Changeset 1259 for trunk/server/common/patches
- Timestamp:
- Jul 9, 2009, 3:48:21 PM (15 years ago)
- Location:
- trunk
- Files:
-
- 4 edited
- 4 copied
Legend:
- Unmodified
- Added
- Removed
-
trunk
-
Property
svn:mergeinfo
set to
False
/branches/fc11-dev merged eligible
-
Property
svn:mergeinfo
set to
False
-
trunk/server/common/patches/httpd-2.2.x-sni.patch
r1115 r1259 971 971 Index: httpd-2.2.11/docs/manual/mod/mod_ssl.html.en 972 972 =================================================================== 973 --- httpd-2.2.11/docs/manual/mod/mod_ssl.html.en (revision 768863)974 +++ httpd-2.2.11/docs/manual/mod/mod_ssl.html.en (working copy)973 --- httpd-2.2.11/docs/manual/mod/mod_ssl.html.en 2008-08-20 19:02:48.000000000 -0400 974 +++ httpd-2.2.11/docs/manual/mod/mod_ssl.html.en 2009-06-03 05:33:23.000000000 -0400 975 975 @@ -75,6 +75,7 @@ to provide the cryptography engine.</p> 976 976 <li><img alt="" src="../images/down.gif" /> <a href="#sslrequiressl">SSLRequireSSL</a></li> … … 1026 1026 +<p class="apache">Copyright 2009 The Apache Software Foundation.<br />Licensed under the <a href="http://www.apache.org/licenses/LICENSE-2.0">Apache License, Version 2.0</a>.</p> 1027 1027 <p class="menu"><a href="../mod/">Modules</a> | <a href="../mod/directives.html">Directives</a> | <a href="../faq/">FAQ</a> | <a href="../glossary.html">Glossary</a> | <a href="../sitemap.html">Sitemap</a></p></div> 1028 </body></html> 1028 -</body></html> 1029 \ No newline at end of file 1030 +</body></html> -
trunk/server/common/patches/httpd-suexec-scripts.patch
r1169 r1259 45 45 APACHE_HELP_STRING(--with-suexec-docroot,SuExec root directory),[ 46 46 AC_DEFINE_UNQUOTED(AP_DOC_ROOT, "$withval", [SuExec root directory] ) ] ) 47 --- httpd-2.2. 2/support/suexec.c.old 2006-04-21 21:53:06.000000000 -040048 +++ httpd-2.2. 2/support/suexec.c 2007-05-22 10:32:04.000000000 -040047 --- httpd-2.2.11/support/suexec.c.old 2008-11-30 10:47:31.000000000 -0500 48 +++ httpd-2.2.11/support/suexec.c 2009-06-08 09:02:17.000000000 -0400 49 49 @@ -30,6 +30,9 @@ 50 50 * … … 57 57 #include "ap_config.h" 58 58 #include "suexec.h" 59 @@ -46,6 +4 8,7 @@59 @@ -46,6 +49,7 @@ 60 60 #include <stdio.h> 61 61 #include <stdarg.h> … … 65 65 #ifdef HAVE_PWD_H 66 66 #include <pwd.h> 67 @@ -95,6 +9 8,7 @@67 @@ -95,6 +99,7 @@ 68 68 { 69 69 /* variable name starts with */ … … 146 146 clean_env(); 147 147 + setenv("JAVA_TOOL_OPTIONS", "-Xmx128M", 1); /* scripts.mit.edu local hack */ 148 148 149 149 prog = argv[0]; 150 150 /* 151 @@ -350,6 +4 06,20 @@151 @@ -350,6 +414,20 @@ 152 152 #endif /*_OSD_POSIX*/ 153 153 … … 170 170 * or attempts to back up out of the current directory, 171 171 * to protect against attacks. If any are 172 @@ -371,6 +44 1,7 @@172 @@ -371,6 +449,7 @@ 173 173 userdir = 1; 174 174 } … … 178 178 * Error out if the target username is invalid. 179 179 */ 180 @@ -45 0,7 +521,7 @@180 @@ -452,7 +531,7 @@ 181 181 * Error out if attempt is made to execute as root or as 182 182 * a UID less than AP_UID_MIN. Tsk tsk. … … 187 187 exit(107); 188 188 } 189 @@ -48 2,6 +553,21 @@189 @@ -484,6 +563,21 @@ 190 190 log_err("failed to setuid (%ld: %s)\n", uid, cmd); 191 191 exit(110); … … 209 209 /* 210 210 * Get the current working directory, as well as the proper 211 @@ -50 4,6 +588,21 @@211 @@ -506,6 +600,21 @@ 212 212 log_err("cannot get docroot information (%s)\n", target_homedir); 213 213 exit(112); … … 231 231 else { 232 232 if (((chdir(AP_DOC_ROOT)) != 0) || 233 @@ -53 0,15 +629,17 @@233 @@ -532,15 +641,17 @@ 234 234 /* 235 235 * Error out if cwd is writable by others. … … 250 250 exit(117); 251 251 } 252 @@ -54 6,10 +647,12 @@252 @@ -548,10 +659,12 @@ 253 253 /* 254 254 * Error out if the program is writable by others. … … 263 263 /* 264 264 * Error out if the file is setuid or setgid. 265 @@ -56 3,6 +666,7 @@265 @@ -565,6 +678,7 @@ 266 266 * Error out if the target name/group is different from 267 267 * the name/group of the cwd or the program. … … 271 271 (gid != dir_info.st_gid) || 272 272 (uid != prg_info.st_uid) || 273 @@ -57 4,12 +678,14@@273 @@ -576,16 +690,33 @@ 274 274 prg_info.st_uid, prg_info.st_gid); 275 275 exit(120); … … 287 287 exit(121); 288 288 } 289 @@ -606,6 +711,21 @@290 exit(122);291 }292 289 293 290 + if (is_static_extension(cmd)) { 294 291 + argv[2] = STATIC_CAT_PATH; 295 292 + execv(STATIC_CAT_PATH, &argv[2]); 296 + 297 + 293 + log_err("(%d)%s: static_cat exec failed (%s)\n", errno, strerror(errno), argv[2]); 294 + exit(255); 298 295 + } 299 296 + if (is_php_extension(cmd)) { … … 302 299 + argv[2] = "-f"; 303 300 + execv(PHP_PATH, &argv[1]); 304 + 305 + 306 + } 307 + 308 /*309 * Execute the command, replacing our image with its own.310 * /301 + log_err("(%d)%s: php exec failed (%s)\n", errno, strerror(errno), argv[2]); 302 + exit(255); 303 + } 304 + 305 #ifdef AP_SUEXEC_UMASK 306 /* 307 * umask() uses inverse logic; bits are CLEAR for allowed access. -
trunk/server/common/patches/openafs-scripts.patch
r1134 r1259 127 127 short multiPage; /* count of multi-page getpages in progress */ 128 128 #endif 129 + boolapache_access; /* whether or not Apache has access to a file */129 + int apache_access; /* whether or not Apache has access to a file */ 130 130 }; 131 131
Note: See TracChangeset
for help on using the changeset viewer.