Author: markt
Date: Mon Feb 23 22:34:57 2015
New Revision: 1661805

URL: http://svn.apache.org/r1661805
Log:
issues.a.o -> bz.a.o

Modified:
    tomcat/site/trunk/docs/bugreport.html
    tomcat/site/trunk/docs/download-native.html
    tomcat/site/trunk/docs/getinvolved.html
    tomcat/site/trunk/docs/index.html
    tomcat/site/trunk/docs/maven-plugin.html
    tomcat/site/trunk/docs/migration-7.html
    tomcat/site/trunk/docs/oldnews-2013.html
    tomcat/site/trunk/docs/oldnews-2014.html
    tomcat/site/trunk/docs/oldnews.html
    tomcat/site/trunk/docs/security-4.html
    tomcat/site/trunk/docs/security-5.html
    tomcat/site/trunk/docs/security-6.html
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/xdocs/bugreport.xml
    tomcat/site/trunk/xdocs/getinvolved.xml
    tomcat/site/trunk/xdocs/maven-plugin.xml
    tomcat/site/trunk/xdocs/migration-7.xml
    tomcat/site/trunk/xdocs/oldnews-2013.xml
    tomcat/site/trunk/xdocs/oldnews-2014.xml
    tomcat/site/trunk/xdocs/security-4.xml
    tomcat/site/trunk/xdocs/security-5.xml
    tomcat/site/trunk/xdocs/security-6.xml
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl

Modified: tomcat/site/trunk/docs/bugreport.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/bugreport.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/bugreport.html (original)
+++ tomcat/site/trunk/docs/bugreport.html Mon Feb 23 22:34:57 2015
@@ -425,9 +425,9 @@ problem you are having before reporting
 </ul>
     
 <p>The search page is
-      <a href="https://issues.apache.org/bugzilla/query.cgi";>here</a>.
+      <a href="https://bz.apache.org/bugzilla/query.cgi";>here</a>.
       There is also
-      <a 
href="https://issues.apache.org/bugzilla/query.cgi?format=advanced";>advanced</a>
+      <a 
href="https://bz.apache.org/bugzilla/query.cgi?format=advanced";>advanced</a>
       search page.
     </p>
     
@@ -720,7 +720,7 @@ problem you are having before reporting
 <p>Tomcat
         <a href="http://tomcat.apache.org/maven-plugin.html";>Maven plugin</a>
         subproject tracks its issues in
-        <a href="https://issues.apache.org/jira/browse/MTOMCAT";>JIRA 
database</a>.
+        <a href="https://bz.apache.org/jira/browse/MTOMCAT";>JIRA database</a>.
         </p>
        
 </li>
@@ -751,12 +751,12 @@ bug in your web application.</p>
 <p>Please provide as much information as possible. It is
     very hard to fix a bug if the person looking into the problem cannot
     reproduce it. See also
-    <a 
href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html";>Bug 
Writing Guidelines</a>.
+    <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html";>Bug 
Writing Guidelines</a>.
   </p>
 
   
 <p>Bug submission starts
-    <a href="https://issues.apache.org/bugzilla/enter_bug.cgi";>here</a>.
+    <a href="https://bz.apache.org/bugzilla/enter_bug.cgi";>here</a>.
     You have to include the following information in your bug report:</p>
   
 <ul>

Modified: tomcat/site/trunk/docs/download-native.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/download-native.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/download-native.html (original)
+++ tomcat/site/trunk/docs/download-native.html Mon Feb 23 22:34:57 2015
@@ -319,7 +319,7 @@
               version of library is included in Apache Tomcat distributions.
               b) OCSP-enabled. This one has enabled (experimental)
               support for verification of client SSL certificates via OCSP
-              protocol (<a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45392";>45392</a>).
+              protocol (<a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45392";>45392</a>).
               </p>
               
 <p>Each archive contains <code>tcnative-1.dll</code> for 32-bit,

Modified: tomcat/site/trunk/docs/getinvolved.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/getinvolved.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/getinvolved.html (original)
+++ tomcat/site/trunk/docs/getinvolved.html Mon Feb 23 22:34:57 2015
@@ -213,7 +213,7 @@ few areas ways in which you can help:</p
       Apache Tomcat user documentation.</li>
   
 <li>
-<a href="https://issues.apache.org/bugzilla/";>Investigate bugs</a> that have
+<a href="https://bz.apache.org/bugzilla/";>Investigate bugs</a> that have
       been reported and provide patches where appropriate.</li>
   
 <li>Help with development for the next release of the Servlet and JSP

Modified: tomcat/site/trunk/docs/index.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/index.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/index.html (original)
+++ tomcat/site/trunk/docs/index.html Mon Feb 23 22:34:57 2015
@@ -268,7 +268,7 @@ notable changes since 8.0.17 include:</p
 <ul>
   
 <li>A regression that caused response truncation when using forwarding
-      (<a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57475";>57475</a>) has 
been fixed.</li>
+      (<a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57475";>57475</a>) has been 
fixed.</li>
   
 <li>Various improvements to ReplicatedMap in Tribes.</li>
 

Modified: tomcat/site/trunk/docs/maven-plugin.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/maven-plugin.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/maven-plugin.html (original)
+++ tomcat/site/trunk/docs/maven-plugin.html Mon Feb 23 22:34:57 2015
@@ -245,7 +245,7 @@
         
 <p>
           The Bug Tracker to use is the ASF Jira instance:
-          <a 
href="https://issues.apache.org/jira/browse/MTOMCAT";>https://issues.apache.org/jira/browse/MTOMCAT</a>
+          <a 
href="https://bz.apache.org/jira/browse/MTOMCAT";>https://bz.apache.org/jira/browse/MTOMCAT</a>
         
 </p>
       

Modified: tomcat/site/trunk/docs/migration-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/migration-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/migration-7.html (original)
+++ tomcat/site/trunk/docs/migration-7.html Mon Feb 23 22:34:57 2015
@@ -409,7 +409,7 @@ of Apache Tomcat.</p>
     regardless of the value of the <code>Host</code>'s <code>unpackWARs</code>
     setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is
     only supported in 7.0.48 onwards. See issue
-    <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1";>51294</a>.
+    <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1";>51294</a>.
     </p>
   
 </div>
@@ -790,9 +790,9 @@ of Apache Tomcat.</p>
   difference is that Filters defined in the global <code>conf/web.xml</code>
   now follow the ones defined in a web application, instead of preceding
   them. See issues
-  <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1";>51754</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1";>51754</a>
   and
-  <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4";>52138</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4";>52138</a>
   for clarifications.</p>
 
   
@@ -828,7 +828,7 @@ of Apache Tomcat.</p>
   Note, that upon clarification from the Servlet EG, even applications
   using Servlet 2.4 and older versions of specification are being scanned.
   See issue
-  <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619";>53619</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619";>53619</a>
   and related discussions on the users mailing list.
   </p>
 

Modified: tomcat/site/trunk/docs/oldnews-2013.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2013.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews-2013.html (original)
+++ tomcat/site/trunk/docs/oldnews-2013.html Mon Feb 23 22:34:57 2015
@@ -585,7 +585,7 @@ and improvements compared to version 7.0
 
 <ul>
 
-<li>A fix for CVE-2013-2071 (bug <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178";>54178</a>) an 
information disclosure
+<li>A fix for CVE-2013-2071 (bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178";>54178</a>) an 
information disclosure
     issue.</li>
 
 <li>Various fixes to stop Tomcat attempting to parse text that looks like an EL
@@ -740,7 +740,7 @@ improvements compared to version 7.0.35.
 
 <li>Fix the regression in the JspC tool that is used to pre-compile JSP pages
     introduced in 7.0.35. See
-    <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440";>issue
+    <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440";>issue
     54440</a> for details. Patch provided by Sheldon Shao.</li>
 
 <li>Improve handling of <code>ciphers</code> and
@@ -802,7 +802,7 @@ Full details of these changes, and all t
 <p>
 <strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages
 is broken in this release. See
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440";>issue 
54440</a>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440";>issue 54440</a>
 for details.
 </p>
 

Modified: tomcat/site/trunk/docs/oldnews-2014.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews-2014.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews-2014.html (original)
+++ tomcat/site/trunk/docs/oldnews-2014.html Mon Feb 23 22:34:57 2015
@@ -407,7 +407,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/
 
 <p>
 NOTE: A regression has been reported in 8.0.11 (
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882";>bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882";>bug
 56882</a>). A 8.0.12 release is expected in the next week or so to address 
this.
 </p>
 
@@ -475,9 +475,9 @@ Tomcat Native. The notable changes since
   
 <li>Windows binaries are linked with OpenSSL 1.0.1h. This provides a fix
    for <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-0224"; 
rel="nofollow">CVE-2014-0224</a>, an OpenSSL MITM vulnerability.
-   (<a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56596";>56596</a>)</li>
+   (<a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56596";>56596</a>)</li>
   
-<li>Resolve an issue when using FIPS mode. (<a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56396";>56396</a>)</li>
+<li>Resolve an issue when using FIPS mode. (<a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56396";>56396</a>)</li>
 
 </ul>
 
@@ -696,7 +696,7 @@ Tomcat Native. The notable changes since
    (<a 
href="https://wiki.apache.org/tomcat/Security/Heartbleed";>Heartbleed</a>)
    SSL vulnerability.</li>
   
-<li>Add support for ECDHE ciphers. (<a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=55915";>55915</a>)</li>
+<li>Add support for ECDHE ciphers. (<a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=55915";>55915</a>)</li>
 
 </ul>
 

Modified: tomcat/site/trunk/docs/oldnews.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/oldnews.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/oldnews.html (original)
+++ tomcat/site/trunk/docs/oldnews.html Mon Feb 23 22:34:57 2015
@@ -246,7 +246,7 @@ notable changes since 8.0.15 include:</p
 
 <p>
 <strong>Warning:</strong> The following notable bug was found in 8.0.17:
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=57476";>57476</a>: 
some HTTP responses may be truncated. The team works
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=57476";>57476</a>: some 
HTTP responses may be truncated. The team works
 on preparing the next release (8.0.18) to address this issue.
 </p>
 

Modified: tomcat/site/trunk/docs/security-4.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-4.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-4.html (original)
+++ tomcat/site/trunk/docs/security-4.html Mon Feb 23 22:34:57 2015
@@ -387,7 +387,7 @@
 </p>
 
     
-<p>Bugs <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and 
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a>
+<p>Bugs <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a>
        allowed a web application to replace the XML parser used by
        Tomcat to process web.xml and tld files. In limited circumstances these
        bugs may allow a rogue web application to view and/or alter the web.xml
@@ -718,7 +718,7 @@
 
     
 <p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
     40771</a> may result in the disclosure of POSTed content from a previous
     request. For a vulnerability to exist, the content read from the input
     stream must be disclosed, eg via writing it to the response and committing
@@ -740,7 +740,7 @@
 
     
 <p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835";>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835";>
     Bug 25835</a> can, in rare circumstances - this has only been reproduced
     using a debugger to force a particular processing sequence for two threads 
-
     allow a user from a non-permitted IP address to gain access to a context

Modified: tomcat/site/trunk/docs/security-5.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-5.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-5.html (original)
+++ tomcat/site/trunk/docs/security-5.html Mon Feb 23 22:34:57 2015
@@ -967,7 +967,7 @@
 </p>
 
     
-<p>Bugs <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and 
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a> 
allowed a web application
+<p>Bugs <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a> allowed a 
web application
        to replace the XML parser used by
        Tomcat to process web.xml, context.xml and tld files. In limited
        circumstances these bugs may allow a rogue web application to view 
and/or
@@ -1356,7 +1356,7 @@
 
     
 <p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
     40771</a> may result in the disclosure of POSTed content from a previous
     request. For a vulnerability to exist, the content read from the input
     stream must be disclosed, eg via writing it to the response and committing
@@ -1487,7 +1487,7 @@
 
     
 <p>
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835";>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835";>
     Bug 25835</a> can, in rare circumstances - this has only been reproduced
     using a debugger to force a particular processing sequence for two threads 
-
     allow a user from a non-permitted IP address to gain access to a context

Modified: tomcat/site/trunk/docs/security-6.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-6.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-6.html (original)
+++ tomcat/site/trunk/docs/security-6.html Mon Feb 23 22:34:57 2015
@@ -788,7 +788,7 @@
 <p>When using the NIO connector with sendfile and HTTPS enabled, if a client
        breaks the connection while reading the response an infinite loop is
        entered leading to a denial of service. This was originally reported as
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
        52858</a>.
     </p>
 
@@ -1527,7 +1527,7 @@
 </p>
 
     
-<p>Bugs <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and 
<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a> 
allowed a web application
+<p>Bugs <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=29936";>29936</a> and <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=45933";>45933</a> allowed a 
web application
        to replace the XML parser used by
        Tomcat to process web.xml, context.xml and tld files. In limited
        circumstances these bugs may allow a rogue web application to view 
and/or
@@ -1945,7 +1945,7 @@
        there is no magic solution. This issue has been discussed several times
        on the Tomcat mailing lists. The best place to start to review these
        discussions is the report for
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
        54236</a>.</p>
 
     

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Mon Feb 23 22:34:57 2015
@@ -642,7 +642,7 @@
 </p>
 
     
-<p>Bug <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54178";>54178</a> 
described a scenario where elements of a previous
+<p>Bug <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54178";>54178</a> described 
a scenario where elements of a previous
        request may be exposed to a current request. This was very difficult to
        exploit deliberately but fairly likely to happen unexpectedly if an
        application used AsyncListeners that threw RuntimeExceptions.</p>
@@ -920,7 +920,7 @@
 <p>When using the NIO connector with sendfile and HTTPS enabled, if a client
        breaks the connection while reading the response an infinite loop is
        entered leading to a denial of service. This was originally reported as
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
        52858</a>.
     </p>
 
@@ -1268,7 +1268,7 @@
 <p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
        vulnerability previously reported as <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0783"; 
rel="nofollow">CVE-2009-0783</a>.
        This was initially
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395";>
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395";>
        reported</a> as a memory leak. If a web application is the first web
        application loaded, this bugs allows that web application to potentially
        view and/or alter the web.xml, context.xml and tld files of other web
@@ -1646,7 +1646,7 @@
        there is no magic solution. This issue has been discussed several times
        on the Tomcat mailing lists. The best place to start to review these
        discussions is the report for
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
        54236</a>.</p>
 
     

Modified: tomcat/site/trunk/xdocs/bugreport.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/bugreport.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/bugreport.xml (original)
+++ tomcat/site/trunk/xdocs/bugreport.xml Mon Feb 23 22:34:57 2015
@@ -121,9 +121,9 @@ problem you are having before reporting
       information to help reproduce and resolve the bug.</li>
     </ul>
     <p>The search page is
-      <a href="https://issues.apache.org/bugzilla/query.cgi";>here</a>.
+      <a href="https://bz.apache.org/bugzilla/query.cgi";>here</a>.
       There is also
-      <a 
href="https://issues.apache.org/bugzilla/query.cgi?format=advanced";>advanced</a>
+      <a 
href="https://bz.apache.org/bugzilla/query.cgi?format=advanced";>advanced</a>
       search page.
     </p>
     <p>Here are some search tips.</p>
@@ -312,7 +312,7 @@ problem you are having before reporting
       <li><p>Tomcat
         <a href="http://tomcat.apache.org/maven-plugin.html";>Maven plugin</a>
         subproject tracks its issues in
-        <a href="https://issues.apache.org/jira/browse/MTOMCAT";>JIRA 
database</a>.
+        <a href="https://bz.apache.org/jira/browse/MTOMCAT";>JIRA database</a>.
         </p>
        </li>
 
@@ -336,11 +336,11 @@ bug in your web application.</p>
   <p>Please provide as much information as possible. It is
     very hard to fix a bug if the person looking into the problem cannot
     reproduce it. See also
-    <a 
href="https://issues.apache.org/bugzilla/page.cgi?id=bug-writing.html";>Bug 
Writing Guidelines</a>.
+    <a href="https://bz.apache.org/bugzilla/page.cgi?id=bug-writing.html";>Bug 
Writing Guidelines</a>.
   </p>
 
   <p>Bug submission starts
-    <a href="https://issues.apache.org/bugzilla/enter_bug.cgi";>here</a>.
+    <a href="https://bz.apache.org/bugzilla/enter_bug.cgi";>here</a>.
     You have to include the following information in your bug report:</p>
   <ul>
     <li><p><b>Product</b>. Here is a list of supported products:</p>

Modified: tomcat/site/trunk/xdocs/getinvolved.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/getinvolved.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/getinvolved.xml (original)
+++ tomcat/site/trunk/xdocs/getinvolved.xml Mon Feb 23 22:34:57 2015
@@ -21,7 +21,7 @@ few areas ways in which you can help:</p
       <a href="http://wiki.apache.org/tomcat/FrontPage";>Wiki</a>.</li>
   <li>Contribute other documentation patches, either for the website or for the
       Apache Tomcat user documentation.</li>
-  <li><a href="https://issues.apache.org/bugzilla/";>Investigate bugs</a> that 
have
+  <li><a href="https://bz.apache.org/bugzilla/";>Investigate bugs</a> that have
       been reported and provide patches where appropriate.</li>
   <li>Help with development for the next release of the Servlet and JSP
       specifications.</li>

Modified: tomcat/site/trunk/xdocs/maven-plugin.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/maven-plugin.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/maven-plugin.xml (original)
+++ tomcat/site/trunk/xdocs/maven-plugin.xml Mon Feb 23 22:34:57 2015
@@ -36,7 +36,7 @@
       <subsection name="Bug Tracker">
         <p>
           The Bug Tracker to use is the ASF Jira instance:
-          <a 
href="https://issues.apache.org/jira/browse/MTOMCAT";>https://issues.apache.org/jira/browse/MTOMCAT</a>
+          <a 
href="https://bz.apache.org/jira/browse/MTOMCAT";>https://bz.apache.org/jira/browse/MTOMCAT</a>
         </p>
       </subsection>
 

Modified: tomcat/site/trunk/xdocs/migration-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/migration-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/migration-7.xml (original)
+++ tomcat/site/trunk/xdocs/migration-7.xml Mon Feb 23 22:34:57 2015
@@ -100,7 +100,7 @@ of Apache Tomcat.</p>
     regardless of the value of the <code>Host</code>'s <code>unpackWARs</code>
     setting in versions 7.0.12 to 7.0.47 inclusive. Note that this unpacking is
     only supported in 7.0.48 onwards. See issue
-    <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51294#c1";>51294</a>.
+    <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51294#c1";>51294</a>.
     </p>
   </subsection>
   
@@ -349,9 +349,9 @@ of Apache Tomcat.</p>
   difference is that Filters defined in the global <code>conf/web.xml</code>
   now follow the ones defined in a web application, instead of preceding
   them. See issues
-  <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51754#c1";>51754</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51754#c1";>51754</a>
   and
-  <a 
href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52138#c4";>52138</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52138#c4";>52138</a>
   for clarifications.</p>
 
   </subsection>
@@ -375,7 +375,7 @@ of Apache Tomcat.</p>
   Note, that upon clarification from the Servlet EG, even applications
   using Servlet 2.4 and older versions of specification are being scanned.
   See issue
-  <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=53619";>53619</a>
+  <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=53619";>53619</a>
   and related discussions on the users mailing list.
   </p>
 

Modified: tomcat/site/trunk/xdocs/oldnews-2013.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2013.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/oldnews-2013.xml (original)
+++ tomcat/site/trunk/xdocs/oldnews-2013.xml Mon Feb 23 22:34:57 2015
@@ -396,7 +396,7 @@ improvements compared to version 7.0.35.
 <ul>
 <li>Fix the regression in the JspC tool that is used to pre-compile JSP pages
     introduced in 7.0.35. See
-    <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440";>issue
+    <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440";>issue
     54440</a> for details. Patch provided by Sheldon Shao.</li>
 <li>Improve handling of <code>ciphers</code> and
     <code>sslEnabledProtocols</code> options for the BIO and NIO connectors. 
The
@@ -442,7 +442,7 @@ Full details of these changes, and all t
 
 <p><strong>Notice:</strong> The JspC tool that is used to pre-compile JSP pages
 is broken in this release. See
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54440";>issue 
54440</a>
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54440";>issue 54440</a>
 for details.
 </p>
 

Modified: tomcat/site/trunk/xdocs/oldnews-2014.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/oldnews-2014.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/oldnews-2014.xml (original)
+++ tomcat/site/trunk/xdocs/oldnews-2014.xml Mon Feb 23 22:34:57 2015
@@ -153,7 +153,7 @@ http://tomcat.apache.org/tomcat-8.0-doc/
 </p>
 <p>
 NOTE: A regression has been reported in 8.0.11 (
-<a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=56882";>bug
+<a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=56882";>bug
 56882</a>). A 8.0.12 release is expected in the next week or so to address 
this.
 </p>
 <p>

Modified: tomcat/site/trunk/xdocs/security-4.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-4.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-4.xml (original)
+++ tomcat/site/trunk/xdocs/security-4.xml Mon Feb 23 22:34:57 2015
@@ -339,7 +339,7 @@
     <p><strong>Low: Information disclosure</strong>
        <cve>CVE-2008-4308</cve></p>
 
-    <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
     40771</a> may result in the disclosure of POSTed content from a previous
     request. For a vulnerability to exist, the content read from the input
     stream must be disclosed, eg via writing it to the response and committing
@@ -354,7 +354,7 @@
     <p><strong>Low: Information disclosure</strong>
        <cve>CVE-2008-3271</cve></p>
 
-    <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835";>
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835";>
     Bug 25835</a> can, in rare circumstances - this has only been reproduced
     using a debugger to force a particular processing sequence for two threads 
-
     allow a user from a non-permitted IP address to gain access to a context

Modified: tomcat/site/trunk/xdocs/security-5.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-5.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-5.xml (original)
+++ tomcat/site/trunk/xdocs/security-5.xml Mon Feb 23 22:34:57 2015
@@ -777,7 +777,7 @@
     <p><strong>Low: Information disclosure</strong>
        <cve>CVE-2008-4308</cve></p>
 
-    <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=40771";>Bug
     40771</a> may result in the disclosure of POSTed content from a previous
     request. For a vulnerability to exist, the content read from the input
     stream must be disclosed, eg via writing it to the response and committing
@@ -866,7 +866,7 @@
     <p><strong>Low: Information disclosure</strong>
        <cve>CVE-2008-3271</cve></p>
 
-    <p><a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=25835";>
+    <p><a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=25835";>
     Bug 25835</a> can, in rare circumstances - this has only been reproduced
     using a debugger to force a particular processing sequence for two threads 
-
     allow a user from a non-permitted IP address to gain access to a context

Modified: tomcat/site/trunk/xdocs/security-6.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-6.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-6.xml (original)
+++ tomcat/site/trunk/xdocs/security-6.xml Mon Feb 23 22:34:57 2015
@@ -379,7 +379,7 @@
     <p>When using the NIO connector with sendfile and HTTPS enabled, if a 
client
        breaks the connection while reading the response an infinite loop is
        entered leading to a denial of service. This was originally reported as
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
        52858</a>.
     </p>
 
@@ -1179,7 +1179,7 @@
        there is no magic solution. This issue has been discussed several times
        on the Tomcat mailing lists. The best place to start to review these
        discussions is the report for
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
        54236</a>.</p>
 
     <p>This was first discussed on the public Tomcat users mailing list on 19

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Mon Feb 23 22:34:57 2015
@@ -463,7 +463,7 @@
     <p>When using the NIO connector with sendfile and HTTPS enabled, if a 
client
        breaks the connection while reading the response an infinite loop is
        entered leading to a denial of service. This was originally reported as
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=52858";>bug
        52858</a>.
     </p>
 
@@ -704,7 +704,7 @@
     <p>The re-factoring of XML validation for Tomcat 7.0.x re-introduced the
        vulnerability previously reported as <cve>CVE-2009-0783</cve>.
        This was initially
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=51395";>
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=51395";>
        reported</a> as a memory leak. If a web application is the first web
        application loaded, this bugs allows that web application to potentially
        view and/or alter the web.xml, context.xml and tld files of other web
@@ -976,7 +976,7 @@
        there is no magic solution. This issue has been discussed several times
        on the Tomcat mailing lists. The best place to start to review these
        discussions is the report for
-       <a href="https://issues.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
+       <a href="https://bz.apache.org/bugzilla/show_bug.cgi?id=54263";>bug
        54236</a>.</p>
 
     <p>This was first discussed on the public Tomcat users mailing list on 19

Modified: tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl?rev=1661805&r1=1661804&r2=1661805&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl (original)
+++ tomcat/site/trunk/xdocs/stylesheets/tomcat-site.xsl Mon Feb 23 22:34:57 2015
@@ -34,7 +34,7 @@
   <!-- Defined parameters (overrideable) -->
   <xsl:param    name="relative-path" select="'.'"/>
   <xsl:param    name="home-logo"     select="'/images/tomcat.png'"/>
-  <xsl:param    name="buglink"       
select="'https://issues.apache.org/bugzilla/show_bug.cgi?id='"/>
+  <xsl:param    name="buglink"       
select="'https://bz.apache.org/bugzilla/show_bug.cgi?id='"/>
   <xsl:param    name="revlink"       
select="'http://svn.apache.org/viewvc?view=rev&amp;rev='"/>
   <xsl:param    name="cvelink"       
select="'http://cve.mitre.org/cgi-bin/cvename.cgi?name='"/>
 



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to