consider format. Wiki or doc? There are so many messages
that could be thrown that crowdsourcing the documentation for it may
allow us to cover more bases.
--
Daniel Ruggeri
) AH #n
should do the trick. The source would then contain
ap_log_error(..., APLOGNO(0815) foo went wrong, ...);
+1 To me, this is a must. This also adds a somewhat handy anchor when
searching for log entries in code that may or may not span multiple lines.
--
Daniel Ruggeri
-standard config
directives with an overview of how to duplicate, I have Win7, Server
2003 and Server 2008 I can test with. I fall a bit short in how much
volume I could throw at an installation, though.
--
Daniel Ruggeri
(and
verifying the size returned) would do. Any other pointers or things to
look for? I seem to recall SSL being brought up, or is that a separate
issue?
--
Daniel Ruggeri
was not able to find a failure where partial
content was served - it was all or nothing for me at an SSL connection
level.
I don't have the expertise to dig into this one, but since several
folks have been unable to reproduce the problem, I'll be happy to serve
as a testing ground.
--
Daniel Ruggeri
On 1/17/2012 9:49 AM, Ken Dreyer wrote:
On Tue, Jan 17, 2012 at 8:37 AM, Daniel Ruggeri drugg...@primary.net wrote:
All;
I have submitted PR 52476 to track and document this bug. I've
uploaded the logs from my tests where I was able to duplicate the problem.
http://people.apache.org
or the other avoids the segfault.
This seems to be brought on by the combination of the two (and possibly
the engine implementation).
Any ideas?
--
Daniel Ruggeri
On 1/30/2012 7:51 AM, Jim Jagielski wrote:
Anyone with Windows willing to sign up to review/test?
I don't have a build environment to create something based on the diff,
but if someone can create a build , I'll happily do the testing.
--
Daniel Ruggeri
there.
--
Daniel Ruggeri
to duplicate the problem were
done on the Win7 64 box.
--
Daniel Ruggeri
remove optomizations from httpd, though... I'm
going to try with 0.9.8t and see if anything is different.
--
Daniel Ruggeri
On 2/2/2012 1:02 PM, Daniel Ruggeri wrote:
Since this happens with every attempt to start, I suspect it has nothing
to do with the new directive and more to do with something I did on the
openssl build.
I was, indeed, doing something stupid. A build with openssl 1.0.0g
replicates the behavior
SSLProxyMachineCertificateChainFile (currently in trunk and
proposed for backport in 2.2) with an engine.
--
Daniel Ruggeri
, it will be easy enough to choose something
like --build-apr=../apr-1.4.5
Can we be sure that the configure script will continue to pass
parameters as it does today to these sub configure scripts, too? Also
(dare I ask), but where did we end up on the PCRE discussion?
--
Daniel Ruggeri
question is whether or not there is an
audience to make the effort worthwhile.
--
Daniel Ruggeri
the in/out format, though (not in this thread, of course).
--
Daniel Ruggeri
original intent.
--
Daniel Ruggeri
-driven approach I want to see if my fellow developers and
users had a suggestion for another presentation (or maybe a rewnewal of
the cookbook).
Any ideas out there?
--
Daniel Ruggeri
On 2/3/2012 4:57 PM, Daniel Ruggeri wrote:
On 2/3/2012 12:27 PM, Dr Stephen Henson wrote:
Hmm... the ENGINE code is careful not to shutdown an ENGINE if keys exist
which
make use of it.
So there is a possibility that the some chain verification leaves a
reference to
an RSA key which
between multi-instance
configurations where httpd -c /path/to/conf1.conf and httpd -c
/path/to/conf2.conf end up pointing to the same file even though they
share nothing else in common? Seems like some stepping-on-of-toes would
occur unless I'm missing something else obvious.
--
Daniel Ruggeri
a documentroot,
or have no idea where /foo/bar/baz is supposed to be in the
filesystem)
Is there any harm in adding it? This is the rv from a stat in the
directory walk.
Awesome idea.
--
Daniel Ruggeri
On 3/24/2012 5:52 AM, Steffen wrote:
I prefer to have it in log level debug, because the config already
says that the client IP is forwared.
+1
--
Daniel Ruggeri
I wanted to bring this up here - seems like a few things are going on
that are confusing to me. I'll try to look into it when time becomes
available, but I thought someone might have an opinion off the bat.
Original Message
Subject:[users@httpd] SNI with apache 2.4.1
On 5/4/2012 8:58 AM, Daniel Gruno wrote:
[+/-1] Add commentary system to the trunk documentation.
+1
--
Daniel Ruggeri
/1.1
Host: whatever.com
X-Forwarded-For: 192.168.0.2
X-Forwarded-Host: whatever.com
X-Forwarded-Server: testbed.com
Connection: Keep-Alive
--
Daniel Ruggeri
to be more of a
means of contributing to the doc effort.
Big +1 to this.
--
Daniel Ruggeri
.
To me, a clear and concise security warning in the documentation should
be all that is needed.
IMO, having unadulterated logging capability is what makes
mod_dumpio/mod_log_forensic some of the most useful modules for
troubleshooting in a proxy/crashing scenario (respectively).
--
Daniel Ruggeri
give the
administrator the option of disabling certain headers from being printed
with the flexibility for that administrator to define a match that can
suit every need (headers of various names and cookies of various names
being the more recently discussed items).
--
Daniel Ruggeri
pursuing, I can nyx it from the STATUS file. Timing wasn't the
best as a lot of us were focused on 2.3 - 2.4 at the time.
FWIW, I have been using this update in production environments since it
was proposed.
Cheers
--
Daniel Ruggeri
adopt the system, because
--
Daniel Ruggeri
to spare
and could take a look?
FWIW, I use the patch with engine and non-engine implementations on
Linux, AIX and Solaris.
--
Daniel Ruggeri
On 8/31/2012 8:45 AM, Eric Covener wrote:
Alternatives would be to find a weaker source for the nonce, or allow
tto opt out / use a hard-coded one.
+1... also, couldn't the nonce get in the way of rest-like calls to the
balancer manager to disable/enable/modify members?
--
Daniel Ruggeri
is used. In the event one backend does not
return the X-Load-Factor header, its practical load factor becomes 0.
--
Daniel Ruggeri
conversation. I think consensus was 1 year after the first 2.4 release
but I don't think I've seen such an announcement (I could have just
missed it, too).
--
Daniel Ruggeri
sources? Maybe I can monkey around a bit with the logo to
see if I even like my the idea I mention above...
--
Daniel Ruggeri
than These clothes cleaned by Tide. Could just be me, but that's
how I read it.
--
Daniel Ruggeri
the patch there and to this
list. After a bit of conversation/tweaking, the patch may be accepted
and comitted to trunk by one of us committers or proposed for backport
in an existing branch in the STATUS file.
--
Daniel Ruggeri
into
mod_proxy(_balancer) defeats the purpose of loadable balancer modules
and documenting the requirement sounds like working around the issue.
--
Daniel Ruggeri
for its
maintenance
[ +/- 0] don't care won't help
[ -1] don't accept mod_macro as a standard module
My +1
--
Eric Covener
cove...@gmail.com
Another +1
--
Daniel Ruggeri
: druggeri
+covener: minor MMM bump?
Thanks for the reminder. I've updated both 2.2 and 2.4 backport proposals.
--
Daniel Ruggeri
On 1/17/2013 6:52 AM, Jim Jagielski wrote:
*ping* :)
(yeah, I am kinda pushing/hoping for the balancer
stuff to be in 2.4.4 in time for ACNA13)
*pong* :)
I'm hoping to review those last two on Monday. Been trying for two weeks
to get to them!
--
Daniel Ruggeri
be that the persist patch would not work on server-defined balancers if
changes are made in the vhost. Other than that, I'm not sure what other
inconsistencies and problems would be expected so it's probably worth
warning server admins in docs.
--
Daniel Ruggeri
, though. IMHO, that's a much bigger problem. So is
that bug supposed to be fixed, or do we roll 2.4.4 without this
functionality? I guess it's technically not a regression if it's always
been broken.
--
Daniel Ruggeri
async?
Argh - saw this after the dev@ reply. Will mess with both patches
together and report back. For now ignore my previous message :-)
--
Daniel Ruggeri
On 1/21/2013 12:27 PM, Daniel Ruggeri wrote:
Argh - saw this after the dev@ reply. Will mess with both patches
together and report back. For now ignore my previous message :-)
Aye - that did it! Sorry for the noise - was testing the two patches
independently.
--
Daniel Ruggeri
and
AH01171: balancer://mycluster: No workers in balancer. I'd say that
the former is definitely unexpected but the latter is fairly reasonable.
There was a ProxyPassInherit as part of the original patch... maybe that
needs to be revisited?
--
Daniel Ruggeri
the way things have always been (this is what has been
proposed, after all).
--
Daniel Ruggeri
we're each working/tinkering on at the moment. This will
naturally have to be planned in advance, which seems to be where it all
failed. I'll do my best to hash out some plans for the next meetup, so
we can get down to business and discuss what awesome plans we have for
httpd.
++1
--
Daniel
=47765
https://issues.apache.org/bugzilla/show_bug.cgi?id=54616
I can't say I've ever done that, but can you think of a use case where
breakage may have come from? Was it maybe something on the IRC channel
or a bug report that prompted this?
--
Daniel Ruggeri
to that as
the parameter name?
--
Daniel Ruggeri
what is unsafe...
--
Daniel Ruggeri
.patch
... and corrected trunk + notes in STATUS.
Thanks, Bill. If that works for you, I've also proposed this in 2.4 and could
use votes there, too :)
--
Daniel Ruggeri
apr_pstrndup(p, buf, k);
Will return a string allocated out of the pool instead.
--
Daniel Ruggeri
proposed for 2.2 if anyone could spare
the time to verify/vote there as well.
--
Daniel Ruggeri
to check if the system is healthy.
I think you need to screen out 4xx at least to prevent client errors
from marking down your backends.
There is also failonstatus which, granted, could probably be enhanced to
accept ranges instead of just a list to accommodate this need.
--
Daniel Ruggeri
the current code also fails startup
anyway with the following error:
(20014)Internal error: Error retrieving pid file /dev/null
Remove it before continuing if it is corrupted.
I haven't looked into it any further than that, though.
--
Daniel Ruggeri
Nothing to stall the work, but I'd like to campaign once more for a quick look
at the 2.2 backport I have outstanding (which was added to 2.4 already).
Cheers
--
Daniel Ruggeri
Original message
From: William A. Rowe Jr. wr...@rowe-clan.net
Date: 06/20/2013 4:07 PM (GMT-05
On 6/21/2013 10:19 AM, William A. Rowe Jr. wrote:
On Thu, 20 Jun 2013 17:27:14 -0400
Daniel Ruggeri drugg...@primary.net wrote:
Nothing to stall the work, but I'd like to campaign once more for a
quick look at the 2.2 backport I have outstanding (which was added to
2.4 already).
Which
://httpd.apache.org/dev/release.html#how-to-do-a-release
--
Daniel Ruggeri
life
easier for the tester. They will not be, and are not, part
of the official release.
[ ] +1: Good to go
[ ] +0: meh
[ ] -1: Danger Will Robinson. And why.
Vote will last the normal 72 hrs.
+1 on RHEL 5/gcc/x86, Sol 5.10/SUNWspro/sparc, AIX 6.1/XLC/ppc
--
Daniel Ruggeri
://socket=%2Fhome%2Fwww%2Fsocket
I didn't pursue further than that since it doesn't seem like the
functionality would be used a lot in balancers and can be ironed out in
future patches if that is desired.
--
Daniel Ruggeri
-not-pooled and
proxy-nokeepalive set? Seems like that combo might do what you are
hoping for...
--
Daniel Ruggeri
: 16348.70
Apache UDS: 14580.92
Apache UDS: 15211.97
Apache TCP: 11859.46
(only got one in)
--
Daniel Ruggeri
like using localhost as HTTP host is
too restrictive. I'd hate to think that a UDS backend can't implement
its own concept of name-based vhosts behind Apache because localhost is
forced as the Host header.
--
Daniel Ruggeri
.
Aside from logging, exporting these as ENV entries to the request allows
us to do all sorts of stuff in other modules, too
Any thoughts? Is there something I should include or exclude before I begin?
--
Daniel Ruggeri
other
attributes that are worth gathering. And yes, SSL led me to the suggestion.
--
Daniel Ruggeri
imagine someone (or thing) would go muck with
that file... but stranger things have happened on MY file systems :-)
--
Daniel Ruggeri
a great feature...
(yes, I'm guilty in not testing out the latest trunk patches and
providing feedback - I had planned to do that last week... and this
week... and probably next week)
--
Daniel Ruggeri
On 11/13/2013 11:03 AM, Jim Jagielski wrote:
[X] +1: Good to go
[ ] +0: meh
[ ] -1: Danger Will Robinson. And why.
Verified on Debian 7.0 wheezy w/ openssl 0.9.8 and php 5.3 as
accompaniments
--
Daniel Ruggeri
27.81 311.00 77.92%
Req/Sec 183.46 32.59 369.00 72.44%
Req/Sec 176.81 28.18 325.00 71.99%
Three samples with 30 second tests is far from scientific, but I think
illustrates general timings (and, more importantly, that it works!).
--
Daniel Ruggeri
On 11/14/2013 9
Oops - I copypasta'd the per-thread stats. Total stats for the test follow:
httpd:
Requests/sec: 4633.17
Requests/sec: 4664.49
Requests/sec: 4657.63
nginx:
Requests/sec: 5701.16
Requests/sec: 5798.08
Requests/sec: 5584.60
--
Daniel Ruggeri
On 11/18/2013 1:09 PM, Daniel Ruggeri wrote
I tested the original
patch with (to keep everything apples to apples).
I'll jump in to take a look at this when time is available (next week?)
but would like to fish for any immediate thoughts in the mean time.
--
Daniel Ruggeri
On 11/18/2013 1:11 PM, Daniel Ruggeri wrote:
Oops - I copypasta'd
makes
sense if
* we can reuse the address.
I'll have to see what the delta with both patches applied turns out to be...
--
Daniel Ruggeri
UDS patch + r1543174:
Requests/sec: 3774.41
Requests/sec: 3878.02
Requests/sec: 3852.34
Will try to look into this next week...
--
Daniel Ruggeri
On 11/18/2013 6:37 PM, Daniel Ruggeri wrote:
On 11/18/2013 3:38 PM, Jim Jagielski wrote:
Can you retry with this applied:
https
.
--
Daniel Ruggeri
On 11/19/2013 1:43 PM, Jim Jagielski wrote:
OK... the DNS lookup code seems to have changed between 2.4.6 and 2.4.7:
https://svn.apache.org/viewvc?view=revisionrevision=1511313
So I'm wondering if there's something there.
over and send that instead.
--
Daniel Ruggeri
On 11/22/2013 10:38 AM, Jim Jagielski wrote:
Any luck with generating the diff yet?
On Nov 19, 2013, at 3:08 PM, Jim Jagielski j...@jagunet.com wrote:
The main thing is that it would be interesting to see
the diffs between '2.4.6 w the (several
on the frontend targeting a small
Node.js backend application... I don't suspect the application is
skewing the results because of how consistent the results have been, but
I may just remove that from the equation to be absolutely sure.
--
Daniel Ruggeri
On 12/2/2013 8:14 AM, Jim Jagielski wrote
as well as the string
comparison in the critical path is the most likely culprit there... but
that's old hat anyway.
So, in short, my past test cases were invalid because they included
other bottlenecks. Sorry for unnecessary noise!
--
Daniel Ruggeri
On 12/5/2013 6:54 AM, Jim Jagielski wrote:
My
.
--
Daniel Ruggeri
On 12/5/2013 6:17 PM, Daniel Ruggeri wrote:
On 11/14/2013 5:54 AM, Joe Orton wrote:
a) people who want the ability to do filesystem backups without exposing
private keys to the set of admins who can read such backups; or e.g.
stick keys on NFS mounts, a similar requirement there.
b) people
, so it is likely that no one use it
- apparently it is equivalent to ProxyMatch
+1
--
Daniel Ruggeri
On 1/6/2014 11:58 AM, Jim Jagielski wrote:
nuff said :)
One more vote for the UDS patch would be appreciated if anyone could
spare a moment to have a look. Happy New Year all, BTW.
--
Daniel Ruggeri
assuming SSL_CLIENT_S_DN_n == SSL_CLIENT_S_DN. Would that be the
case? ...or are you counting to n from the other direction?
--
Daniel Ruggeri
FYI, I also floated a few patches here that apply directly to 2.4.6
which includes the (many) proposed 2.4.7 patches.
--
Daniel Ruggeri
On 1/21/2014 8:27 AM, Yann Ylavic wrote:
Hi,
please have a look at
https://issues.apache.org/bugzilla/show_bug.cgi?id=54101#c19 where a
patch is available
On 1/22/2014 5:48 AM, Juan José Medina Godoy wrote:
Do you think that approach is safe or is it likely to break at some
point? (relaying on the workers being located by url in that way,
without having to provide the socket in the rewrite)
Seems safe... and quite clever, actually.
--
Daniel
On 2/17/2014 11:28 AM, Daniel Gruno wrote:
Welcome aboard, and well deserved!!
With regards,
Daniel.
welcome++
(from another Daniel)
See you in Denver
-starting Application
Servers out there.
Thank you kindly for your time
-Daniel Ruggeri
.
Once that happens, the bug will be closed. Is this accurate?
Thank you for your time answering my simple question
-Daniel Ruggeri
apologize for
polluting the general mailing list with basic process questions.
--
Daniel Ruggeri
Sander Temme wrote:
On Apr 20, 2010, at 12:41 PM, Daniel Ruggeri wrote:
Hi all;
I have a little confusion regarding the FixedInTrunk keyword when applied to a
bug. What does it mean? My
having my submitted
patch added to the STATUS file in the 2.2 branch after it has been
FixedInTrunk?
Thanks
-Daniel Ruggeri
Daniel Ruggeri wrote:
Sander/All;
Oh, I see. I guess my next question is how the issue fixed in trunk
gets proposed in the STATUS list. I submitted a patch
+statuses are found
+PR: 48939
+Trunk patch: http://svn.apache.org/viewvc?rev=930125view=rev
+2.2.x patch: https://issues.apache.org/bugzilla/attachment.cgi?id=25153
+
PATCHES/ISSUES THAT ARE STALLED
* core: Support wildcards in both the directory and file components of
--
--
Daniel
the attention
of (Jeff and) the committers in hopes of getting the needed votes. I
would appreciate it if anyone could take a moment to review or offer
questions/comments.
Thank you for your time.
--
Daniel Ruggeri
on the right track, but there are qualms with the
implementation, I'll happily adjust the work.
Thanks
--
Daniel Ruggeri
forward (or stay in STATUS).
--
Daniel Ruggeri
On 7/1/2010 1:46 AM, jean-frederic clere wrote:
On 07/01/2010 03:14 AM, Daniel Ruggeri wrote:
On 6/30/2010 7:34 AM, jean-frederic clere wrote:
On 06/30/2010 04:17 AM, William A. Rowe Jr. wrote:
Yet again, in class another student pointed out that the
Enabled/Disabled
choice
are separate
modules there) and have both committed for future versions.
Thank you for your time
-Daniel Ruggeri
as a
replacement.
Jeff;
I will gladly take the tasks you mentioned in STATUS as soon as we
have consensus on the name of the directive. It may be a lofty goal but
it would be great if this could make it into 2.2.16.
--
Daniel Ruggeri
.
--
Daniel Ruggeri
patch: http://svn.apache.org/viewvc?rev=930125view=rev
-2.2.x patch: https://issues.apache.org/bugzilla/attachment.cgi?id=25153
+2.2.x patch: https://issues.apache.org/bugzilla/attachment.cgi?id=25788
Submitted by: Daniel Ruggeri DRuggeri primary.net
+1: niq, jim
-trawick
that is not currently available?
--
Daniel Ruggeri
1 - 100 of 417 matches
Mail list logo