http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3591
[EMAIL PROTECTED] changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|
Craig R. McClanahan wrote:
Yesterday, I added an update to Embedded.start() to set catalina.base
to
the value of catalina.home if it's not already set. That way, others
won't get bit by this one.
Yes, I saw the commit message in CVS, which hinted that I should do it
manually with RC1.
Pier Fumagalli wrote:
GOMEZ Henri [EMAIL PROTECTED] wrote:
Hi to all,
I take a look at mod_webapp and warp java,
and didn't find reference to SSL informations
forwarded from WebServer.
Should it be fixed before release since it
may break the spec ?
I could grab code from
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3581
[EMAIL PROTECTED] changed:
What|Removed |Added
Status|RESOLVED|REOPENED
OK, I checked the nightly build.
I have to say sorry because I found out another table tag that needs to
be fixed the same way. The one inside subsection also needs to be
changed to avoid clipping. I think I lost track of what I modified in
my first report. I should have used diff or
So, IMO, it's a win-win situation... JK can support all
web-servers and all
old protocols, it's tested, it works, we just need to make
it able to talk
the new AJPv14/WARP protocol and can be used as the strong
foundation.
WebApp will talk only AJPv14/WARP, based on APR, and only
ported to
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3600
Summary: /etc/rc.d scripts of the rpm
Product: Tomcat 3
Version: 3.3 Beta 2
Platform: PC
OS/Version: Linux
Status: NEW
Severity: Enhancement
Priority: Other
Where could we find even mod_webapp code ?
-
Henri Gomez ___[_]
EMAIL : [EMAIL PROTECTED](. .)
PGP KEY : 697ECEDD...oOOo..(_)..oOOo...
PGP Fingerprint : 9DF8 1EA8 ED53 2F39 DC9B 904A 364F 80E6
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3602
Summary: Tomcat is enabled by default after an rpm install
Product: Tomcat 3
Version: 3.3 Beta 2
Platform: Other
OS/Version: Linux
Status: NEW
Severity: Enhancement
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3602
--- Additional Comments From [EMAIL PROTECTED] 2001-09-14 01:15 ---
For security reasons services are not enabled by default on modern distributions.
It is not the case with the tomcat rpms.
Could this be changed ?
Hi man,
I'm learning to you.
What do you want exactly ?
Move tomcat configuration to /etc ?
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 14, 2001 10:13 AM
To: [EMAIL PROTECTED]
Subject: [Bug 3600] New: - /etc/rc.d scripts of the rpm
Another one related to rpm :)
What the problem having tomcat enable after
a rpm install ?
That's exactly the same thing when you install
Apache on sendmail !!!
-
Henri Gomez ___[_]
EMAIL : [EMAIL PROTECTED](. .)
PGP KEY : 697ECEDD
Forwarded to tomcat-dev !!!
-Original Message-
From: Jesse Farley [mailto:[EMAIL PROTECTED]]
Sent: Thursday, September 13, 2001 9:18 PM
To: [EMAIL PROTECTED]
Subject: configuration of mod_jk and tomcat-4.0
Greetings,
First, I'd normally opt to figure out this problem by myself, but
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3604
Summary: /etc/rc.d scripts and stop command
Product: Tomcat 3
Version: 3.3 Beta 2
Platform: PC
OS/Version: Linux
Status: NEW
Severity: Normal
Priority: Other
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a look at
jk in J-T-C since it also handle the SSL_KEY_SIZE.
Yes, will do... Check out # 3510...
You'll have also to grab other information
like cipher suite used and bit size of the algorithm
SPEC 2.3 : SRV.4.7
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3606
Summary: Tomcat rpms are not FHS compliant
Product: Tomcat 3
Version: 3.3 Beta 2
Platform: PC
OS/Version: Linux
Status: NEW
Severity: Normal
Priority: Other
Could you stop mark as bug things which are only
just requests of features.
Thanks
-
Henri Gomez ___[_]
EMAIL : [EMAIL PROTECTED](. .)
PGP KEY : 697ECEDD...oOOo..(_)..oOOo...
PGP Fingerprint : 9DF8 1EA8 ED53 2F39 DC9B 904A 364F 80E6
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3606
[EMAIL PROTECTED] changed:
What|Removed |Added
Severity|Normal |Enhancement
GOMEZ Henri wrote:
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a look at
jk in J-T-C since it also handle the SSL_KEY_SIZE.
Yes, will do... Check out # 3510...
You'll have also to grab other information
like cipher suite used and bit size of the
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3600
--- Additional Comments From [EMAIL PROTECTED] 2001-09-14 03:29 ---
Created an attachment (id=536)
Proposed /etc/rc.d/init.d/tomcat
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3600
--- Additional Comments From [EMAIL PROTECTED] 2001-09-14 03:30 ---
Created an attachment (id=537)
Proposed /etc/tomcat.conf
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3608
Summary: invalid parameter parsing
Product: Tomcat 3
Version: 3.3 Beta 2
Platform: Other
OS/Version: Other
Status: NEW
Severity: Normal
Priority: Other
If debugging is enabled and sw is null, it blows up (NPE). Patch
follows.
Bojan
---
/home/groups/devel/jakarta/jakarta-tomcat/src/facade22/org/apache/tomcat/facade/ServletHandler.java
Mon Jul 23 09:00:00 2001
+++ jakarta-tomcat/src/facade22/org/apache/tomcat/facade/ServletHandler.javaFri
jfclere 01/09/14 04:15:00
Modified:jk/java/org/apache/ajp Ajp13.java
jk/native/common jk_ajp_common.c
Log:
Arrange the KEY_SIZE_ATTR. (Note it is for TC4.0).
Revision ChangesPath
1.12 +5 -2
Clere, Jean-Frederic wrote:
GOMEZ Henri wrote:
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a look at
jk in J-T-C since it also handle the SSL_KEY_SIZE.
Yes, will do... Check out # 3510...
You'll have also to grab other information
like
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3608
[EMAIL PROTECTED] changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|
larryi 01/09/14 05:09:27
Modified:src/facade22/org/apache/tomcat/facade ServletHandler.java
Log:
Avoid NPE.
Submitted by: Bojan Smojver [EMAIL PROTECTED]
Revision ChangesPath
1.16 +1 -1
About SSL_KEY_SIZE I have just noted I have committed a
wrong code... I will
redo the things in some minutes ;-(
I had to add SL_A_SSL_KEYSIZE from the apj14 protocol to apj13
otherwise we
cannot fill javax.servlet.request.key_size.
Warning, original ajp13 didn't support SSL_A_SSL_KEYSIZE
Warning,
Read my previous mail about adding new features to AJP13
which are unknown to current Tomcat 3.2/3.3
-
Henri Gomez ___[_]
EMAIL : [EMAIL PROTECTED](. .)
PGP KEY : 697ECEDD...oOOo..(_)..oOOo...
PGP Fingerprint : 9DF8 1EA8 ED53
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3589
[EMAIL PROTECTED] changed:
What|Removed |Added
Status|NEW |RESOLVED
Resolution|
GOMEZ Henri wrote:
About SSL_KEY_SIZE I have just noted I have committed a
wrong code... I will
redo the things in some minutes ;-(
I had to add SL_A_SSL_KEYSIZE from the apj14 protocol to apj13
otherwise we
cannot fill javax.servlet.request.key_size.
Warning, original ajp13 didn't
Should we had this attribute to JT also to avoid broke
TC 3.2/3.3 when using mod_jk from JTC ?
Would it be possible to ignore this attribute in TC 3.2/3.3?
The problem is that the current ajp13 java implementation
TC 3.2/3.3 ignore this attribute and will fail to decode the
stream and will
Hey
FYI, I just committed new Catalina integration code to JBoss' CVS. This
will make it possible to use Catalina/Tomcat4 from within JBoss for
deployment of WAR's or EAR's.
See jboss-dev mailing list (archives are available) for slightly more
info. There will probably not be a binary with this
GOMEZ Henri wrote:
Should we had this attribute to JT also to avoid broke
TC 3.2/3.3 when using mod_jk from JTC ?
Would it be possible to ignore this attribute in TC 3.2/3.3?
The problem is that the current ajp13 java implementation
TC 3.2/3.3 ignore this attribute and will fail to
jean-frederic clere [EMAIL PROTECTED] wrote:
Pier Fumagalli wrote:
GOMEZ Henri [EMAIL PROTECTED] wrote:
Hi to all,
I take a look at mod_webapp and warp java,
and didn't find reference to SSL informations
forwarded from WebServer.
Should it be fixed before release since it
may
+ForwardSSLKeySize
You mean adding a configuration parameter like
JkForwardSSLKeySize with default
value Off?
Yes
GOMEZ Henri [EMAIL PROTECTED] wrote:
So, IMO, it's a win-win situation... JK can support all
web-servers and all
old protocols, it's tested, it works, we just need to make
it able to talk
the new AJPv14/WARP protocol and can be used as the strong
foundation.
WebApp will talk only
GOMEZ Henri [EMAIL PROTECTED] wrote:
Where could we find even mod_webapp code ?
The JAVA code is compiled in... The C code comes from J-T-C and there's not
yet a tag... There are few NASTY-NASTY-NASTY bugs I need to fix before going
out...
Pier
GOMEZ Henri [EMAIL PROTECTED] wrote:
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a look at
jk in J-T-C since it also handle the SSL_KEY_SIZE.
Yes, will do... Check out # 3510...
You'll have also to grab other information
like cipher suite used and bit
jean-frederic clere [EMAIL PROTECTED] wrote:
GOMEZ Henri wrote:
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a look at
jk in J-T-C since it also handle the SSL_KEY_SIZE.
Yes, will do... Check out # 3510...
You'll have also to grab other information
jean-frederic clere [EMAIL PROTECTED] wrote:
Pier Fumagalli wrote:
GOMEZ Henri [EMAIL PROTECTED] wrote:
Hi to all,
I take a look at mod_webapp and warp java,
and didn't find reference to SSL informations
forwarded from WebServer.
Should it be fixed before release since it
may
I think there a little more missing:
- SSL_CLIENT_CERT_CHAIN_n (n is a number).
- The user certificate object stored by mod_jk is a String not a
X509Certificate
- I have prepared a patch for it -
Patch for WebApp or JK, BTW? I'm starting to get confused :)
JF talk about mod_jk and also
This is a walkaround patch for the Netscape Navigator's the following
problem:
If a Web server sends a redirect reply (302) with charset, Netscape
Navigator 4.x misrecognizes Web page's charset as the redirect
header's charset, not the Web page's charset.
For example, Tomcat 4 redirect a
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3611. ANY REPLY MADE TO THIS
MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG
DATABASE.
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3611.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
[EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3611.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG
Le 2001.09.14 10:20, GOMEZ Henri a écrit :
Hi man,
I'm learning to you.
What do you want exactly ?
Move tomcat configuration to /etc ?
Well that would be also great (missed this one, damned:)
What this bug is about is just moving
***
Le 2001.09.14 10:21, GOMEZ Henri a écrit :
Another one related to rpm :)
That's my day, sorry. Been thinking about reporting this for
some time:)
What the problem having tomcat enable after
a rpm install ?
Bad for security ie you might do a batch install of a lot of
rpms and want to
Le 2001.09.14 11:10, GOMEZ Henri a écrit :
Could you stop mark as bug things which are only
just requests of features.
Sorry, forgot about this one (did so for the others, though)
--
Nicolas Mailhot
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3612.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
I am running Solaris 2.6 and iPlanet Web Server 4.1. I have compiled the
nsapi_redirector.so and am now trying to get the servlet piece working. I
would like to have Tomcat 3.2.3 running on a DIFFERENT machine process the
servlet requests and was wondering if this was possible? Does anyone
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3613.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
GOMEZ Henri wrote:
I think there a little more missing:
- SSL_CLIENT_CERT_CHAIN_n (n is a number).
- The user certificate object stored by mod_jk is a String not a
X509Certificate
- I have prepared a patch for it -
Patch for WebApp or JK, BTW? I'm starting to get confused :)
Pier Fumagalli wrote:
[EMAIL PROTECTED] [EMAIL PROTECTED] wrote:
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3611.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED
GOMEZ Henri wrote:
WebApp will talk only AJPv14/WARP, based on APR, and only
ported to Apache
1.3 and 2.0, when we're happy with it, with the 3.3
implementation of
AJPv14/WARP, with the new/revised/corrected APR-based API,
we can start
porting all other stuff over, and in 12 years
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3614.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
On Fri, 14 Sep 2001, jean-frederic clere wrote:
Maybe to you, but buddy Costin doesn't like it... :)
No I'm sure Costin like the merge, and I like
you all comment the following timing :
I like the merge, I don't like the idea of moving all jk features
over to webapp ( and not on the
On Fri, 14 Sep 2001, GOMEZ Henri wrote:
Date: Fri, 14 Sep 2001 10:37:47 +0200
From: GOMEZ Henri [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: RE: mod_webapp/SSL and TC 4.0
It should works at least for Apache 1.3/2.0.
To follow the Servlet 2.3, take a
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3617.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
hgomez 01/09/14 08:54:26
Modified:src/share/org/apache/tomcat/modules/server
PoolTcpConnector.java
Log:
Typo fix (it's cosmetic Nacho)
Revision ChangesPath
1.10 +2 -2
hgomez 01/09/14 08:57:45
Modified:src/share/org/apache/tomcat/modules/server Ajp13Packet.java
Log:
Fix for bug #2927.
When a non ajp13 packet header is sent on an ajp13
connection, we don't try to dump it (it's just only 4 bytes !=)
Revision ChangesPath
1.4
hgomez 01/09/14 08:58:58
Modified:src/share/org/apache/tomcat/modules/server
Ajp13Interceptor.java
Log:
Pass debug flag from data set in server.xml to
Ajp13/Ajp13Request. Very usefull in debug stage
Revision ChangesPath
1.15 +16 -6
hgomez 01/09/14 09:01:21
Modified:src/share/org/apache/tomcat/modules/server Ajp13.java
Log:
Solid reworks to better handle comm part.
We don't try to handle partial packet, use
of readN to ensure having all data in packets
(even in header which is 4 bytes long)
You can hunt me down, just use tranquilizers when you find me :-)
All of the modifications for graceful restart were done in the 3.3 codebase.
Most of them were done by Henri Gomez. I just put in a couple of patches
for error conditions. 3.2.x still doesn't have these fixes in them, but they
[tomcat 4.0-rc2] It's possible for the session expiring thread to not
catch an exception - thrown within session.expire - which then stops
this thread and means all other sessions are not expired (forever!)
at
You can hunt me down, just use tranquilizers when you find me :-)
All of the modifications for graceful restart were done in
the 3.3 codebase.
Most of them were done by Henri Gomez. I just put in a couple
of patches
for error conditions. 3.2.x still doesn't have these fixes in
them, but
I know this probably isn't the correct place to ask this, but I reckon you
guys are probably the most qualified to answer it:
Am I allowed to include and forward between servlet contexts?
i.e. Am I allowed to write a method like this:
private void include(ServletRequest request,
On Fri, 14 Sep 2001, David Lecomber wrote:
Date: Fri, 14 Sep 2001 17:21:06 +0100
From: David Lecomber [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED], [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: StandardManager : Session expiry thread.
[tomcat 4.0-rc2] It's possible for the session
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3612.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
remm01/09/14 09:45:33
Modified:catalina/src/share/org/apache/catalina/servlets
WebdavServlet.java
Log:
- Forgot to backport some code from Slide.
- Now, the protocol name is not hardcoded when parsing a destination header,
so it fixes problems when
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=3613.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND
INSERTED IN THE BUG DATABASE.
hgomez 01/09/14 10:45:15
Modified:jk/native/apache-1.3 mod_jk.c
jk/native/common jk_global.h
Log:
Add JkSetOptions
Revision ChangesPath
1.15 +111 -40 jakarta-tomcat-connectors/jk/native/apache-1.3/mod_jk.c
Index: mod_jk.c
hgomez 01/09/14 10:47:58
Modified:src/native/mod_jk/apache1.3 mod_jk.c
src/native/mod_jk/common jk_global.h jk_service.h
Log:
Add JkOptions Directive.
You could use now +ForwardUnparsedUri to send URI as unparsed
to follow spec or -ForwardUnparsedUri to send URI
craigmcc01/09/14 10:48:59
Modified:catalina/src/share/org/apache/catalina/session
LocalStrings.properties StandardManager.java
Log:
Catch and log exceptions thrown by session.expire() in the manager's
expiration thread, to avoid such an exception causing
Oups in fact it JkOptions :::
with options :
+ForwardUnparsed = Forward URI as unparsed, spec compliant but broke
mod_rewrite
-ForwardUnparsed = Forward URI normally, less spec compliant but
mod_rewrite compatible
+ForwardSSLKeySize = Forward SSL Key Size, to follow 2.3 specs but may
broke
GOMEZ Henri [EMAIL PROTECTED] wrote:
1) Release TC 3.3/4.0
DOH! :)
2) Start to think on how to merge AJP14/WARP
Let me know when
3) Add the AJP14-WARP protocol to mod_jk and mod_webapp (adaptation)
I'll keep track of the protocol modifications in TC4 and WebApp
4) Add APR to
craigmcc01/09/14 13:01:21
Modified:.RELEASE-PLAN-4.0.txt
catalina/src/bin catalina.sh
Log:
Eliminate use of pushd and popd in the implementation of the debug
option, because it is not supported on all shells.
Submitted by: Patrick Luby [EMAIL
craigmcc01/09/14 13:08:01
Modified:webapps/tomcat-docs manager-howto.xml
Log:
Correct the syntax of jar: URLs that reference a local or remote web
application archive (WAR) file.
Submitted by: Jeff Turner [EMAIL PROTECTED]
Revision ChangesPath
1.4 +5 -2
craigmcc01/09/14 13:19:10
Modified:webapps/tomcat-docs tomcat-docs.xsl
Log:
Remove remaining width=100% declarations on inner table elements, in
the section and subsection templates. This will have negative visual
impacts, but only in the very few cases where there is less
craigmcc01/09/14 13:30:01
Modified:catalina/src/share/org/apache/catalina/core
StandardWrapperValve.java
Log:
Do not set a character type in the default page created for an HTTP status
code. In particular, this avoids problems with Netscape Navigator 4.x
Sounds like a better place to ask would be TOMCAT-USER.
On Fri, 14 Sep 2001, Colin Wilson-Salt wrote:
Date: Fri, 14 Sep 2001 17:26:32 +0100
From: Colin Wilson-Salt [EMAIL PROTECTED]
Reply-To: [EMAIL PROTECTED]
To: [EMAIL PROTECTED]
Subject: Specification question.
I know this probably
Dave Oxley [EMAIL PROTECTED] wrote:
Hi all,
Here is the code for the TC Service Manager. Would anyone like to check it
into jakarta-tomcat-service? ...or even just take a look at it.
Dave
[EMAIL PROTECTED]
Dave, I'm going to check it out after I finish tackling my WebApp bugs
A big thanks to Craig which give the good information
on how to use mod_jk with Tomcat 4.0
-Original Message-
From: Craig R. McClanahan [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 14, 2001 10:23 PM
To: [EMAIL PROTECTED]
Cc: [EMAIL PROTECTED]; [EMAIL PROTECTED]
Subject: Re: FW:
hgomez 01/09/14 15:30:05
Modified:jk/native/common jk_ajp_common.c jk_ajp_common.h
Log:
Update information on when SSL_KEY_SIZE is
sent to Tomcat Server via the use of
JkOptions +ForwardKeySize
Revision ChangesPath
1.12 +2 -2
hgomez 01/09/14 15:31:36
Modified:jk/native/apache-1.3 mod_jk.c
Log:
Complete the support of chunk encoding and
add the required content-length which is
now required by recent ajp13 present in JT
and which will soon be ported to JTC for
at least TC 4.0 use (candidate here
hgomez 01/09/14 15:32:19
Modified:jk/native/apache-2.0 mod_jk.c
Log:
Complete the support of chunk encoding and
add the required content-length which is
now required by recent ajp13 present in JT
and which will soon be ported to JTC for
at least TC 4.0 use (candidate here
hgomez 01/09/14 15:34:11
Modified:jk/native/common jk_ajp_common.h
Log:
Fix the double /* which could broke some C compilers
Revision ChangesPath
1.9 +2 -2 jakarta-tomcat-connectors/jk/native/common/jk_ajp_common.h
Index: jk_ajp_common.h
I feel we'll need some schemas on mod_jk workers
and webapp broker to see how to better understand
them :)
-
Henri Gomez ___[_]
EMAIL : [EMAIL PROTECTED](. .)
PGP KEY : 697ECEDD...oOOo..(_)..oOOo...
PGP Fingerprint : 9DF8 1EA8 ED53 2F39 DC9B
This patch fixes #3079
misto% runsocks cvs diff -u Parser.java
Index: Parser.java
===
RCS file:
/home/cvspublic/jakarta-tomcat-4.0/jasper/src/share/org/apache/jasper/compiler/P
arser.java,v
retrieving revision 1.12
diff -u -r1.12
Hi to all,
I've just commited updated code for Apache 1.3/2.0
I will need a serious code review on Apache 2.0 part
and particulary the ws_read() which was grabbed from
1.3 and works (at least on Apache 2.0.24) but may
be optimized...
===
static int JK_METHOD ws_read(jk_ws_service_t *s,
Pier,
Yeah, it's all in C++. Sorry about that :( It's very much for Windows only
and it doesn't talk to Tomcat directly, only the Windows Service API. In
fact it's hardly Tomcat specific at all.
I have been using it this week at work and find it really useful to monitor
the state of my
On Sat, Sep 15, 2001 at 12:50:27AM +0200, GOMEZ Henri wrote:
Hi to all,
I've just commited updated code for Apache 1.3/2.0
I will need a serious code review on Apache 2.0 part
and particulary the ws_read() which was grabbed from
1.3 and works (at least on Apache 2.0.24) but may
be
1798 Tomcat 3.2.2b5 with Apache and ajp13 stops responding after
This one is very difficult to reproduce (I never succeed).
We need more information on configuration. May be related with
CHUNKED. I'd like to see bug reporter to test against latest TC 3.3
Did your attempts include 3.2.2
Hi,
Shouldn't content-length be Content-Length? Or are the headers already
forced to lowercase elsewhere? Or how about a case insensitive comparison
to be nice
-David
-Original Message-
From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 14, 2001 3:32 PM
OK, Sorry. It's right there in front of me! Been a long week ...
-David
-Original Message-
From: Schreibman, David [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 14, 2001 4:07 PM
To: '[EMAIL PROTECTED]';
[EMAIL PROTECTED]
Subject: RE: cvs commit:
Hi to all,
I've just commited updated code for Apache 1.3/2.0
I will need a serious code review on Apache 2.0 part
and particulary the ws_read() which was grabbed from
1.3 and works (at least on Apache 2.0.24) but may
be optimized...
snip, snip
ws_write() could need also a serious
OK, Sorry. It's right there in front of me! Been a long week ...
For some it was even longer...
What do you think of the CHUNK code, David ?
-David
-Original Message-
From: Schreibman, David [mailto:[EMAIL PROTECTED]]
Sent: Friday, September 14, 2001 4:07 PM
To: '[EMAIL
On Fri, 14 Sep 2001, Justin Erenkrantz wrote:
Since you have a common infrastructure via callbacks, I don't think
you can take advantage of a lot of the new features in Apache 2.0.
Oh, well. -- justin
Well, we should be able to. We can just add more callbacks - and make sure
the code that
I don't think keeping everything as dumb as the dumbest server
is a good
idea - but the big problem is making sure those features don't
interfere
too much with the servlet spec ( see the mod_rewrite discussion ).
The mod_rewrite case is now handled elegantly via JkOptions :)
Sorry for the late reply. I was offline for a few days. More below ...
Craig R. McClanahan wrote:
[snip]
DECISION 1 - WHAT SEEDING MECHANISMS SHOULD WE SUPPORT?
(1A) Default seeding of java.security.SecureRandom (time consuming but
reasonably secure)
(1B) Current mechanism of
1 - 100 of 123 matches
Mail list logo