[Bug 215605] [PATCH] www/mod_qos: update to 11.36
bugzilla-noreply at freebsd.org
bugzilla-noreply at freebsd.org
Tue Dec 27 11:11:14 UTC 2016
https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=215605
Bug ID: 215605
Summary: [PATCH] www/mod_qos: update to 11.36
Product: Ports & Packages
Version: Latest
Hardware: Any
OS: Any
Status: New
Keywords: patch
Severity: Affects Only Me
Priority: ---
Component: Individual Port(s)
Assignee: freebsd-ports-bugs at FreeBSD.org
Reporter: fax at nohik.ee
Keywords: patch
Created attachment 178320
--> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=178320&action=edit
Maintainer update for www/mod_qos from 11.31 to 11.36
mod_qos update from 11.31 to version 11.36
Changes between releases:
- Fixed: moves code from "process connection" hook to the "pre
connection" hook for Apache 2.4 compatibility and higher efficiency.
- Lower severity of message 036 to critical.
- Fixed: potential segfault by mod_ssl in ssl_io_filter_disable()
when closing a connection after a failed SSL handshake.
- New variable QS_SetEnvIfResBodyIgnore which might be used to
deactivate QS_SetEnvIfResBody.
- mod_qos_ev: sets "v" if an IP is marked as VIP.
- QS_ClientLowPrio variable's value contains the status flag representing
the tracked attribues.
- Sets QS_IsVipRequest variable for marked IP addresses at connection
processing handler and propagetes it to every request.
- Fixed: message 045 (uri check ignores log-only mode).
- Header filter: accept reagion specific language codes in
Accept-Language request header by default.
- Compiles also against OpenSSL 1.1.0b.
--
You are receiving this mail because:
You are the assignee for the bug.
More information about the freebsd-ports-bugs
mailing list