[Bug 215605] [PATCH] www/mod_qos: update to 11.36

bugzilla-noreply at freebsd.org bugzilla-noreply at freebsd.org
Tue Dec 27 11:11:14 UTC 2016


https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=215605

            Bug ID: 215605
           Summary: [PATCH] www/mod_qos: update to 11.36
           Product: Ports & Packages
           Version: Latest
          Hardware: Any
                OS: Any
            Status: New
          Keywords: patch
          Severity: Affects Only Me
          Priority: ---
         Component: Individual Port(s)
          Assignee: freebsd-ports-bugs at FreeBSD.org
          Reporter: fax at nohik.ee
          Keywords: patch

Created attachment 178320
  --> https://bugs.freebsd.org/bugzilla/attachment.cgi?id=178320&action=edit
Maintainer update for www/mod_qos from 11.31 to 11.36

mod_qos update from 11.31 to version 11.36

Changes between releases:
 - Fixed: moves code from "process connection" hook to the "pre
   connection" hook for Apache 2.4 compatibility and higher efficiency.
 - Lower severity of message 036 to critical.
 - Fixed: potential segfault by mod_ssl in ssl_io_filter_disable()
   when closing a connection after a failed SSL handshake.
 - New variable QS_SetEnvIfResBodyIgnore which might be used to
   deactivate QS_SetEnvIfResBody.
 - mod_qos_ev: sets "v" if an IP is marked as VIP.
 - QS_ClientLowPrio variable's value contains the status flag representing
   the tracked attribues.
 - Sets QS_IsVipRequest variable for marked IP addresses at connection
   processing handler and propagetes it to every request.
 - Fixed: message 045 (uri check ignores log-only mode).
 - Header filter: accept reagion specific language codes in
   Accept-Language request header by default.
 - Compiles also against OpenSSL 1.1.0b.

-- 
You are receiving this mail because:
You are the assignee for the bug.


More information about the freebsd-ports-bugs mailing list