Done, Thanks
Brad
[EMAIL PROTECTED] Thursday, April 07, 2005 5:20:23 PM
Greetings All,
Just trying a build of 2.1 following the mod_imap - mod_imagemap name
change, and the attached patches are needed to build for NetWare:
In http 21. root directory:
--- NWGNUmakefile.orig 2005-02-15
PROTECTED] Wednesday, April 06, 2005 1:17:10 PM
Brad Nicholes wrote:
I'm still not a big fan of removing the MPM settings from the httpd.conf
file. All of the other extra .conf files contain supplemental configuration
but the MPM configuration seems to be more along the lines
+1 to Greg's comment, I also think that for a new users, having a bunch of
little .conf files will be more confusing. For experienced users, they will
split up the .conf file however they see fit anyway. So it doesn't really
matter.
Brad
[EMAIL PROTECTED] Sunday, April 03, 2005 1:33:06 AM
The STATUS file says:
2.1.4 : in development
2.1.3 : Released on 2/22/2005 as alpha.
The ap_release.h header file says:
2.1.5-dev
The distribution page /dist/httpd says:
httpd-2.1.3-beta.tar.gz
Are we BETA yet or not? I am assuming that the true status is:
-
Open an enhancement request in Bugzilla
http://httpd.apache.org/bug_report.html an include the patch file there.
Brad
[EMAIL PROTECTED] Thursday, March 24, 2005 4:47:52 AM
Hello,
for my personal needs i had to add some functionality to mod_charset_lite.
Here is what i did:
1) Add an
+1 NetWare
Brad
[EMAIL PROTECTED] Wednesday, March 16, 2005 2:00:47 PM
Hi all,
There are some 2.1.4-alpha tarballs waiting to be tested at:
http://httpd.apache.org/dev/dist/
Please report back with any problems.
Thanks for testing!
Sander
For 2.0 auth_ldap and mod_ldap it will probably forever remain
experimental. There have been a lot of changes that have gone into the
2.1 version that IMO allowed it to graduate from experimental to a
standard module. Most of these patches will never be backported to 2.0.
In fact Josh's
I am of the same opinion as Justin in that I believe that multiple
auth providers can be put into 2.2 at anytime. If it happens to make it
before initial release fine. If it is after, it is just additional
functionality which won't break backward compatibility. As far as
backporting other
The patch has been committed to httpd-trunk.
thanks,
Brad
[EMAIL PROTECTED] Tuesday, March 08, 2005 7:26:02 AM
I had problems with LDAP modules in 2.0.53 on Windows. It
authenticates
fine, but when I shut down apache I get those Microsoft alerts saying
something went wrong. It only happens
I believe that we are talking about coding at the provider layer (ldap,
file, etc.). The problem here is that I am not sure what the following
means:
[ ] Implement globally across schemes and providers
Single AuthConfig xxx directive, but as it's not in the
scheme
which iterates the
xxx
Location /private
AuthProvider alt-ldap
AuthLdap additional or overridden directives...
Which more closely maps to the configuration syntax today.
Brad
William A. Rowe, Jr. [EMAIL PROTECTED] Monday, March 07, 2005
4:47:15 PM
At 10:11 AM 3/7/2005, Brad Nicholes wrote:
I
Actually I think the better syntax would be:
AuthProviderAlias ldap Myldap1
...config options for mod_authnz_ldap...
/AuthProviderAlias
AuthProviderAlias ldap Myldap2
...config options for mod_authnz_ldap...
/AuthProviderAlias
AuthProviderAlias file Myfile1
...config options for
Although I agree that this would probably be the best way to go, I don't
think it will be that simple. Authnz_ldap stores the LDAPurl and other
information (bind user id, bind password, certs, etc) in a per-Dir
structure. At the very least, authnz_ldap would have to be taught how
to store
+1 on NetWare.
[EMAIL PROTECTED] Thursday, February 24, 2005 12:52:23 AM
--On Wednesday, February 23, 2005 10:37 PM -0600 William A. Rowe, Jr.
[EMAIL PROTECTED] wrote:
Uhm, no. By that definition, all the pollution spewed from typical
Linux libraries would be considered 'public api.'
+1
[EMAIL PROTECTED] Wednesday, February 23, 2005 9:03:48 AM
Assuming that we can get a beta approved to eventually become 2.2.x,
I'd like
to propose the following policy that tries to balance the need for
review with
the need for stability:
Any code changes can be backported to a release
I have a 2.0 compatible patch just about ready to go. Once I get it
cleaned up, I will post it as a 2.0.53 patch in the patches directory
off of the download page.
Brad
[EMAIL PROTECTED] Monday, February 07, 2005 10:08:29 AM
It appears that 2.0.53 does not include the LDAP socket timeout
+1, allowing mod_authnz_ldap to override the default makes a lot more
sense. Unless you are already working on a patch, I will try to put
something together today. But after today I will be offline for the
next two days.
Brad
[EMAIL PROTECTED] Wednesday, February 02, 2005 1:23:51 AM
Brad
flag meaning UNSET.
Brad
[EMAIL PROTECTED] Wednesday, February 02, 2005 9:38:59 AM
Brad Nicholes wrote:
+1, allowing mod_authnz_ldap to override the default makes a lot
more
sense. Unless you are already working on a patch, I will try to put
something together today. But after today I
You read my mind. I'm all over it. :)
Brad
Graham Leggett [EMAIL PROTECTED] Wednesday, February 02, 2005
12:13:56 PM
Brad Nicholes wrote:
I have got something that almost works now. The problem that I
am
running into is that util_ldap_connection_find() doesn't know the
difference
I have already added a new directive to util_ldap called
LDAPConnectionTimeout (
http://httpd.apache.org/docs-2.1/mod/mod_ldap.html#ldapconnectiontimeout
) which allows util_ldap to set the network timeout through
rc = apr_ldap_set_option(p, NULL, LDAP_OPT_NETWORK_TIMEOUT,
I was hoping that this wouldn't be the case. But since it is, take a
look at SVN r149419
Brad
[EMAIL PROTECTED] Tuesday, February 01, 2005 9:39:20 AM
Brad Nicholes wrote:
I have already added a new directive to util_ldap called
LDAPConnectionTimeout (
http://httpd.apache.org/docs-2.1
I hate it when I get bit by copy and paste. Try r149421.
Brad
[EMAIL PROTECTED] Tuesday, February 01, 2005 10:23:01 AM
Brad Nicholes wrote:
I was hoping that this wouldn't be the case. But since it is, take
a
look at SVN r149419
util_ldap.c
util_ldap.c(1615) : error C2065: 's
The LDAP_OPT_SEND_TIMEOUT option appears to be a Microsoft LDAP SDK
only option. As I see it we can go in a couple of different ways here.
1) Implement the connection pool as an apr_reslist and let it handle
the connection timeouts as Graham suggested.
2) Add another #ifdef to the existing
, 2005 10:33 AM -0700 Brad Nicholes
[EMAIL PROTECTED] wrote:
The LDAP_OPT_SEND_TIMEOUT option appears to be a Microsoft LDAP
SDK
only option. As I see it we can go in a couple of different ways
here.
OpenLDAP has LDAP_OPT_TIMELIMIT, LDAP_OPT_TIMEOUT, and
LDAP_OPT_NETWORK_TIMEOUT
After testing mod_authnz_ldap and util_ldap some more, it appears
that the directive LDAPTrustedMode should be pushed up into
mod_authnz_ldap rather than util_ldap and become AuthLDAPTrustedMode.
The reason why is because the connection type (ie. NONE, SSL, STARTTLS)
is tied to the
The attached patches convert LDAPTrustedMode into a per-directory
directive rather than a per-server. This allows the configuration to
specify which mode should be applied for the associated AuthLDAPURL.
Thoughts on whether this should be the way to go or if LDAPTrustedMode
should be moved up
[EMAIL PROTECTED] Monday, January 31, 2005 2:26:09 PM
I'd love to see the LDAP socket timeout configuration stuff make it in
for 2.0.53!
--
Jess Holle
Justin Erenkrantz wrote:
Any opposition to doing a tag and roll of 2.0.53 soon? (Yes, I
volunteer to be RM.) How about targetting next
I guess I am still a little unclear on what the advantage is to using
ldap:// + start_tls vs. ldaps://. The end result is the same except
that you have a secure connection to the LDAP server on 389 rather than
636. Is that the only reason? Administrators don't want to open a
dedicated SSL
. This way some other module or application built on top of
apr-util will have the ability to start and stop TLS at will.
Brad
[EMAIL PROTECTED] Thursday, January 06, 2005 2:18 PM
Brad Nicholes wrote:
I guess I am still a little unclear on what the advantage is to
using
ldap:// + start_tls vs
the same type of application that
TLS upgrade would have in mod_ssl.
Brad
[EMAIL PROTECTED] Thursday, January 06, 2005 4:44 PM
At 05:19 PM 1/6/2005, Brad Nicholes wrote:
This doesn't mean that APR-util doesn't support the concept of
starting
and stopping tls, it only means that util_ldap doesn't
Yes, a new module directory called debug was added as a
subdirectory of modules. This conflicted with the debug output
directory that was being created during the build process. The result
was that everytime you did a gmake -f NWGNUMakefile clean it wiped out
the source code found in the new
+1, lets get something out there for the community to test. If we have
to go through a bunch of 2.1.x-betas before we feel comfortable with
branching, so be it.
Brad
[EMAIL PROTECTED] Monday, December 13, 2004 4:30:29 PM
--On Monday, December 13, 2004 2:40 PM -0700 Paul Querna
[EMAIL
httpd builds on NetWare but we are having problems with the version of
APR that was included in the tarball. APR 1.0.1 is failing to build on
the latest LibC SDK on NetWare due to a couple of minor type mismatches.
It requires the following patch from the APR 1.0.x branch:
It may be a bit of a hack, but it seems reasonable to me. The best
part is that it works.
+1
Brad
[EMAIL PROTECTED] Wednesday, December 08, 2004 2:33:48 AM
On Tue, Dec 07, 2004 at 05:14:40PM -0700, Brad Nicholes wrote:
OK, now that you have enabled upgrades for anything other than
be a bit of a hack, but it seems reasonable to me. The best
part is that it works.
+1
Brad
[EMAIL PROTECTED] Wednesday, December 08, 2004 2:33:48 AM
On Tue, Dec 07, 2004 at 05:14:40PM -0700, Brad Nicholes wrote:
OK, now that you have enabled upgrades for anything other than
OPTIONS, I see
Seems reasonable. I would have to take a closer look at it though.
Brad
[EMAIL PROTECTED] Wednesday, December 08, 2004 10:56:10 AM
At 10:10 AM 12/8/2004, Brad Nicholes wrote:
FYI, if anybody else is interesting is testing the TLS upgrade
functionality, there is a small test utility
(http
It appears that the patch for bug 18757 which disallows a
content-length header for all requests with a content-length of 0 is too
broad.
Index: D:/Projects/2.x/httpd-trunk/server/protocol.c
===
---
, Brad Nicholes wrote:
I tested the TLS upgrade stuff last week and it failed because the
zero-length chunk to terminate the OPTIONS response was not sent
through
the mod_ssl output filter; is that the same problem you see?
I don't think so. I can make everything work again by simply
allowing
than one filter stack that needs to be modified?
Brad
[EMAIL PROTECTED] Tuesday, December 07, 2004 4:18:13 PM
On Tue, Dec 07, 2004 at 03:00:52PM -0700, Brad Nicholes wrote:
So what are you suggesting that the appropriate fix should be?
Even
though the protocol.c patch was bogus, it sounds
The short answer is that it is already fixed in Apache 2.1/2.2.
Unfortunately you have hit on one of the limitations of the Apache 2.0
authentication module structure. The problem is that authorization
types are replicated through multiple authentication modules.
Fortunately this has all been
NetWare builds against either 1.1.x or 1.2.x. It just depends on
where you point the ZLIBSDK environment variable at compile time.
Brad
[EMAIL PROTECTED] Tuesday, November 30, 2004 6:52:58 AM
At 01:57 AM 11/30/2004, Justin Erenkrantz wrote:
--On Tuesday, November 30, 2004 6:53 PM +1100
While trying to get NetWare to build with the new PCRE update, I
noticed that there is a duplicate of pcreposix.h in both include/ and
srclib/pcre/ directories. Currently they don't match which is causing
the NetWare build to break. I can sync them up, but the real question
is should this
Checked in
thanks,
Brad
[EMAIL PROTECTED] Wednesday, November 24, 2004 9:12:06 PM
Greetings All,
Attached and listed below are two NWGNUmakefiles plus diff's to add
them
into to the httpd build processdisavow being a wiz at this stuff
and
if someone doesn't like the names chosen, etc
It looks like some changes in the LibC SDK exposed some type
mismatches in some of the NetWare code. These have been fixed and
checked in.
Brad
[EMAIL PROTECTED] Saturday, November 27, 2004 2:04:41 PM
Greetings All,
Thanks to all the recent updates the 2.1 (.2?) now builds cleanly using
Since this is alpha level, should the server signature contain
-alpha so that users don't get this confused with an actual release?
Once I build binaries for NetWare, the only thing that will indicate
that this is an alpha is the name of the .zip file. It would be less
confusing if the
The netware build is not copying the charset.conv file to the /conf
directory during the make install stage. I just committed a patch for
NWgnumakefile.
Brad
[EMAIL PROTECTED] Friday, November 19, 2004 11:14:19 PM
http://httpd.apache.org/dev/dist/
Grab the 2.1.1 tarballs while they're
AM -0700 Brad Nicholes
[EMAIL PROTECTED] wrote:
Now that we have converted to SVN, why doesn't the subject line
include the file that is being changed in the commit message? This
makes it harder to prioritize patches that need to be reviewed.
Our CVS mailer only showed the last directory
, it is distinguished
from other posts.
Brad
[EMAIL PROTECTED] Friday, November 19, 2004 2:47:17 PM
--On Friday, November 19, 2004 2:41 PM -0700 Brad Nicholes
[EMAIL PROTECTED] wrote:
listings to keep the subject line shorter and more informative. I
also
don't need to see svn commit: r at the front
, November 17, 2004 12:42:08 PM
On Tue, Nov 16, 2004 at 06:10:17PM -0700, Brad Nicholes wrote:
During ApacheCon several httpd PMC members got together to
discuss
current issues with the httpd project and to try to find better ways
to manage the project. One of the issues that was discussed heavily
moving to the [EMAIL PROTECTED]
[EMAIL PROTECTED] Tuesday, November 16, 2004 4:08:20 PM
During ApacheCon several httpd PMC members got together to discuss
current issues with the httpd project and to try to find better ways
to
manage the project. One of the issues that was discussed heavily
[EMAIL PROTECTED] Tuesday, November 16, 2004 4:28:38 PM
On Tue, Nov 16, 2004 at 04:08:20PM -0700, Brad Nicholes wrote:
slowdown of activity in the httpd project. One proposal that was
made
would be to adopt a lazy consensus rule. Basically what this means
is
that when a backport is proposed
moving to dev@ list
[EMAIL PROTECTED] Tuesday, November 16, 2004 4:46:45 PM
On 17.11.2004, at 00:30, Cliff Woolley wrote:
On Tue, 16 Nov 2004, Justin Erenkrantz wrote:
I think this is a bad idea and would make stable turn into CTR.
And,
that, I
believe jeopardizes the overall quality of
the required three +1s. Going in this direction is
definitely
the right way to go.
p.s. why is this on the pmc list? we have committers who aren't
PMCers,
right?
-aaron
On Nov 16, 2004, at 3:08 PM, Brad Nicholes wrote:
During ApacheCon several httpd PMC members got together to
discuss
of the user so that it is reviewed by more than
just those with voting rights. How else are we going to generate a
community.
Brad
[EMAIL PROTECTED] Tuesday, November 16, 2004 4:28:38 PM
On Tue, Nov 16, 2004 at 04:08:20PM -0700, Brad Nicholes wrote:
slowdown of activity in the httpd project. One
moving to dev@ list
[EMAIL PROTECTED] Tuesday, November 16, 2004 6:00:16 PM
-BEGIN PGP SIGNED MESSAGE-
Hash: SHA1
+1 it might open up a couple of bugs/regressions, but it will certainly
mean more fixes going in
On 17/11/2004, at 10:08 AM, Brad Nicholes wrote:
During ApacheCon
PROTECTED] Tuesday, November 16, 2004 4:29:31 PM
* Brad Nicholes [EMAIL PROTECTED] wrote:
During ApacheCon several httpd PMC members got together to discuss
current issues with the httpd project and to try to find better ways to
manage the project. One of the issues that was discussed
I have to agree with Jim. Well put!
Brad
[EMAIL PROTECTED] Tuesday, November 16, 2004 5:55:04 PM
On Nov 16, 2004, at 3:16 PM, Manoj Kasichainula wrote:
We had a good discussion over lunch today on our release processes
and
how to have stable releases while making new feature development
It's not Linux but here is a piece of information that should help.
NetWare is a thread only environment which means that we have been
shipping and running all of the standard modules since day one with
really no report of any threading related issues. I can't speak for any
third party
Good point. I will get the patch committed
Brad
Jari Ahonen [EMAIL PROTECTED] Thursday, November 04, 2004
7:39:01 AM
Brad,
I think this patch should be applied to the current HEAD
util_ldap.c code. It prevents util_ldap_cache_getuserdn()
timestamping cache entries with bindpw.
- Jari
-
directive as well for Apache
2.1/2.2.
Brad
[EMAIL PROTECTED] Wednesday, November 03, 2004 8:09:35 AM
Good suggestion. I am +1 for the patch as-is with the intent
of looking into adding the below
On Nov 3, 2004, at 5:04 AM, Graham Leggett wrote:
Brad Nicholes wrote:
I took a quick look
You are correct that a patch based on mod_authnz_ldap.c won't apply
cleanly to mod_auth_ldap.c because of various differences in the code
base. But the patch is fairly self-contained meaning that the same
chunk of code can easily be copied from mod_authnz_ldap.c and pasted
into mod_auth_ldap.c
I took a quick look at this patch and it seems to work well as long
as all of the listed attributes are OR'ed together. I don't have a good
suggestion yet, but is there a way to implement the logic so that
attributes could be also AND'ed together? Or even a NOT-EQUAL
operation?
Brad
[EMAIL
trying to make it easier for you to understand my viewpoint on
this issue.
Brad Nicholes wrote:
So basically what you did was write a function that puts bad data
into the cache that the cache was never designed to handle or allow.
I'm not sure I would agree with that. But then, I haven't seen
potentially open up holes where there wasn't a problem
before. Adding a separate cache would just eliminate any potential
problems.
Brad
Jari Ahonen [EMAIL PROTECTED] Friday, October 29, 2004 2:51:47 PM
Brad Nicholes wrote:
I see your point about the req structure being tied to closely
that apr_bucket_read() can't give you back anything
bigger than an apr_size_t anyway.
Brad
[EMAIL PROTECTED] Monday, October 25, 2004 10:01:53 AM
Brad Nicholes wrote:
-1 as well. This is now causing compiler errors on NetWare. Please
revert this patch!
Can you provide an indication of exactly
+1 NetWare
[EMAIL PROTECTED] Monday, October 18, 2004 8:15:16 PM
The RC tarballs for 1.3.32 are available for review and feedback:
http://httpd.apache.org/dev/dist/
1.3.32 is *not* yet released; these are simply the release
candidate tarballs.
--
From what I can see, the reason for providing a short and simple
welcome page is to avoid confusing people by giving them too much
information. The question I would ask is, are you just trading one set
of problems for another? How many people are we going to confuse by not
giving enough
Since this patch was the last of three fixes for util_ldap and didn't
make it into 2.0.52 because of lack of votes and since it fixes a
segfault in util_ldap, now that it has the required votes, I would
suggest we backport the fix and post the patch in /dist/httpd/patches.
Any objections?
PM
At 04:59 PM 9/28/2004, Brad Nicholes wrote:
Since this patch was the last of three fixes for util_ldap and
didn't
make it into 2.0.52 because of lack of votes and since it fixes a
segfault in util_ldap, now that it has the required votes, I would
suggest we backport the fix and post the patch
[EMAIL PROTECTED] Tuesday, September 28, 2004 5:31:47 PM
At 06:12 PM 9/28/2004, Brad Nicholes wrote:
I wouldn't consider posting the patch if there was going to be
another release in a week and a half, but that usually isn't the
case
and a patch for an experimental module usually isn't
interested, I don't have a
better suggestion yet so I will have to think about it some more.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
out, but it seems
much easier to read as a single file. Maybe just some additional
formatting and comments to distinguish MPM directives from Language from
Vhosts, etc. is needed.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http
switching between global and local locks
anyway. This would require #ifdef'ing the code for particular platforms
or MPM's which isn't a good thing.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED
in the patch file so that the backport matches the current
state of the code.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Monday, September 20, 2004 7:15:27 AM
See my util_ldap.c patch.
Whether
Same here. I need another vote for the util_ldap.c backport
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Thursday, August 26, 2004 11:21:22 AM
Sander Striker wrote:
Hi,
I'm going
Oops, my mistake. This wasn't suppose to be checked in. Reverting now.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Wednesday, August 25, 2004 2:15:25 PM
bnicholes2004/08/25 13:15:25
should probably be thrown into the attic so
we can at least preserve the history.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Wednesday, August 18, 2004 7:24:13 AM
Brad Nicholes wrote:
BTW
a authz_groupfile rather than forced to use
the directory, this directive didn't seem necessary anymore.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Tuesday, August 17, 2004 5:33:08 PM
bnicholes2004
module directories to be the new
home of util_ldap?
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Tuesday, August 17, 2004 5:41:12 PM
[EMAIL PROTECTED] wrote:
Re-structure the auth_ldap
BTW, since I am not a Linux makefile guru, the new authnz_ldap module
has not been added to the Linux build scripts. Can somebody make the
appropriate changes to the makefiles?
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http
to be migrated to the httpd project? Why is the
AJPLIB code in a test directory?
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
char *proxyhost, apr_port_t
proxyport))
notice the difference in the parameter lists. The declaration has 6
parameters and the actual handler only has 5. The handler is missing
proxy_worker * as the second parameter. How does this compile or even
work on any platform?
Brad
Brad Nicholes
Senior
serious security fixes, the story would be upgrade
to 2.2.x because that is where the fix is.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Thursday, August 12, 2004 2:53:05 PM
At 03:15 PM 8/12
and only be available in 2.1. Thoughts?
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Tuesday, August 03, 2004 7:09:01 PM
minfrin 2004/08/03 18:09:01
Modified:.Tag
parameters.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Friday, July 16, 2004 11:15:32 AM
[Forwarding on behalf of Tair-Shian Chou who has problems getting his
mail through to [EMAIL PROTECTED] list
listen addr:port so that if the request to
upgrade is made, Winsock has the information it needs to upgrade the
socket.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Wednesday, July 14, 2004 11:17
was in
/experiemental, the full httpd source would be needed to build an
Apache
module that used util_ldap (unless I am misunderstanding something).
True. It just seems a little strange.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http
Agreed, and interested in other thoughts as well.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
Graham Leggett [EMAIL PROTECTED] Monday, June 28, 2004 11:23:57 AM
Brad Nicholes wrote:
I was hoping to avoid
No, I didn't change anything that would allow for anonymous shared
memory. This should probably check for a NULL before calling
apr_file_remove().
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED
ptemp shouldn't ever be NULL on a post_config, right? I just fixed
the code so that it checks for a NULL file name before calling
apr_file_remove().
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL
and much easier to run things in kernel address
space. It is just the nature of the OS. What's the benefit?
Performance, scalability and yes, security. (OK, that sounds a lot like
a marketing line, but its true)
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net
or a separate address space.
The default is the current address space.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Tuesday, June 22, 2004 5:45:58 AM
[EMAIL PROTECTED] wrote:
clar2004/06/21 12
Do the docs need to be updated for this change? Allowing relative
paths to be resolved against ServerRoot seemed like fairly standard
procedure.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED
assuming that it would be needed later. The MaxMemFree
directive allowed the memory pool manager to release excess memory
rather than allowing it to hang around.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL
code. I am sure
that we can take advantage of what has been done in mod_ssl and other
places that have to mutex protect shared memory. It is actually working
great on NetWare at the moment but then we don't use shared memory and
we are multi-threaded only.
Brad
Brad Nicholes
Senior Software
rather than trying to retrofit it with
pools and reslists.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Thursday, June 10, 2004 4:59:30 AM
Brad Nicholes wrote:
I guess that is a possibility
to this model. The pieces can come can go, but
you can never really clear the whole thing out and reuse it because the
operation never actually ends.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
Graham Leggett [EMAIL
, newnode);
LDAP_CACHE_UNLOCK();
}
It appears to be acquiring a read lock but then inserts a new node into
the cache. Shouldn't it be acquiring a write lock before doing an
insert?
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business
the cache at the same time. True?
Since NetWare is multi-threaded only, we never see this problem.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Thursday, June 10, 2004 5:07:52 PM
, you lose the web server.
Brad
Brad Nicholes
Senior Software Engineer
Novell, Inc., the leading provider of Net business solutions
http://www.novell.com
[EMAIL PROTECTED] Wednesday, June 09, 2004 4:43:22 PM
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB
201 - 300 of 476 matches
Mail list logo