_include.c.orig Wed Feb 2 15:44:03 2000 d27 1 a27 1 @@@@ -470,7 +475,7 @@@@ d32 2 a33 1 +API_EXPORT(void) ap_include_parse_string(request_rec *r, const char *in, char *out, d37 1 a37 1 @@@@ -663,7 +668,8 @@@@ d47 1 a47 1 @@@@ -1075,7 +1081,9 @@@@ d52 2 a53 3 + if (ap_allow_options(r) & OPT_INCNOEXEC) + ap_getparents(tag_val); /* get rid of any nasties */ + d57 1 a57 1 @@@@ -2154,6 +2162,16 @@@@ d74 1 a74 1 @@@@ -2278,6 +2296,13 @@@@ @ 1.1 log @Update Apache and mod_ssl using new build layout (see post to tech-pkg for details). No security fixes in Apache 1.3.3, so immediate upgrade from 1.3.2 is not necessary. @ text @d3 85 a87 12 --- src/support/apachectl.orig Thu Dec 3 08:23:16 1998 +++ src/support/apachectl Thu Dec 3 08:23:49 1998 @@@@ -27,6 +27,9 @@@@ # the path to your httpd binary, including options if necessary HTTPD='/usr/local/apache/src/httpd' # +# shared object search path +LD_LIBRARY_PATH= +export LD_LIBRARY_PATH # a command that outputs a formatted text version of the HTML at the # url given on the command line. Designed for lynx, however other # programs may work. @