>> >7. Evaluate whether anything should be done to deal with the use of
>> >non-thread-safe DateFormat and related classes.
>> 
>> The "Date" used in Http10 connector response, is allready 
>> handled by stuff I commited some time ago which use a speed hack 
>> and return allready processed date String if it was processed
>> in the same second removing need to use SimpeDateFormat at each hit.
>> 
>> format1123() in org\apache\tomcat\util\buf\DateTool
>> 
>> But the request.getDateHeader("Date") in facade is still 
>> using DateTool.parseDate(value) in DateTool which need
>> to be synchronized.
>> 
>> Question: should we sync in facade or in DateTool ?
>
>My initial preference is in DateTool. However, I may be
>unaware of some pro's or con's.

Bill and Costin seems to be on this one, I'll let them 
fix it :

>> >1798  Tomcat 3.2.2b5 with Apache and ajp13 stops responding after  
>> 
>> This one is very difficult to reproduce (I never succeed).
>> We need more information on configuration. May be related with
>> CHUNKED. I'd like to see bug reporter to test against latest TC 3.3
>
>Did your attempts include 3.2.2 or 3.2.3.  If so, I'll resolve the
>bug reports as "worksforme".  Otherwise, I'll just add a note that
>it couldn't be reproduced in 3.3 and is assumed fixed.

I'll create a test servlet which will wait 5-10 seconds and launch
an ab against tomcat to see if the problems still appears.....

>> >8. We need to remove or optionally disable the shutdown support in
>> >Ajp13Interceptor.  This allows configuring a password protected
>> >Ajp12Interceptor shutdown to be the only shutdown available.
>> 
>> Having Ajp13 or Ajp12 shutdown from a distant machine is dangerous.
>> We should use Ajp13 as link between web-server and tomcat and
>> use Ajp12 accepting only from localhost.
>
>I'll take this as a vote to remove the shutdown support from Ajp13
>and not provide an option.  I'm not sure if you are implying
>additional changes by your statement "shutdown from a distant
>machine is dangerous".

Yes, having shutdown without the minimum authentification is
just dangerous. Even the current situation with AJP12 IS 
dangerours. AJP14 will use a stronger authentification but 
up to it, we should indicate that AJP12 is deprecated and 
restricted to accepting only from localhost and that AJP13
shutdown support is removed....

>> 
>> >9. Some files under src/native have embedded CR's, i.e. Unix 
>> >files would have
>> >CRLF and Windows files would have CRCRLF's.  These need to be fixed.
>> 
>> Couldn't we say that ALL src in native will be only in Unix mode ?
>
>I need CRLF for building on Windows.  It appears that some files
>were checked in from *nix containing CR's that were not stripped
>during the commit.  When I checkout or update from Windows, CVS
>still adds a CR in front of all LFs.  The result is CRCRLF which
>Dev Studio wants to fix.  I'd just like the source to be "clean"
>for final release.  I'm not sure what happens on *nix systems when
>they encounter a CR.
>
>> 
>> >11. Make sure we are okay with mod_jk not supporting 
>Apache's rewrite
>> >in Tomcat 3.3's mod_jk.  I'm fine with not supporting it, but I want
>> >to include some justification in the documentation to avoid some of
>> >the "why don't you" questions.
>> 
>> As said Costin, making mod_jk using uri or unparsed_uri is not 
>> difficult, but we have here 2 situations. Strict respect of spec
>> (unparsed) or mod_rewrite compatibility. 
>> 
>> Why not let the final user decide and create a new JkOptions 
>directive
>> (easy). ie :
>> 
>> JkOptions +ForwardUnparsedURI => strict spec respect
>> JkOptions -ForwardUnparsedURI => rewrite compatibility  
>
>I'm +1 for user configurability.  I would prefer strict compliance to
>be the default.

I'll work on it ASAP

>> 
>> 
>> >111   after httpd reload mod_jk fails to find a worker BugRat Repo  
>> 
>> Didn't know this one but must be easy to handle....
>
>I assume this is likely fixed since the bug is very old.  I just
>prefer someone more familiar with the history of mod_jk to say
>so.

Easy to test :)

>> 
>> 
>> >2333  Nor Oth PC [EMAIL PROTECTED] NEW  HTTP Reason will be 
>> >destroyed in header
>> >      using AJP12  
>> 
>> Some patch was sent some time ago and even if AJP12 is somewhat
>> deprecated, I should try to commit the provided patch.
>
>I scanned but didn't have much time assess applying the
>supplied patch.  My main reservation is that I'm not sure if
>IIS or netscape is multi-threaded, in which case the
>static buffer could do more harm than good.

Same game, Apache 2.0 is also MultiThread

>> >2550  Ajp13 Connection hanging on static content.  
>> 
>> Should take a look at this one even. Majority of users 
>> use Apache to handle static data but it must be investigated
>> (I)
>
>My understanding is that Ajp13 keeps the connection open,
>so a "Connection reset by peer" sounds bad to me.  Do you know
>if this issue might have been fixed since the bug was opened?
>I though there was some work on re-establishing the connection.

I'll work on this

>> >2927  Nor Oth PC [EMAIL PROTECTED] NEW  
>> >ArrayIndexOutOfBoundsException when
>> >      accessing ajp13  
>> 
>> I take care of this....
>> 
>
>If this is complicated or potentially unsafe, I'm fine with
>resolving as "wontfix".

Not so difficult since we just have to check that we 
found the ajp13 HEADER (1234) and if not just close 
the connection !

Reply via email to