Return-Path: Delivered-To: apmail-httpd-modules-dev-archive@minotaur.apache.org Received: (qmail 9772 invoked from network); 3 Jan 2011 23:16:28 -0000 Received: from hermes.apache.org (HELO mail.apache.org) (140.211.11.3) by minotaur.apache.org with SMTP; 3 Jan 2011 23:16:28 -0000 Received: (qmail 34966 invoked by uid 500); 3 Jan 2011 23:16:27 -0000 Delivered-To: apmail-httpd-modules-dev-archive@httpd.apache.org Received: (qmail 34931 invoked by uid 500); 3 Jan 2011 23:16:27 -0000 Mailing-List: contact modules-dev-help@httpd.apache.org; run by ezmlm Precedence: bulk List-Help: List-Unsubscribe: List-Post: List-Id: Reply-To: modules-dev@httpd.apache.org Delivered-To: mailing list modules-dev@httpd.apache.org Received: (qmail 34923 invoked by uid 99); 3 Jan 2011 23:16:27 -0000 Received: from nike.apache.org (HELO nike.apache.org) (192.87.106.230) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 03 Jan 2011 23:16:27 +0000 X-ASF-Spam-Status: No, hits=-0.7 required=10.0 tests=FREEMAIL_FROM,RCVD_IN_DNSWL_LOW,RFC_ABUSE_POST,SPF_PASS,T_TO_NO_BRKTS_FREEMAIL X-Spam-Check-By: apache.org Received-SPF: pass (nike.apache.org: domain of covener@gmail.com designates 74.125.82.173 as permitted sender) Received: from [74.125.82.173] (HELO mail-wy0-f173.google.com) (74.125.82.173) by apache.org (qpsmtpd/0.29) with ESMTP; Mon, 03 Jan 2011 23:16:20 +0000 Received: by wyg36 with SMTP id 36so15064818wyg.18 for ; Mon, 03 Jan 2011 15:15:59 -0800 (PST) DKIM-Signature: v=1; a=rsa-sha256; c=relaxed/relaxed; d=gmail.com; s=gamma; h=domainkey-signature:mime-version:received:received:in-reply-to :references:date:message-id:subject:from:to:content-type; bh=noJczXIxGj8wzcj2jXqbM5i2uc5L7df9XEKj58xBIsQ=; b=OfUrOZhB/T58VbSfEhHDG9Cm4y4Q2/UgXuS8Zb9Ji+TxOG3xlCsrZsUHOTiA86bDvn Vj18LIBAC4gFGS2M3iRe23PEqAnKp759b1WLI0buQ6vMtiEe/HTqrSZ844YBxjg3Msbr 3GBCHH3z+/hoTtuSsjSomsUKZ3vQtVGGeWoj8= DomainKey-Signature: a=rsa-sha1; c=nofws; d=gmail.com; s=gamma; h=mime-version:in-reply-to:references:date:message-id:subject:from:to :content-type; b=orHC7cEMJSX5tj1Bn00zVqhCYQ8oq5u71PdzsgU/YMnLfu9XW03a5dIAP47+ic5Heb 8yOWRUNfwuUQe6JQfkWKuyWn8mPP471ox3+/vI0BS3ntNsDsfwNPn/yJbEpPLLqXmzJQ c8rGWrmUBPbTNARXiuErFT4s+gnzm2LQ5109I= MIME-Version: 1.0 Received: by 10.216.13.194 with SMTP id b44mr3722244web.68.1294096559821; Mon, 03 Jan 2011 15:15:59 -0800 (PST) Received: by 10.216.70.132 with HTTP; Mon, 3 Jan 2011 15:15:59 -0800 (PST) In-Reply-To: References: Date: Mon, 3 Jan 2011 18:15:59 -0500 Message-ID: Subject: Re: Overriding mod_rewrite from another module From: Eric Covener To: modules-dev@httpd.apache.org Content-Type: text/plain; charset=ISO-8859-1 X-Virus-Checked: Checked by ClamAV on apache.org >> The access checking on mod_pagespeed resources is >> redundant, because the resource will either be served from cache (in which >> case it had to be authenticated to get into the cache in the first place) or >> will be decoded and the original resource(s) fetched from the same server >> with full authentication. Re: suppressing mod_authz_host: This doesn't sound like it guards against a user that meets the AAA conditions causing the resource to be cached and served to users who would not have met the AAA restrictions. Maybe you are missing a map_to_storage callback to tell the core that this thing will really, really not be served from the filesystem. Re: suppressing rewrite. Your comments in the src imply that rewrite is doing some of what you're also suppressing in server/core.c:ap_core_translate_name(). Also, it's odd that your scheme for suppressing mod_rewrite wasn't a no-op for rewrite in htaccess context, since these use the RUN_ALL fixups hook to do its magic, but maybe you're catching a break there?