Script 'mail_helper' called by obssrc
Hello community,

here is the log from the commit of package apache2-mod_wsgi for 
openSUSE:Factory checked in at 2022-11-24 12:23:34
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++
Comparing /work/SRC/openSUSE:Factory/apache2-mod_wsgi (Old)
 and      /work/SRC/openSUSE:Factory/.apache2-mod_wsgi.new.1597 (New)
++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Package is "apache2-mod_wsgi"

Thu Nov 24 12:23:34 2022 rev:33 rq:1037608 version:4.9.4

Changes:
--------
--- /work/SRC/openSUSE:Factory/apache2-mod_wsgi/apache2-mod_wsgi.changes        
2022-06-23 10:25:47.899839606 +0200
+++ 
/work/SRC/openSUSE:Factory/.apache2-mod_wsgi.new.1597/apache2-mod_wsgi.changes  
    2022-11-24 12:23:42.189478241 +0100
@@ -1,0 +2,17 @@
+Wed Nov 23 13:12:00 UTC 2022 - Dominique Leuenberger <dims...@opensuse.org>
+
+- Update to version 4.9.4:
+  + Apache 2.4.54 changed the default value for LimitRequestBody
+    from 0, which indicates there is no limit, to 1Gi. If the
+    Apache configuration supplied with a distribution wasn’t
+    explicitly setting LimitRequestBody to 0 at global server scope
+    for the purposes of documenting the default, and it was
+    actually relying on the compiled in default, then when using
+    mod_wsgi daemon mode, if a request body size greater than 1Gi
+    was encountered the mod_wsgi daemon mode process would crash.
+  + Fix ability to build mod_wsgi against Apache 2.2. Do note that
+    in general only recent versions of Apache 2.4 are supported
+- Changes from version 4.9.3 (CVE-2022-2255, boo#1201634):
+  * See 
https://modwsgi.readthedocs.io/en/latest/release-notes/version-4.9.3.html
+
+-------------------------------------------------------------------

Old:
----
  mod_wsgi-4.9.2.tar.gz

New:
----
  mod_wsgi-4.9.4.tar.gz

++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++++

Other differences:
------------------
++++++ apache2-mod_wsgi.spec ++++++
--- /var/tmp/diff_new_pack.4XflSy/_old  2022-11-24 12:23:42.777481978 +0100
+++ /var/tmp/diff_new_pack.4XflSy/_new  2022-11-24 12:23:42.781482004 +0100
@@ -27,7 +27,7 @@
 BuildRequires:  httpd-devel
 %endif
 Name:           apache2-mod_wsgi
-Version:        4.9.2
+Version:        4.9.4
 Release:        0
 Summary:        A WSGI interface for Python3 web applications in Apache
 License:        Apache-2.0

++++++ mod_wsgi-4.9.2.tar.gz -> mod_wsgi-4.9.4.tar.gz ++++++
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/README-standalone.rst 
new/mod_wsgi-4.9.4/README-standalone.rst
--- old/mod_wsgi-4.9.2/README-standalone.rst    2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/README-standalone.rst    2022-09-12 03:56:13.000000000 
+0200
@@ -10,8 +10,8 @@
 version of Apache pre-installed on your target system, and if you don't,
 installation of the package will fail.
 
-If you are on a UNIX like system (Linux, macOS) and need a version of
-Apache to be installed for you, you can use the ``mod_wsgi-standalone``
+If you are on a UNIX like system (Linux) and need a version of Apache
+to be installed for you, you can use the ``mod_wsgi-standalone``
 package on PyPi instead. When installing the ``mod_wsgi-standalone``
 package it will first trigger the installation of the ``mod_wsgi-httpd``
 package, which will result in a version of Apache being installed as
@@ -19,12 +19,21 @@
 installed, with it using the version of Apache installed by the
 ``mod_wsgi-httpd`` package rather than any system package for Apache.
 
-Note that this method of installation is only suitable for where you want
-to use ``mod_wsgi-express``. It cannot be used to build mod_wsgi for use
-with your system Apache installation. This installation method will also
-not work on Windows.
+This method of installation is only suitable for where you want to use
+``mod_wsgi-express``. It cannot be used to build mod_wsgi for use with
+your system Apache installation. This installation method will not
+work on Windows, and also currently fails on macOS because the Apache
+Runtime (APR) library, has not been updated to latest macOS versions.
 
 When installing mod_wsgi using this method, except that you will install
 the ``mod_wsgi-standalone`` package instead of the ``mod_wsgi`` package,
 you should follow installation and usage instructions outlined on the
 PyPi page for the ``mod_wsgi`` package.
+
+**NOTE: Although this package may allow you to install a standalone Apache
+version, it is only really recommended that you use this package if you
+have absolutely no other choice for getting the Apache httpd server
+installed. Always use the Apache httpd server supplied with the operating
+system if you can. Building this package if you do choose to do so, will
+take some time. So if you you think the install is hanging, it is probably
+still busy compiling everything.**
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/mod_wsgi-4.9.2/docs/configuration-directives/WSGITrustedProxies.rst 
new/mod_wsgi-4.9.4/docs/configuration-directives/WSGITrustedProxies.rst
--- old/mod_wsgi-4.9.2/docs/configuration-directives/WSGITrustedProxies.rst     
1970-01-01 01:00:00.000000000 +0100
+++ new/mod_wsgi-4.9.4/docs/configuration-directives/WSGITrustedProxies.rst     
2022-09-12 03:56:13.000000000 +0200
@@ -0,0 +1,15 @@
+==================
+WSGITrustedProxies
+==================
+
+:Description: Specify a list of trusted proxies.
+:Syntax: ``WSGITrustedProxies`` *ipaddr|(ipaddr-1 ipaddr-2 ...)*
+:Context: server config, virtual host, directory, .htaccess
+:Override: ``FileInfo``
+
+Used to specify a list of IP addresses for proxies placed in front of the
+Apache instance which are trusted.
+
+This directive only has effect when used in conjunction with the
+``WSGITrustedProxyHeaders`` directive. For more details see the documentation
+for the ``WSGITrustedProxyHeaders`` directive.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/mod_wsgi-4.9.2/docs/configuration-directives/WSGITrustedProxyHeaders.rst 
new/mod_wsgi-4.9.4/docs/configuration-directives/WSGITrustedProxyHeaders.rst
--- 
old/mod_wsgi-4.9.2/docs/configuration-directives/WSGITrustedProxyHeaders.rst    
    1970-01-01 01:00:00.000000000 +0100
+++ 
new/mod_wsgi-4.9.4/docs/configuration-directives/WSGITrustedProxyHeaders.rst    
    2022-09-12 03:56:13.000000000 +0200
@@ -0,0 +1,231 @@
+=======================
+WSGITrustedProxyHeaders
+=======================
+
+:Description: Specify a list of trusted proxy headers.
+:Syntax: ``WSGITrustedProxyHeaders`` *header|(header-1 header-2 ...)*
+:Context: server config, virtual host, directory, .htaccess
+:Override: ``FileInfo``
+
+When trusted proxies are designated, this is used to specify the headers
+which are used to convey information from a proxy to a web server behind the
+proxy that are to be trusted.
+
+The IP addresses of the proxies to be trusted should be specified using the
+``WSGITrustedProxies`` directive.
+
+As there are multiple conventions for what headers are used to convey
+information from the proxy to the web server you need to specify the specific
+header from a supported list of headers for a particular purpose that you want
+to trust using the ``WSGITrustedProxyHeaders`` directive.
+
+When a request is then received from a trusted proxy, only the header from
+the set of headers for that particular purpose is passed through to the WSGI
+application and all others will be dropped. If a request was instead from an
+IP address which isn't a trusted proxy, then all headers in that set of headers
+will be dropped and not passed through.
+
+Depending on the purpose of the header, modifications will be made to other
+special variables passed through to the WSGI application. It is these other
+variables which is what the WSGI application should consult and the original
+header should never be consulted, with it only being provided as an indication
+of which header was used to set the special variable.
+
+The different sets of supported headers used by proxies are as follows.
+
+For passing through the IP address of the remote HTTP client the supported
+headers are:
+
+* X-Forwarded-For
+* X-Client-IP
+* X-Real-IP
+
+You should select only one of these headers as the authoritative source for
+the IP address of the remote HTTP client as sent by the proxy. Never select
+multiple headers because if you do which will be used is indeterminate.
+
+The de-facto standard for this type of header is ``X-Forwarded-For`` and it
+is recommended that it be used if your proxy supports it.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Forwarded-For
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Forwarded-For`` header will be passed through to the WSGI application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_FORWARDED_FOR`` variable.
+
+For this set of headers, the ``REMOTE_ADDR`` CGI variable as used by WSGI will
+be modified and set to the IP address of the remote HTTP client. A WSGI
+application in this case should always use ``REMOTE_ADDR`` and never consult
+the original header files.
+
+For passing through the protocol of the original request received by the
+trusted proxy the supported headers are:
+
+* X-Forwarded-HTTPS
+* X-Forwarded-Proto
+* X-Forwarded-Scheme
+* X-Forwarded-SSL
+* X-HTTPS
+* X-Scheme
+
+You should select only one of these headers as the authoritative source for 
what
+protocol was used by the remote HTTP client as sent by the proxy. Never select
+multiple headers because if you do which will be used is indeterminate.
+
+The de-facto standard for this type of header is ``X-Forwarded-Proto`` and it
+is recommended that it be used if your proxy supports it.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Forwarded-Proto
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Forwarded-Proto`` header will be passed through to the WSGI 
application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_FORWARDED_PROTO`` variable.
+
+For this set of headers, the ``wsgi.url_scheme`` variable passed to the WSGI
+application will be modified to indicate whether the original request used the
+``https`` protocol. Note that although it is a convention when using CGI
+scripts with Apache, the mod_wsgi module removes the ``HTTPS`` variable from
+the set of variables passed to the WSGI application. You should always use
+the ``wsgi.url_scheme`` variable in a WSGI application.
+
+For passing through the host name targeted by the original request received by
+the trusted proxy the supported headers are:
+
+* X-Forwarded-Host
+* X-Host
+
+You should select only one of these headers as the authoritative source for the
+host targeted by the original request as sent by the proxy. Never select
+multiple headers because if you do which will be used is indeterminate.
+
+The de-facto standard for this type of header is ``X-Forwarded-Host`` and it
+is recommended that it be used if your proxy supports it.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Forwarded-Host
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Forwarded-Host`` header will be passed through to the WSGI application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_FORWARDED_HOST`` variable.
+
+For this set of headers, the ``HTTP_HOST`` variable passed to the WSGI
+application will be overridden with the value from the header supplied by the
+proxy. That is, the value from the proxy for the original request will even
+override any explicit ``Host`` header supplied in the request from the proxy,
+which in normal cases would be the host of the web server. A WSGI application
+should always consult the ``HTTP_HOST`` variable and not the separate header
+supplied by the proxy.
+
+For passing through the port targeted by the original request received by the
+trusted proxy, the only supported header is:
+
+* X-Forwarded-Port
+
+Although it is the only supported header, you still must select if as a trusted
+header to have it processed in the same way as other trusted headers.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Forwarded-Port
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Forwarded-Port`` header will be passed through to the WSGI application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_FORWARDED_PORT`` variable.
+
+For this header, the ``SERVER_PORT`` variable passed to the WSGI application
+will be overridden with the value from the header supplied by the proxy. A WSGI
+application should always consult the ``SERVER_PORT`` variable and not the
+separate header supplied by the proxy.
+
+For passing through the host name of any proxy, to use in overriding the host
+name of the web server, the only supported header is:
+
+* X-Forwarded-Server
+
+Although it is the only supported header, you still must select if as a trusted
+header to have it processed in the same way as other trusted headers.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Forwarded-Server
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Forwarded-Server`` header will be passed through to the WSGI 
application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_FORWARDED_SERVER`` variable.
+
+For this header, the ``SERVER_NAME`` variable passed to the WSGI application
+will be overridden with the value from the header supplied by the proxy. A WSGI
+application should always consult the ``SERVER_NAME`` variable and not the
+separate header supplied by the proxy.
+
+For passing through the apparent URL sub path of a web application, as mapped
+by the trusted proxy, the supported headers are:
+
+* X-Script-Name
+* X-Forwarded-Script-Name
+
+You should select only one of these headers as the authoritative source for the
+host targeted by the original request as sent by the proxy. Never select
+multiple headers because if you do which will be used is indeterminate.
+
+The configuration might therefore be::
+
+    WSGITrustedProxies 1.2.3.4
+    WSGITrustedProxyHeaders X-Script-Name
+
+With this configuration, when a request is received from the trusted proxy only
+the ``X-Script-Name`` header will be passed through to the WSGI application.
+This will be done following CGI convention as used by WSGI, namely in the
+``HTTP_X_SCRIPT_NAME`` variable.
+
+For this header, the ``SCRIPT_NAME`` variable passed to the WSGI application
+will be overridden with the value from the header supplied by the proxy. A WSGI
+application should always consult the ``SCRIPT_NAME`` variable and not the
+separate header supplied by the proxy.
+
+Examples above show using a single header of a specific purpose at one time.
+When you need to trust multiple headers for different purposes, you can list
+them separated by spaces using one instance of ``WSGITrustedProxyHeaders``::
+
+    WSGITrustedProxyHeaders X-Forwarded-For X-Forwarded-Host X-Forwarded-Port
+
+or in separate directives::
+
+    WSGITrustedProxyHeaders X-Forwarded-For
+    WSGITrustedProxyHeaders X-Forwarded-Host
+    WSGITrustedProxyHeaders X-Forwarded-Port
+
+As already highlighted you should only list one header for a specific purpose
+when there are multiple conventions for what header to use. Which you use will
+depend on the configuration of your proxy. You should only trust headers which
+are always set by the proxy, never trust headers which are optionally set by
+proxies because if not overridden by a proxy, a remote client could still
+supply the header.
+
+Also remember that in general you should not consult the proxied headers
+themselves, but instead consult the special variables set from those headers
+which are passed to the WSGI application and which are defined as being special
+to WSGI. As illustration of how such special variables are used, consider
+for example the notes in the WSGI specification around URL reconstruction.
+
+* https://peps.python.org/pep-3333/#url-reconstruction
+
+Finally, if using this feature to trust proxies and designated headers, do not
+enable in any WSGI framework or application separate functionality it may have
+for also processing the proxy headers. You should only rely on what mod_wsgi
+has done to update variables special to WSGI.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/docs/configuration.rst 
new/mod_wsgi-4.9.4/docs/configuration.rst
--- old/mod_wsgi-4.9.2/docs/configuration.rst   2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/docs/configuration.rst   2022-09-12 03:56:13.000000000 
+0200
@@ -31,3 +31,5 @@
    configuration-directives/WSGIScriptAliasMatch
    configuration-directives/WSGIScriptReloading
    configuration-directives/WSGISocketPrefix
+   configuration-directives/WSGITrustedProxies
+   configuration-directives/WSGITrustedProxyHeaders
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/docs/release-notes/version-4.9.3.rst 
new/mod_wsgi-4.9.4/docs/release-notes/version-4.9.3.rst
--- old/mod_wsgi-4.9.2/docs/release-notes/version-4.9.3.rst     1970-01-01 
01:00:00.000000000 +0100
+++ new/mod_wsgi-4.9.4/docs/release-notes/version-4.9.3.rst     2022-09-12 
03:56:13.000000000 +0200
@@ -0,0 +1,95 @@
+=============
+Version 4.9.3
+=============
+
+Version 4.9.3 of mod_wsgi can be obtained from:
+
+  https://codeload.github.com/GrahamDumpleton/mod_wsgi/tar.gz/4.9.3
+
+Bugs Fixed
+----------
+
+* When using ``WSGITrustedProxies`` and ``WSGITrustedProxyHeaders`` in the
+  Apache configuration, or ``--trust-proxy`` and ``--trust-proxy-header``
+  options with ``mod_wsgi-express``, if you trusted the ``X-Client-IP``
+  header and a request was received from an untrusted client, the header
+  was not being correctly removed from the set of headers passed through to
+  the WSGI application.
+
+  This only occurred with the ``X-Client-IP`` header and the same problem was
+  not present if trusting the ``X-Real-IP`` or ``X-Forwarded-For`` headers.
+
+  The purpose of this feature for trusting a front end proxy was in this
+  case for the headers:
+
+    * ``X-Client-IP``
+    * ``X-Real-IP``
+    * ``X-Forwarded-For``
+
+  and was designed to allow the value of ``REMOTE_ADDR`` passed to the WSGI
+  application to be rewritten to the IP address that a trusted proxy said
+  was the real remote address of the client.
+
+  In other words, if a request was received from a proxy the IP address
+  of which was trusted, ``REMOTE_ADDR`` would be set to the value of the
+  single designated header out of those listed above which was to be
+  trusted.
+
+  In the case where the proxy was trusted, in addition to ``REMOTE_ADDR``
+  being rewritten, only the trusted header would be passed through. That is,
+  if ``X-Real-IP`` was the trusted header, then ``HTTP_X_REAL_IP`` would
+  be passed to the WSGI application, but ``HTTP_X_CLIENT_IP`` and
+  ``HTTP_X_FORWARDED_FOR`` would be dropped if corresponding headers had
+  also been supplied. That the header used to rewrite ``REMOTE_ADDR`` was
+  passed through still was only intended for the purpose of documenting
+  where the value of ``REMOTE_ADDR`` came from. A WSGI application when
+  relying on this feature should only ever use the value of ``REMOTE_ADDR``
+  and should ignore the header passed through.
+
+  The behaviour as described was therefore based on a WSGI application
+  not at the same time enabling any WSGI or web framework middleware to
+  try and process any proxy headers a second time and ``REMOTE_ADDR``
+  should be the single source of truth. Albeit the headers which were
+  passed through should have resulted in the same result for ``REMOTE_ADDR``
+  if the proxy headers were processed a second time.
+
+  Now in the case of the client a request was received from not being a
+  trusted proxy, then ``REMOTE_ADDR`` would not be rewritten, and would
+  be left as the IP of the client, and none of the headers listed above
+  were supposed to be passed through.
+
+  That ``REMOTE_ADDR`` is not rewritten is implemented correctly when the
+  client is not a trusted proxy, but of the three headers listed above,
+  ``HTTP_X_CLIENT_ID`` was not being dropped if the corresponding header
+  was supplied.
+
+  If the WSGI application followed best practice and only relied on the
+  value of ``REMOTE_ADDR`` as the source of truth for the remote client
+  address, then that ``HTTP_X_CLIENT_ID`` was not being dropped should
+  pose no security risk. There would however be a problem if a WSGI
+  application was still enabling a WSGI or web framework specific middleware
+  to process the proxy headers a second time even though not required. In this
+  case, the middleware used by the WSGI application may still trust the
+  ``X-Client-IP`` header and rewrite ``REMOTE_ADDR`` allowing a malicious
+  client to pretend to have a different IP address.
+
+  In addition to the WSGI application having redundant checks for the proxy
+  headers, to take advantage of this, a client would also need direct access
+  to the Apache/mod_wsgi server instance.
+
+  In the case that only clients on your private network behind your proxy
+  could access the Apache/mod_wsgi server instance, that would imply any
+  malicious actor already had access to your private network and had access
+  to hosts in that private network or could attach their own device to that
+  private network.
+
+  In the case where your Apache/mod_wsgi server instance could be accessed
+  from the same external networks as a proxy forwarding requests to it, such
+  as may occur if making use of a CDN proxy cache, a client would still need
+  to know the direct address used by the Apache/mod_wsgi server instance.
+
+  Note that only one proxy header for designating the IP of a client should
+  ever be trusted. If you trust more than one, then which will be used if
+  both are present is undefined as it is dependent on the order that Apache
+  processes headers. This hasn't changed and as before to avoid ambiguity you
+  should only trust one of the proxy headers recognised for this purpose.
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/docs/release-notes/version-4.9.4.rst 
new/mod_wsgi-4.9.4/docs/release-notes/version-4.9.4.rst
--- old/mod_wsgi-4.9.2/docs/release-notes/version-4.9.4.rst     1970-01-01 
01:00:00.000000000 +0100
+++ new/mod_wsgi-4.9.4/docs/release-notes/version-4.9.4.rst     2022-09-12 
03:56:13.000000000 +0200
@@ -0,0 +1,21 @@
+=============
+Version 4.9.4
+=============
+
+Version 4.9.4 of mod_wsgi can be obtained from:
+
+  https://codeload.github.com/GrahamDumpleton/mod_wsgi/tar.gz/4.9.4
+
+Bugs Fixed
+----------
+
+* Apache 2.4.54 changed the default value for ``LimitRequestBody`` from 0, 
which
+  indicates there is no limit, to 1Gi. If the Apache configuration supplied 
with
+  a distribution wasn't explicitly setting ``LimitRequestBody`` to 0 at global
+  server scope for the purposes of documenting the default, and it was actually
+  relying on the compiled in default, then when using mod_wsgi daemon mode, if 
a
+  request body size greater than 1Gi was encountered the mod_wsgi daemon mode
+  process would crash.
+
+* Fix ability to build mod_wsgi against Apache 2.2. Do note that in general 
only
+  recent versions of Apache 2.4 are supported
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/docs/release-notes.rst 
new/mod_wsgi-4.9.4/docs/release-notes.rst
--- old/mod_wsgi-4.9.2/docs/release-notes.rst   2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/docs/release-notes.rst   2022-09-12 03:56:13.000000000 
+0200
@@ -5,6 +5,8 @@
 .. toctree::
    :maxdepth: 2
 
+   release-notes/version-4.9.4
+   release-notes/version-4.9.3
    release-notes/version-4.9.2
    release-notes/version-4.9.1
    release-notes/version-4.9.0
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' 
old/mod_wsgi-4.9.2/docs/user-guides/debugging-techniques.rst 
new/mod_wsgi-4.9.4/docs/user-guides/debugging-techniques.rst
--- old/mod_wsgi-4.9.2/docs/user-guides/debugging-techniques.rst        
2022-05-31 02:45:32.000000000 +0200
+++ new/mod_wsgi-4.9.4/docs/user-guides/debugging-techniques.rst        
2022-09-12 03:56:13.000000000 +0200
@@ -76,13 +76,13 @@
         status = '200 OK'
         output = b'Hello World!'
 
-        print("application debug #1", file=environ['wsgi.errors']))
+        print("application debug #1", file=environ['wsgi.errors'])
 
         response_headers = [('Content-type', 'text/plain'),
                             ('Content-Length', str(len(output)))]
         start_response(status, response_headers)
 
-        print("application debug #2", file=environ['wsgi.errors']))
+        print("application debug #2", file=environ['wsgi.errors'])
 
         return [output]
 
@@ -95,7 +95,7 @@
 
     Alternatively, always use `print` as a statement rather than a function::
 
-        print >> environ['wsgi.errors']), "application debug #N"
+        print >> environ['wsgi.errors'], "application debug #N"
 
 If 'wsgi.errors' is not available to the code which needs to output log
 messages, then it should explicitly direct output from 'print'
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/pyproject.toml.in 
new/mod_wsgi-4.9.4/pyproject.toml.in
--- old/mod_wsgi-4.9.2/pyproject.toml.in        2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/pyproject.toml.in        2022-09-12 03:56:13.000000000 
+0200
@@ -1,3 +1,3 @@
 [build-system]
-requires = ["setuptools>=40.8.0", "wheel", "mod_wsgi-httpd==2.4.48.1"]
+requires = ["setuptools>=40.8.0", "wheel", "mod_wsgi-httpd==2.4.54.1"]
 build-backend = "setuptools.build_meta:__legacy__"
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/setup.py new/mod_wsgi-4.9.4/setup.py
--- old/mod_wsgi-4.9.2/setup.py 2022-05-31 02:45:32.000000000 +0200
+++ new/mod_wsgi-4.9.4/setup.py 2022-09-12 03:56:13.000000000 +0200
@@ -466,5 +466,5 @@
     entry_points = { 'console_scripts':
         ['mod_wsgi-express = mod_wsgi.server:main'],},
     zip_safe = False,
-    install_requires = standalone and ['mod_wsgi-httpd==2.4.48.1'] or [],
+    install_requires = standalone and ['mod_wsgi-httpd==2.4.54.1'] or [],
 )
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/src/server/mod_wsgi.c 
new/mod_wsgi-4.9.4/src/server/mod_wsgi.c
--- old/mod_wsgi-4.9.2/src/server/mod_wsgi.c    2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/src/server/mod_wsgi.c    2022-09-12 03:56:13.000000000 
+0200
@@ -12597,6 +12597,9 @@
 
     /* Output status line. */
 
+    if (!r->status_line)
+        r->status_line = ap_get_status_line(r->status);
+
     vec1[0].iov_base = (void *)"Status:";
     vec1[0].iov_len  = strlen("Status:");
     vec1[1].iov_base = (void *)" ";
@@ -12710,6 +12713,7 @@
     apr_bucket_brigade *bb;
 
     core_request_config *req_cfg;
+    core_dir_config *d;
 
     ap_filter_t *current = NULL;
     ap_filter_t *next = NULL;
@@ -12901,6 +12905,23 @@
 
     r->per_dir_config  = r->server->lookup_defaults;
 
+    /*
+     * Try and ensure that request body limit in daemon mode process
+     * is unlimited as Apache 2.4.54 changed rules for limit and if
+     * unset is now overridden by HTTP filters to be 1GiB rather than
+     * unlimited. This is required since we populate configuration
+     * from the base server config only so setting unlimited in a more
+     * specific context such as a virtual host wouldn't be visible.
+     * Note that setting this to unlimited in the daemon mode process
+     * is okay as the request limit body is checked in the Apache
+     * child process before request is proxied specifically to avoid
+     * unecessarily passing the content across to the daemon process.
+     */
+
+    d = (core_dir_config *)ap_get_core_module_config(r->per_dir_config);
+
+    d->limit_req_body = 0;
+
     r->sent_bodyct = 0;
 
     r->read_length = 0;
@@ -14055,6 +14076,7 @@
             name = ((const char**)trusted_proxy_headers->elts)[i];
 
             if (!strcmp(name, "HTTP_X_FORWARDED_FOR") ||
+                     !strcmp(name, "HTTP_X_CLIENT_IP") ||
                      !strcmp(name, "HTTP_X_REAL_IP")) {
 
                 match_client_header = 1;
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/src/server/wsgi_apache.c 
new/mod_wsgi-4.9.4/src/server/wsgi_apache.c
--- old/mod_wsgi-4.9.2/src/server/wsgi_apache.c 2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/src/server/wsgi_apache.c 2022-09-12 03:56:13.000000000 
+0200
@@ -52,6 +52,19 @@
 
 /* ------------------------------------------------------------------------- */
 
+#if !AP_MODULE_MAGIC_AT_LEAST(20101106,1)
+
+apr_status_t wsgi_ap_pool_cleanup_set_null(void *data_)
+{
+    void **ptr = (void **)data_;
+    *ptr = NULL;
+    return APR_SUCCESS;
+}
+
+#endif
+
+/* ------------------------------------------------------------------------- */
+
 #if (APR_MAJOR_VERSION == 0) && \
     (APR_MINOR_VERSION == 9) && \
     (APR_PATCH_VERSION < 5)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/src/server/wsgi_apache.h 
new/mod_wsgi-4.9.4/src/server/wsgi_apache.h
--- old/mod_wsgi-4.9.2/src/server/wsgi_apache.h 2022-05-31 02:45:32.000000000 
+0200
+++ new/mod_wsgi-4.9.4/src/server/wsgi_apache.h 2022-09-12 03:56:13.000000000 
+0200
@@ -128,6 +128,11 @@
 #define ap_close_listeners wsgi_ap_close_listeners
 #endif
 
+#if !AP_MODULE_MAGIC_AT_LEAST(20101106,1)
+extern apr_status_t wsgi_ap_pool_cleanup_set_null(void *);
+#define ap_pool_cleanup_set_null wsgi_ap_pool_cleanup_set_null
+#endif
+
 #if (APR_MAJOR_VERSION == 0) && \
     (APR_MINOR_VERSION == 9) && \
     (APR_PATCH_VERSION < 5)
diff -urN '--exclude=CVS' '--exclude=.cvsignore' '--exclude=.svn' 
'--exclude=.svnignore' old/mod_wsgi-4.9.2/src/server/wsgi_version.h 
new/mod_wsgi-4.9.4/src/server/wsgi_version.h
--- old/mod_wsgi-4.9.2/src/server/wsgi_version.h        2022-05-31 
02:45:32.000000000 +0200
+++ new/mod_wsgi-4.9.4/src/server/wsgi_version.h        2022-09-12 
03:56:13.000000000 +0200
@@ -25,8 +25,8 @@
 
 #define MOD_WSGI_MAJORVERSION_NUMBER 4
 #define MOD_WSGI_MINORVERSION_NUMBER 9
-#define MOD_WSGI_MICROVERSION_NUMBER 2
-#define MOD_WSGI_VERSION_STRING "4.9.2"
+#define MOD_WSGI_MICROVERSION_NUMBER 4
+#define MOD_WSGI_VERSION_STRING "4.9.4"
 
 /* ------------------------------------------------------------------------- */
 

Reply via email to