https://bz.apache.org/bugzilla/show_bug.cgi?id=55892

--- Comment #5 from Yann Ylavic <[email protected]> ---
Comment on attachment 31119
  --> https://bz.apache.org/bugzilla/attachment.cgi?id=31119
patch for proxy_util.c

>--- modules/proxy/proxy_util.c.orig    2013-07-11 14:21:19.000000000 +0200
>+++ modules/proxy/proxy_util.c 2013-12-16 16:06:36.000000000 +0100
>@@ -2077,7 +2077,10 @@
>      * short living pool.
>      */
>     /* are we connecting directly, or via a proxy? */
>-    if (!proxyname) {
>+    /* handle HTTP/1.0 via SSL like direct connect */
>+    if (!proxyname ||
>+        (conn->is_ssl &&
>+         apr_table_get(r->subprocess_env, "force-proxy-request-1.0"))) {

I think we should do this regardless of HTTP version, eg :
+    if (!proxyname || conn->is_ssl) {

There is no point in forwarding a full URL to the target server (even in
HTTP/1.1), it is not itself a forward proxy.
If it were, why would this work with HTTP/1.1 over SSL only, and not with
HTTP/1.0 or without SSL?

>         *url = apr_pstrcat(p, uri->path, uri->query ? "?" : "",
>                            uri->query ? uri->query : "",
>                            uri->fragment ? "#" : "",

-- 
You are receiving this mail because:
You are the assignee for the bug.
---------------------------------------------------------------------
To unsubscribe, e-mail: [email protected]
For additional commands, e-mail: [email protected]

Reply via email to