Hi httpd folks.
root received this report, FYI.
-Chris
> Begin forwarded message:
>
> From: Matt Johnson
> Subject: Incorrect hyperlink on "Verifying Apache HTTP Server Releases" page
> Date: December 16, 2021 at 2:31:27 PM PST
> To: "r...@apac
port 80 isn't open. check your firewall and routing.
On Wed, Jul 21, 2021 at 12:04 AM Paul Kagan wrote:
> hi my website http://grocery.kiryastash.com is not accessible but the
> apache web server appears to be working correctly. it was also working
> before and suddenly stopped. I tried
Yes! Yes! Do it!
-C
On Sat, Oct 5, 2019, 16:36 Rich Bowen wrote:
> With my community development hat on, a big +1 even though I hate Git.
>
> Shosholoza,
> Rich
>
>
> On Sat, Oct 5, 2019, 16:09 Jim Jagielski wrote:
>
>> Various PMCs have made their default/de-facto SCM git and have seen an
Wouldnt this be a certbot issue?
On Tue, Aug 13, 2019, 17:50 Brad Warren wrote:
> Hi,
>
> I work at the Electronic Frontier Foundation on Certbot where we’re having
> a problem with httpd’s TLS support and it was recommended to me to post the
> issue to this mailing list. Any additional
Someone may want to add some text along the lines of when to use u/WSGI
instead of mod_lua as that's going to be a thing if this goes stable. If
the what/when isn't in there clearly we could run into really bad
situations like ASF using mod_lua to host web services in production.
On Fri, Jan 25,
Why not just use HSTS?
You want separate VirtualHost blocks anyway because you have to decide
where your cert/chain/key files are going to be served so you don't send
SSL traffic over port 80. The SSL engine is enabled at the virtualhost
block level. HSTS is more professional too.
What I do
thrpchild=32,
thr_limit=64
[Fri Oct 16 10:06:02.002062 2015] [http2:debug] [pid 19727:tid
34410099712] h2_workers.c(227): h2_workers: starting"
Hope this helps.
On 16 October 2015 at 10:14, Stefan Eissing
<stefan.eiss...@greenbytes.de> wrote:
> Chris,
>
> I wrote some advice at http
The blacklist does look too radical to me as well. My server was
configured with some in that list.
Also it can place a server admin in a tough position e.g. what if they
want to support IE8, or maybe android2 which doesn thave tls 1.2
stuff, but also support h2, they would be forced to choose
have
tried the value in both the server config and vhost which has no
affect.
Any ideas?
I have been testing on both http and https and both stuck on http 1.1.
Chris
do you want me to repost this there then?
On 16 October 2015 at 10:36, Stefan Eissing
<stefan.eiss...@greenbytes.de> wrote:
> Lets move this to the users list where others can also see it.
>
>> Am 16.10.2015 um 11:22 schrieb Chris <chrco...@gmail.com>:
>>
>> H
interesting that chrome is happily using h2 on my domain that I
activated for h2 earlier and I have a couple of banned ciphers in
mod_ssl.
On 16 October 2015 at 13:33, Yann Ylavic wrote:
> On Fri, Oct 16, 2015 at 1:38 PM, Yann Ylavic wrote:
>>
>>
sslhonorcipherorder is definitely set.
I will check again to see if is in the unbanned ones.
On 16 October 2015 at 14:37, Eric Covener <cove...@gmail.com> wrote:
> On Fri, Oct 16, 2015 at 9:28 AM, Chris <chrco...@gmail.com> wrote:
>> interesting that chrome is happily
ove...@gmail.com> wrote:
> On Fri, Oct 16, 2015 at 9:28 AM, Chris <chrco...@gmail.com> wrote:
>> interesting that chrome is happily using h2 on my domain that I
>> activated for h2 earlier and I have a couple of banned ciphers in
>> mod_ssl.
>
>
> unbanned ones listed earlier, or no SSLHonorCipherOrder?
<cove...@gmail.com> wrote:
> On Fri, Oct 16, 2015 at 9:28 AM, Chris <chrco...@gmail.com> wrote:
>> interesting that chrome is happily using h2 on my domain that I
>> activated for h2 earlier and I have a couple of banned ciphers in
>> mod_ssl.
&
gt; On Fri, Oct 16, 2015 at 4:29 PM, Chris <chrco...@gmail.com> wrote:
>> here is my cipher list used in mod_ssl
>>
>> SSLCipherSuite
>> ECDHE-RSA-AES128-GCM-SHA256:ECDH+AES128:ECDHE-RSA-AES256-GCM-SHA384:ECDH+AES256:ECDH+3DES:CHACHA20+POLY1305:DHE-RSA-AES128-SHA:RSA+3DES
i, Oct 16, 2015 at 4:33 PM, Chris <chrco...@gmail.com> wrote:
>> ahh so only one needs to be unbanned for it to work?
>>
>> the selected cipher isnt banned no.
>>
>> On 16 October 2015 at 15:32, Yann Ylavic <ylavic@gmail.com> wrote:
>>> Some
the 2.2 behaviour
and close the PR. I've got a stack of other mod_dav fixups should
try to push into trunk ... I'll try to steal some time to chip away
at the pile. No rash promises, though. :-/
Thanks for taking a look at this; cheers,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD
setups will just work again with 2.4.x, once the patch is back-ported.
Does that seem acceptable to you? I can just follow CTR, I know, but
I thought I'd ask first since you're clearly looking at similar issues
at the same time.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297
seriously, I'm waiting to debug a
memory consumption issue first, and then I'll try to start pushing them
into trunk.
Chris.
= (char **)d-index_names-elts;
num_names = d-index_names-nelts;
===
Chris.
1. https://issues.apache.org/bugzilla/show_bug.cgi?id=25435#c7
2. http://svn.apache.org/r233369
3. http://svn.apache.org/r327900
4. http://svn.apache.org
Jim Jagielski wrote:
The pre-release test tarballs for Apache httpd 2.2.26 can be found
at the usual place:
http://httpd.apache.org/dev/dist/
I'm calling a VOTE on releasing these as Apache httpd 2.2.26 GA.
+1: CentOS 5.5 (x86_64), APR 1.4.8, APR-util 1.5.2, OpenSSL 1.0.1e
Chris
wr...@apache.org wrote:
Wrap at 80 still, here at httpd project
Amen to that. :-)
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
Jeff Trawick wrote:
[ ] Release mod_fcgid 2.3.9 as GA
+1
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
401
all other 401 401
I'll try to run some quick smoke tests on your 2.3.9 over the weekend;
thanks again for pushing this along.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
... IIRC after about a year or so.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
Chris Darroch wrote:
The intent of r1357986 was to deal with a particular, wonky
sub-case, when the Authorizer returns 200 (so the spec paragraph
doesn't apply in this case, as it's a 200 OK response), but adds
a Location header with a relative (not absolute) path. In this case,
2.3.7
+1 with many thanks,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
,
and possibly reworking how ServerName, ServerAlias, Listen, etc.
all play together. For another day ...
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
volunteers to update the winnt and netware MPMs?)
Thanks very much,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
the MIME action closely enough to know whether to
go with the older or newer type mapping.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
approaches; certainly the APR patch isn't ideal. But after
a long time spent digging into the source code for tail and cat and
trying many variants, this now seems to work smoothly for us, at least.
Chris.
===
--- support/rotatelogs.c.orig
. Sound OK?
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
as best practices examples?
I fished around a bit for %.[0-9]+s but didn't see anything obvious ...
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
there was some edge case I didn't test (although I tried to get 'em all)
and it bit someone down the road. Please adjust as you see fit,
or I can later on. Cheers,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
William A. Rowe Jr. wrote:
On 6/29/2012 6:25 PM, Chris Darroch wrote:
If this looks OK, I'd love to commit and move on to the next
patch ... assuming I can keep paddling near the shore and avoid those
dangerous undertows! Thanks and cheers,
Looks sensible to me.
Thanks, Bill
on to the next
patch ... assuming I can keep paddling near the shore and avoid those
dangerous undertows! Thanks and cheers,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
the normal way or
use this value to choose your VirtualHost. And that latter
action probably requires some workaround to get the module's
code to run ahead of the vhost selection in server/vhost.c.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883
value before VirtualHost
selection, which is more in UseCanonicalHost's territory.
Thoughts, anyone? And thanks very much for the feedback!
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
Daniel Gruno wrote:
[+/-1] Add commentary system to the trunk documentation.
+1
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
if they're stuck in the same situation.
Let the torches and firebrands be set alight! Cheers,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
+1
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
Has anyone used zmq to communicate outside of their module to another process?
Or should I convert to using regular sockets?
Thanks,
Chris Coldwell
Feel free to fork my project:
https://github.com/chrislondon/Dynamic-Stylesheets
The README file (
https://github.com/chrislondon/Dynamic-Stylesheets/blob/master/README) contains
usage info and the project contains a simple test case.
Thanks everyone!
Chris London
CTO - Kwista, LLC.
ch
was applied it is now only used in a local if scope.
This is basically a code clean up patch.
Thanks,
Chris
--
Chris Wilson
http://vigilantsw.com/
Vigilant Software, LLC
Index: server/mpm/event/event.c
===
--- server/mpm/event
a patch like this:
- char *charset;
+ char *charset = 0;
Thanks,
Chris
a patch like this:
- char *charset;
+ char *charset = 0;
Thanks,
Chris
--
Chris Wilson
http://vigilantsw.com/
Vigilant Software, LLC
wrote:
On 4/16/2011 11:52 AM, Chris Hill wrote:
Dear Apache httpd dev list,
...
The reason why I insist in this is that the world has come to depend on
HTTP/SOAP over SSL (and Apache/OpenSSL are probably the most popular
implementation) for business critical apps, yet, it is not clear
of the Internals of Apache/OpenSSL.
On Saturday, April 16, 2011, William A. Rowe Jr. wr...@rowe-clan.net wrote:
On 4/16/2011 2:39 PM, Daniel Ruggeri wrote:
On 4/16/2011 11:52 AM, Chris Hill wrote:
but how can I ensure this will never be turned back on in
future releases given the lack
-strategies.html -DDoS
protection strategy which mentions some of the above points
http://services.netscreen.com/documentation/signatures/SSL%3ATHC-SSL-DOS.html
- Shows how IDS vendors are starting to look at this as a way to stop DoS
Thanks,
Chris.
-err_headers_out is for setting headers to be returned by an error response.
You are returning OK.
Try setting r-headers_out instead.
Chris Kukuchka
Sequoia Group, Inc.
=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-=-
SIG Meetings: March 27, 2011
, recent NPTL versions are doing with the
pthread_attr_setstacksize() setting and if changes from the (relatively
large) default value are useful or not.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
on Unix.
I am leaning towards just fixing the documentation, even if that may
mean that something like 60-100K per thread are used just for doing
crypt().
I'd agree with that, and maybe also the apr-util fix for APR 1.4
and httpd trunk.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD
In most of my setups, I don't use a CustomLog at all -- I just have *one*
in the reverse proxy, which I then split.
I believe it would be very useful to have this option for the ErrorLog,
for the same reasons as it is useful for the CustomLog.
+1 to %V in error_log. I also log a
of arrays
and it was overflowing the per-thread stack. Live and learn.
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
would
be ok with level INFO, too, but like DEBUG better. And people who need
the info can still set Loglevel authz_core:debug.
Might this fix PR 46214? (That would be a nice bonus.)
https://issues.apache.org/bugzilla/show_bug.cgi?id=46214
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint
the containers, created
a number of incompatibilities, and the idea was to iron those out.
I think you've captured the key issues here very neatly. Thank you,
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
on the *.tar.bz2 files but not the others,
sorry.
Thanks!
Chris.
--
GPG Key ID: 088335A9
GPG Key Fingerprint: 86CD 3297 7493 75BC F820 6715 F54F E648 0883 35A9
item re allowing
auth and responders at the same time; I think this may have been where
I introduced a bug last time (http://bugs.php.net/bug.php?id=48041)
so I'll probably take a little extra time to review my work and test.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB
. But there may, of course, be other gotchas I haven't
stumbled across -- let me know if you know of any.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
seemed like it
might be a one- or two-liner revealed deeper problems that'll take
a bigger fix than I'd initially hoped. I'll keep you posted as
the week progresses if commits from me aren't forthcoming. Thanks,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3
is rolled, or wait till after.
Chris.
Index: fcgid_proc_unix.c
===
--- fcgid_proc_unix.c (revision 905510)
+++ fcgid_proc_unix.c (working copy)
@@ -168,7 +168,7 @@
}
apr_status_t
-proc_spawn_process(char *lpszwapper, fcgid_proc_info
Chris Darroch wrote:
Jeff Trawick wrote:
Chris Darroch has a patch for that, which is a small part of
http://people.apache.org/~chrisd/patches/mod_fcgid_auth/mod_fcgid-1auth-trunk.patch
[snip]
Yes -- and I'm really, really going to prioritize breaking this
patchset up (I know I'm
changes until we get a new GA release, in
case any regressions in the as-yet-untested/unreleased 2.3.5 need to
be corrected.
Will do. I've tested 2.3.5 lightly; will vote shortly.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
Jeff Trawick wrote:
mod_fcgid users, please try out mod_fcgid-2.3.5.tar.gz (or .tar.bz2)
or the win32/netware suitable package mod_fcgid-2.3.5-crlf.zip from
http://httpd.apache.org/dev/dist/mod_fcgid/
and cast your vote:
+1 to release as 2.3.5-GA
Chris.
--
GPG Key ID: 366A375B
GPG Key
changing mpm_common.c would require
recompiling the full package. Rather than go through that, you might
first try using gdb to attach to a running lead Apache process and
suppress that function.
Regards,
Chris Kukuchka
Sequoia Group, Inc
., breaking out my old fcgid patches), nor httpd, really,
but it's maybe mildly interesting to someone, or not, as the case
may be. :-/ OK, back to work.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
Chris Darroch wrote:
Because this runs on Linux and we're just using the APR defaults,
the process locks are SysV semaphores. Maybe sometime in the far
future, once glibc 2.10 appears on our systems, we might try
APR_LOCK_PROC_PTHREAD and see if we can't get the shiny new
Jeff Trawick wrote:
Chris Darroch has a patch for that, which is a small part of
http://people.apache.org/~chrisd/patches/mod_fcgid_auth/mod_fcgid-1auth-trunk.patch
which applies to the old mod_fcgid 2.2 but which he has submitted here
for inclusion. If you get stuck, look in there at some
William A. Rowe, Jr. wrote:
[X] +1 to release as 2.3.4-beta
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
is somewhat more specific than Output.
If we're thinking about axing or replacing the busy scan at
some point, maybe we should just leave those two named as-is?
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
try to make
peace with the rest. It would be great if others would decide in the
short term what they can't live with.
The directive name changes look great to me -- thanks very much!
Are there any you remain concerned about?
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1
that spawn score is in fact
perfectly adaquate as a description.
Anyway, once some travel is done with this week, I hope to
get cracking on gradually refactoring these old patches of mine.
In the meantime, if others want to grab what they like and
dump the rest, please do so.
Cheers,
Chris
it a quick compile and test run -- no heavy testing but it
handles a pre-2.3 script fine, at least. So I'd vote we get a beta
out there and encourage others to take a look. Thanks again,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
William A. Rowe, Jr. wrote:
Chris Darroch wrote:
[X] +1 to release as 2.3.1-beta
Gave it a quick compile and test run -- no heavy testing but it
handles a pre-2.3 script fine, at least. So I'd vote we get a beta
out there and encourage others to take a look. Thanks again,
Thanks Chris
Jeff Trawick wrote:
Interestingly, I found this post from Chris some time ago that covers
the issue:
http://www.mail-archive.com/mod-fcgid-us...@lists.sourceforge.net/msg00085.html
His patch:
http://people.apache.org/~chrisd/patches/mod_fcgid_auth/mod_fcgid-1auth-trunk.patch
Yes -- we
compile
and experiment, I'd be most appreciative. It would be lovely if it
could go GA on the first try.
I can't make a promise but I'll try to grab it and spin it up.
Again, thank you.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
been utterly useless lately on the httpd front. Thanks again!
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
to see this committed to trunk! ;-) It's been a
long time coming. Kudos to Joe and yourself for making it a real
option. Thanks,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
was hoping to jump in later today or Monday, but
since you're blasting ahead I figure I'll just stay clear unless
there's something specific you'd like me deal with. Thanks again,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
://httpd.apache.org/docs/2.2/mod/mod_log_config.html#formats
as much as possible for the available parameters.) Just an idea
at the moment ... alas, no matching implementation. Sigh. :-/
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
mod_slotmem_zk
in sync with trunk and finally getting into the mod_fcgid build
stuff (borrowing the framework from mod_ftpd, per wrowe's
suggestion). I'm certainly keen to hear opinions on the issue
of locking on httpd (and trying to be lock-free where
feasible) though.
Chris.
--
GPG Key ID: 366A375B
?
Patches are always welcome (although I'm the first to admit
that I'm too slow at reviewing and committing them).
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
to do this
tomorrow or early next week.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
to work-related tasks).
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
consistency in multi-process/multi-thread contexts. Personally
I'd love to see these two APIs be as congruent as possible
since they both do very similar things. (Joe, any comments?)
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
case,
r-pool can be passed to get(), put(), etc.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
()/remove() calls of socache.
My two cents, anyway. Thanks for listening!
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
William A. Rowe, Jr. wrote:
Chris, I'm really confused. Are you asking to branch httpd trunk into
a 2.4 branch (bad, we aren't there) or a 2.3 branch (overkill IMHO, if
we don't have cycles to get to 2.4/3.0 with what's in trunk, we certainly
don't have cycles to make the determinations
into
the autoconf stuff and generally trying to get a branch going
before we add it into httpd trunk. How do others feel?
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
problems. For example, perhaps the user needs to first load one table
then choose a subset from that first table to file another; if you run
them in the reserve order, the second table will likely be empty. :(
Thanks for the comment -- noted in PR #46827.
Chris.
--
GPG Key ID: 366A375B
GPG Key
diving in. Opinions?
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
like to branch and apply whitespace changes fairly soon;
if folks think that's the wrong approach or if there errors in the
newly-applied license text, please let me know! Cheers,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
times
or what have you) you'd overwhelm the DB server with connections.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
review whether they should really
be part of a single data structure or object; that's been a good
reminder to me over the years of Fred Brooks's old adage about thinking
through one's data structures first.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36
Chris Darroch wrote:
Roy T. Fielding wrote:
Yes, that is what I prefer as well. All paperwork is done, so please
let us know when you have an export. I (or one of the other svnadmins)
will have to massage it a bit to prefix the sourceforge ids, so just
point us to the dump file when you
.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3 FA36 366A 375B
the newer Apache releases. Chances are the module you
inherited has not been properly updated to the new Apache standards.
Regards,
Chris Kukuchka
Sequoia Group, Inc.
used the default full cvs2svn conversion; if you want one with just
the trunk and without the small number of CVS tags in the mod_fcgid
repository, let me know. There weren't any branches or anything too
complex in the SF repository.
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041
of the other svnadmins)
will have to massage it a bit to prefix the sourceforge ids, so just
point us to the dump file when you have it ready.
I'll tackle this next week, if tomorrow's not possible. Thanks
very much,
Chris.
--
GPG Key ID: 366A375B
GPG Key Fingerprint: 485E 5041 17E1 E2BB C263 E4DE C8E3
1 - 100 of 305 matches
Mail list logo