]>
Commit | Line | Data |
---|---|---|
08b8dbf5 AM |
1 | diff -urN mod_fastcgi-2.4.2.org/fcgi_buf.c mod_fastcgi-2.4.2/fcgi_buf.c |
2 | --- mod_fastcgi-2.4.2.org/fcgi_buf.c 2004-10-06 20:30:46.335894544 +0200 | |
3021dd26 | 3 | +++ mod_fastcgi-2.4.2/fcgi_buf.c 2004-10-06 21:53:04.248062670 +0200 |
08b8dbf5 AM |
4 | @@ -50,7 +50,7 @@ |
5 | { | |
6 | Buffer *buf; | |
7 | ||
8 | - buf = (Buffer *)ap_pcalloc(p, sizeof(Buffer) + size); | |
9 | + buf = (Buffer *)apr_pcalloc(p, sizeof(Buffer) + size); | |
10 | buf->size = size; | |
11 | fcgi_buf_reset(buf); | |
12 | return buf; | |
13 | @@ -487,7 +487,7 @@ | |
14 | char *new_elts; | |
15 | int new_nalloc = (arr->nalloc <= 0) ? n : arr->nelts + n; | |
16 | ||
17 | - new_elts = ap_pcalloc(arr->pool, arr->elt_size * new_nalloc); | |
18 | + new_elts = apr_pcalloc(arr->pool, arr->elt_size * new_nalloc); | |
19 | memcpy(new_elts, arr->elts, arr->nelts * arr->elt_size); | |
20 | ||
21 | arr->elts = new_elts; | |
76020ae4 AM |
22 | diff -urN mod_fastcgi-2.4.2.org/fcgi_config.c mod_fastcgi-2.4.2/fcgi_config.c |
23 | --- mod_fastcgi-2.4.2.org/fcgi_config.c 2004-10-06 20:30:46.336894330 +0200 | |
3021dd26 | 24 | +++ mod_fastcgi-2.4.2/fcgi_config.c 2004-10-06 21:53:04.253061599 +0200 |
b266052a AM |
25 | @@ -50,7 +50,7 @@ |
26 | /* Convert port number */ | |
27 | tmp = (u_short) strtol(portStr, &cvptr, 10); | |
28 | if (*cvptr != '\0' || tmp < 1 || tmp > USHRT_MAX) | |
29 | - return ap_pstrcat(p, "bad port number \"", portStr, "\"", NULL); | |
30 | + return apr_pstrcat(p, "bad port number \"", portStr, "\"", NULL); | |
31 | ||
32 | *port = (unsigned short) tmp; | |
33 | ||
25a8184f | 34 | @@ -75,11 +75,11 @@ |
b266052a AM |
35 | tmp = strtol(txt, &ptr, 10); |
36 | ||
37 | if (*ptr != '\0') { | |
38 | - return ap_pstrcat(p, "\"", txt, "\" must be a positive integer", NULL); | |
39 | + return apr_pstrcat(p, "\"", txt, "\" must be a positive integer", NULL); | |
40 | } | |
41 | ||
42 | if (tmp < min || tmp > USHRT_MAX) { | |
25a8184f AM |
43 | - return ap_psprintf(p, "\"%u\" must be >= %u and < %u", *num, min, USHRT_MAX); |
44 | + return apr_psprintf(p, "\"%u\" must be >= %u and < %u", *num, min, USHRT_MAX); | |
45 | } | |
46 | ||
47 | *num = (u_short) tmp; | |
48 | @@ -101,11 +101,11 @@ | |
b266052a AM |
49 | |
50 | if (*cp != '\0') | |
51 | { | |
52 | - return ap_pstrcat(p, "can't parse ", "\"", val, "\"", NULL); | |
53 | + return apr_pstrcat(p, "can't parse ", "\"", val, "\"", NULL); | |
54 | } | |
55 | else if (*num < min) | |
56 | { | |
25a8184f AM |
57 | - return ap_psprintf(p, "\"%d\" must be >= %d", *num, min); |
58 | + return apr_psprintf(p, "\"%d\" must be >= %d", *num, min); | |
59 | } | |
60 | ||
61 | return NULL; | |
62 | @@ -126,9 +126,9 @@ | |
b266052a AM |
63 | *num = (u_int)strtol(val, &ptr, 10); |
64 | ||
65 | if (*ptr != '\0') | |
66 | - return ap_pstrcat(p, "\"", val, "\" must be a positive integer", NULL); | |
67 | + return apr_pstrcat(p, "\"", val, "\" must be a positive integer", NULL); | |
68 | else if (*num < min) | |
25a8184f AM |
69 | - return ap_psprintf(p, "\"%u\" must be >= %u", *num, min); |
70 | + return apr_psprintf(p, "\"%u\" must be >= %u", *num, min); | |
b266052a | 71 | return NULL; |
25a8184f AM |
72 | } |
73 | ||
74 | @@ -147,9 +147,9 @@ | |
b266052a AM |
75 | *num = (float) strtod(val, &ptr); |
76 | ||
77 | if (*ptr != '\0') | |
78 | - return ap_pstrcat(p, "\"", val, "\" is not a floating point number", NULL); | |
79 | + return apr_pstrcat(p, "\"", val, "\" is not a floating point number", NULL); | |
80 | if (*num < min || *num > max) | |
25a8184f AM |
81 | - return ap_psprintf(p, "\"%f\" is not between %f and %f", *num, min, max); |
82 | + return apr_psprintf(p, "\"%f\" is not between %f and %f", *num, min, max); | |
b266052a | 83 | return NULL; |
25a8184f AM |
84 | } |
85 | ||
b266052a AM |
86 | @@ -160,7 +160,7 @@ |
87 | } | |
88 | ||
89 | if (strchr(var, '=') == NULL) { | |
90 | - *(envp + *envc) = ap_pstrcat(p, var, "=", getenv(var), NULL); | |
91 | + *(envp + *envc) = apr_pstrcat(p, var, "=", getenv(var), NULL); | |
92 | } | |
93 | else { | |
94 | *(envp + *envc) = var; | |
ffa7aacf | 95 | @@ -191,10 +191,10 @@ |
2ff9aba2 AM |
96 | const char **header; |
97 | ||
98 | if (!*array) { | |
99 | - *array = ap_make_array(p, 10, sizeof(char*)); | |
9a987e9c | 100 | + *array = apr_array_make(p, 10, sizeof(char*)); |
2ff9aba2 AM |
101 | } |
102 | ||
ffa7aacf AM |
103 | - header = (const char **)ap_push_array(*array); |
104 | + header = (const char **)apr_array_push(*array); | |
105 | *header = ap_getword_conf(p, arg); | |
106 | ||
107 | return header ? NULL : "\"\""; | |
25a8184f AM |
108 | @@ -206,7 +206,7 @@ |
109 | static const char *invalid_value(pool *p, const char *cmd, const char *id, | |
110 | const char *opt, const char *err) | |
111 | { | |
112 | - return ap_psprintf(p, "%s%s%s: invalid value for %s: %s", | |
113 | + return apr_psprintf(p, "%s%s%s: invalid value for %s: %s", | |
114 | cmd, id ? " " : "", id ? id : "", opt, err); | |
115 | } | |
116 | ||
117 | @@ -334,7 +334,7 @@ | |
118 | if (mkdir(path, S_IRWXU) != 0) | |
119 | #endif | |
120 | { | |
121 | - return ap_psprintf(tp, | |
122 | + return apr_psprintf(tp, | |
123 | "doesn't exist and can't be created: %s", | |
124 | strerror(errno)); | |
125 | } | |
126 | @@ -342,7 +342,7 @@ | |
127 | #ifndef WIN32 | |
128 | /* If we're root, we're gonna setuid/setgid so we need to chown */ | |
129 | if (geteuid() == 0 && chown(path, ap_user_id, ap_group_id) != 0) { | |
130 | - return ap_psprintf(tp, | |
131 | + return apr_psprintf(tp, | |
132 | "can't chown() to the server (uid %ld, gid %ld): %s", | |
133 | (long)ap_user_id, (long)ap_group_id, strerror(errno)); | |
134 | } | |
135 | @@ -361,7 +361,7 @@ | |
136 | fcgi_user_id, fcgi_group_id); | |
137 | #endif | |
138 | if (err != NULL) { | |
139 | - return ap_psprintf(tp, | |
140 | + return apr_psprintf(tp, | |
141 | "access for server (uid %ld, gid %ld) failed: %s", | |
142 | (long)fcgi_user_id, (long)fcgi_group_id, err); | |
143 | } | |
144 | @@ -379,10 +379,10 @@ | |
b266052a AM |
145 | const char *err; |
146 | pool *tp; | |
147 | ||
148 | - fcgi_dynamic_dir = ap_pstrcat(p, fcgi_socket_dir, "/dynamic", NULL); | |
149 | + fcgi_dynamic_dir = apr_pstrcat(p, fcgi_socket_dir, "/dynamic", NULL); | |
150 | ||
151 | if ((err = fcgi_config_make_dir(p, fcgi_dynamic_dir))) | |
25a8184f AM |
152 | - return ap_psprintf(p, "can't create dynamic directory \"%s\": %s", fcgi_dynamic_dir, err); |
153 | + return apr_psprintf(p, "can't create dynamic directory \"%s\": %s", fcgi_dynamic_dir, err); | |
154 | ||
155 | /* Don't step on a running server unless its OK. */ | |
156 | if (!wax) | |
157 | @@ -419,8 +419,8 @@ | |
da9b5889 AM |
158 | |
159 | dp = ap_popendir(tp, fcgi_dynamic_dir); | |
160 | if (dp == NULL) { | |
161 | - ap_destroy_pool(tp); | |
25a8184f | 162 | - return ap_psprintf(p, "can't open dynamic directory \"%s\": %s", |
16e18e7f | 163 | + apr_pool_destroy(tp); |
25a8184f | 164 | + return apr_psprintf(p, "can't open dynamic directory \"%s\": %s", |
da9b5889 AM |
165 | fcgi_dynamic_dir, strerror(errno)); |
166 | } | |
25a8184f | 167 | |
b266052a AM |
168 | @@ -431,13 +431,13 @@ |
169 | if (strcmp(dirp->d_name, ".") == 0 || strcmp(dirp->d_name, "..") == 0) | |
170 | continue; | |
171 | ||
172 | - unlink(ap_pstrcat(tp, fcgi_dynamic_dir, "/", dirp->d_name, NULL)); | |
173 | + unlink(apr_pstrcat(tp, fcgi_dynamic_dir, "/", dirp->d_name, NULL)); | |
174 | } | |
175 | } | |
da9b5889 AM |
176 | |
177 | #endif /* !APACHE2 */ | |
178 | ||
179 | - ap_destroy_pool(tp); | |
16e18e7f | 180 | + apr_pool_destroy(tp); |
da9b5889 AM |
181 | |
182 | return NULL; | |
183 | } | |
25a8184f AM |
184 | @@ -461,27 +461,27 @@ |
185 | } | |
186 | ||
187 | if (fcgi_socket_dir) { | |
188 | - return ap_psprintf(tp, "%s %s: already defined as \"%s\"", | |
189 | + return apr_psprintf(tp, "%s %s: already defined as \"%s\"", | |
190 | name, arg, fcgi_socket_dir); | |
191 | } | |
192 | ||
193 | err = fcgi_config_set_fcgi_uid_n_gid(1); | |
194 | if (err != NULL) | |
195 | - return ap_psprintf(tp, "%s %s: %s", name, arg, err); | |
196 | + return apr_psprintf(tp, "%s %s: %s", name, arg, err); | |
197 | ||
198 | if (fcgi_servers != NULL) { | |
199 | - return ap_psprintf(tp, | |
200 | + return apr_psprintf(tp, | |
201 | "The %s command must preceed static FastCGI server definitions", | |
90890b93 AM |
202 | name); |
203 | } | |
204 | ||
205 | - arg_nc = ap_pstrdup(cmd->pool, arg); | |
206 | + arg_nc = apr_pstrdup(cmd->pool, arg); | |
207 | ||
208 | #ifndef WIN32 | |
209 | ||
25a8184f AM |
210 | #ifdef APACHE2 |
211 | if (apr_filepath_merge(&arg_nc, "", arg, 0, cmd->pool)) | |
212 | - return ap_psprintf(tp, "%s %s: invalid filepath", name, arg); | |
213 | + return apr_psprintf(tp, "%s %s: invalid filepath", name, arg); | |
214 | #else | |
215 | arg_nc = ap_os_canonical_filename(cmd->pool, arg_nc); | |
216 | #endif | |
217 | @@ -491,22 +491,22 @@ | |
218 | #else /* WIN32 */ | |
219 | ||
220 | if (strncmp(arg_nc, "\\\\.\\pipe\\", 9) != 0) | |
221 | - return ap_psprintf(tp, "%s %s is invalid format",name, arg_nc); | |
222 | + return apr_psprintf(tp, "%s %s is invalid format",name, arg_nc); | |
223 | ||
224 | #endif | |
225 | ||
b266052a AM |
226 | fcgi_socket_dir = arg_nc; |
227 | ||
228 | #ifdef WIN32 | |
229 | - fcgi_dynamic_dir = ap_pstrcat(cmd->pool, fcgi_socket_dir, "dynamic", NULL); | |
230 | + fcgi_dynamic_dir = apr_pstrcat(cmd->pool, fcgi_socket_dir, "dynamic", NULL); | |
231 | #else | |
232 | err = fcgi_config_make_dir(tp, fcgi_socket_dir); | |
233 | if (err != NULL) | |
25a8184f AM |
234 | - return ap_psprintf(tp, "%s %s: %s", name, arg_nc, err); |
235 | + return apr_psprintf(tp, "%s %s: %s", name, arg_nc, err); | |
236 | ||
237 | err = fcgi_config_make_dynamic_dir(cmd->pool, 0); | |
238 | if (err != NULL) | |
239 | - return ap_psprintf(tp, "%s %s: %s", name, arg_nc, err); | |
240 | + return apr_psprintf(tp, "%s %s: %s", name, arg_nc, err); | |
241 | #endif | |
242 | ||
243 | return NULL; | |
244 | @@ -519,7 +519,7 @@ | |
245 | const char *fcgi_config_set_wrapper(cmd_parms *cmd, void *dummy, const char *arg) | |
246 | { | |
247 | #ifdef WIN32 | |
248 | - return ap_psprintf(cmd->temp_pool, | |
249 | + return apr_psprintf(cmd->temp_pool, | |
250 | "the %s directive is not supported on WIN", cmd->cmd->name); | |
251 | #else | |
252 | ||
253 | @@ -536,16 +536,16 @@ | |
254 | ||
255 | if (fcgi_wrapper) | |
256 | { | |
257 | - return ap_psprintf(tp, "%s was already set to \"%s\"", | |
258 | + return apr_psprintf(tp, "%s was already set to \"%s\"", | |
259 | name, fcgi_wrapper); | |
260 | } | |
261 | ||
262 | err = fcgi_config_set_fcgi_uid_n_gid(1); | |
263 | if (err != NULL) | |
264 | - return ap_psprintf(tp, "%s %s: %s", name, arg, err); | |
265 | + return apr_psprintf(tp, "%s %s: %s", name, arg, err); | |
266 | ||
267 | if (fcgi_servers != NULL) { | |
268 | - return ap_psprintf(tp, | |
269 | + return apr_psprintf(tp, | |
270 | "The %s command must preceed static FastCGI server definitions", name); | |
271 | } | |
272 | ||
273 | @@ -562,7 +562,7 @@ | |
274 | { | |
275 | #ifdef APACHE2 | |
276 | if (apr_filepath_merge(&wrapper, "", arg, 0, cmd->pool)) | |
277 | - return ap_psprintf(tp, "%s %s: invalid filepath", name, arg); | |
278 | + return apr_psprintf(tp, "%s %s: invalid filepath", name, arg); | |
279 | #else | |
280 | wrapper = ap_os_canonical_filename(cmd->pool, (char *) arg); | |
281 | #endif | |
282 | @@ -573,7 +573,7 @@ | |
283 | err = fcgi_util_check_access(tp, wrapper, NULL, X_OK, fcgi_user_id, fcgi_group_id); | |
284 | if (err) | |
285 | { | |
286 | - return ap_psprintf(tp, "%s: \"%s\" execute access for server " | |
287 | + return apr_psprintf(tp, "%s: \"%s\" execute access for server " | |
288 | "(uid %ld, gid %ld) failed: %s", name, wrapper, | |
289 | (long) fcgi_user_id, (long) fcgi_group_id, err); | |
290 | } | |
08b8dbf5 AM |
291 | @@ -596,7 +596,7 @@ |
292 | const char *option, *err; | |
293 | ||
294 | /* Allocate temp storage for the array of initial environment variables */ | |
295 | - char **envp = ap_pcalloc(tp, sizeof(char *) * (MAX_INIT_ENV_VARS + 3)); | |
296 | + char **envp = apr_pcalloc(tp, sizeof(char *) * (MAX_INIT_ENV_VARS + 3)); | |
297 | unsigned int envc = 0; | |
298 | ||
299 | #ifdef WIN32 | |
25a8184f AM |
300 | @@ -613,11 +613,11 @@ |
301 | return "AppClass requires a pathname!?"; | |
302 | ||
303 | if ((err = fcgi_config_set_fcgi_uid_n_gid(1)) != NULL) | |
304 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
305 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
306 | ||
307 | #ifdef APACHE2 | |
308 | if (apr_filepath_merge(&fs_path, "", fs_path, 0, p)) | |
309 | - return ap_psprintf(tp, "%s %s: invalid filepath", name, fs_path); | |
310 | + return apr_psprintf(tp, "%s %s: invalid filepath", name, fs_path); | |
311 | #else | |
312 | fs_path = ap_os_canonical_filename(p, fs_path); | |
313 | #endif | |
314 | @@ -631,14 +631,14 @@ | |
315 | fcgi_util_get_server_gid(cmd->server)); | |
316 | if (s != NULL) { | |
317 | if (fcgi_wrapper) { | |
318 | - return ap_psprintf(tp, | |
319 | + return apr_psprintf(tp, | |
320 | "%s: redefinition of a previously defined FastCGI " | |
321 | "server \"%s\" with uid=%ld and gid=%ld", | |
322 | name, fs_path, (long) fcgi_util_get_server_uid(cmd->server), | |
323 | (long) fcgi_util_get_server_gid(cmd->server)); | |
324 | } | |
325 | else { | |
326 | - return ap_psprintf(tp, | |
327 | + return apr_psprintf(tp, | |
328 | "%s: redefinition of a previously defined FastCGI server \"%s\"", | |
329 | name, fs_path); | |
330 | } | |
331 | @@ -646,7 +646,7 @@ | |
332 | ||
333 | err = fcgi_util_fs_is_path_ok(tp, fs_path, NULL); | |
334 | if (err != NULL) { | |
335 | - return ap_psprintf(tp, "%s: \"%s\" %s", name, fs_path, err); | |
336 | + return apr_psprintf(tp, "%s: \"%s\" %s", name, fs_path, err); | |
337 | } | |
338 | ||
339 | s = fcgi_util_fs_new(p); | |
340 | @@ -672,7 +672,7 @@ | |
341 | ||
342 | SetHandleInformation(mutex, HANDLE_FLAG_INHERIT, TRUE); | |
343 | ||
344 | - s->mutex_env_string = ap_psprintf(p, "_FCGI_MUTEX_=%ld", mutex); | |
345 | + s->mutex_env_string = apr_psprintf(p, "_FCGI_MUTEX_=%ld", mutex); | |
346 | ||
347 | #endif | |
348 | ||
349 | @@ -730,7 +730,7 @@ | |
350 | } | |
351 | else if (strcasecmp(option, "-user") == 0) { | |
352 | #ifdef WIN32 | |
353 | - return ap_psprintf(tp, | |
354 | + return apr_psprintf(tp, | |
355 | "%s %s: the -user option isn't supported on WIN", name, fs_path); | |
356 | #else | |
357 | s->user = ap_getword_conf(tp, &arg); | |
358 | @@ -740,7 +740,7 @@ | |
359 | } | |
360 | else if (strcasecmp(option, "-group") == 0) { | |
361 | #ifdef WIN32 | |
362 | - return ap_psprintf(tp, | |
363 | + return apr_psprintf(tp, | |
364 | "%s %s: the -group option isn't supported on WIN", name, fs_path); | |
365 | #else | |
366 | s->group = ap_getword_conf(tp, &arg); | |
367 | @@ -749,7 +749,7 @@ | |
368 | #endif | |
369 | } | |
370 | else { | |
371 | - return ap_psprintf(tp, "%s %s: invalid option: %s", name, fs_path, option); | |
372 | + return apr_psprintf(tp, "%s %s: invalid option: %s", name, fs_path, option); | |
373 | } | |
374 | } /* while */ | |
375 | ||
376 | @@ -758,12 +758,12 @@ | |
377 | { | |
378 | if (s->group == NULL) | |
379 | { | |
380 | - s->group = ap_psprintf(tp, "#%ld", fcgi_util_get_server_gid(cmd->server)); | |
381 | + s->group = apr_psprintf(tp, "#%ld", fcgi_util_get_server_gid(cmd->server)); | |
382 | } | |
383 | ||
384 | if (s->user == NULL) | |
385 | { | |
386 | - s->user = ap_psprintf(p, "#%ld", fcgi_util_get_server_uid(cmd->server)); | |
387 | + s->user = apr_psprintf(p, "#%ld", fcgi_util_get_server_uid(cmd->server)); | |
388 | } | |
389 | ||
390 | s->uid = ap_uname2id(s->user); | |
391 | @@ -777,19 +777,19 @@ | |
392 | ||
393 | if ((err = fcgi_util_fs_set_uid_n_gid(p, s, s->uid, s->gid))) | |
394 | { | |
395 | - return ap_psprintf(tp, | |
396 | + return apr_psprintf(tp, | |
397 | "%s %s: invalid user or group: %s", name, fs_path, err); | |
398 | } | |
399 | #endif /* !WIN32 */ | |
400 | ||
401 | if (s->socket_path != NULL && s->port != 0) { | |
402 | - return ap_psprintf(tp, | |
403 | + return apr_psprintf(tp, | |
404 | "%s %s: -port and -socket are mutually exclusive options", | |
405 | name, fs_path); | |
08b8dbf5 AM |
406 | } |
407 | ||
408 | /* Move env array to a surviving pool */ | |
409 | - s->envp = (char **)ap_pcalloc(p, sizeof(char *) * (envc + 4)); | |
410 | + s->envp = (char **)apr_pcalloc(p, sizeof(char *) * (envc + 4)); | |
411 | memcpy(s->envp, envp, sizeof(char *) * envc); | |
412 | ||
413 | /* Initialize process structs */ | |
25a8184f AM |
414 | @@ -800,12 +800,12 @@ |
415 | err = fcgi_util_socket_make_inet_addr(p, (struct sockaddr_in **)&s->socket_addr, | |
416 | &s->socket_addr_len, NULL, s->port); | |
417 | if (err != NULL) | |
418 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
419 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
420 | #ifdef WIN32 | |
421 | err = fcgi_util_socket_make_inet_addr(p, (struct sockaddr_in **)&s->dest_addr, | |
422 | &s->socket_addr_len, "localhost", s->port); | |
423 | if (err != NULL) | |
424 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
425 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
426 | #endif | |
427 | } else { | |
428 | if (s->socket_path == NULL) | |
429 | @@ -825,7 +825,7 @@ | |
430 | err = fcgi_util_socket_make_domain_addr(p, (struct sockaddr_un **)&s->socket_addr, | |
431 | &s->socket_addr_len, s->socket_path); | |
432 | if (err != NULL) | |
433 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
434 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
435 | #endif | |
436 | } | |
437 | ||
438 | @@ -853,12 +853,12 @@ | |
b266052a AM |
439 | } |
440 | ||
441 | if (!*fs_path) { | |
442 | - return ap_pstrcat(tp, name, " requires a path and either a -socket or -host option", NULL); | |
443 | + return apr_pstrcat(tp, name, " requires a path and either a -socket or -host option", NULL); | |
444 | } | |
445 | ||
446 | #ifdef APACHE2 | |
25a8184f AM |
447 | if (apr_filepath_merge(&fs_path, "", fs_path, 0, p)) |
448 | - return ap_psprintf(tp, "%s %s: invalid filepath", name, fs_path); | |
449 | + return apr_psprintf(tp, "%s %s: invalid filepath", name, fs_path); | |
450 | #else | |
451 | fs_path = ap_os_canonical_filename(p, fs_path); | |
452 | #endif | |
453 | @@ -873,7 +873,7 @@ | |
454 | fcgi_util_get_server_gid(cmd->server)); | |
455 | if (s != NULL) { | |
456 | if (fcgi_wrapper) { | |
457 | - return ap_psprintf(tp, | |
458 | + return apr_psprintf(tp, | |
459 | "%s: redefinition of a previously defined class \"%s\" " | |
460 | "with uid=%ld and gid=%ld", | |
461 | name, fs_path, (long) fcgi_util_get_server_uid(cmd->server), | |
462 | @@ -881,7 +881,7 @@ | |
463 | } | |
464 | else | |
465 | { | |
466 | - return ap_psprintf(tp, | |
467 | + return apr_psprintf(tp, | |
468 | "%s: redefinition of previously defined class \"%s\"", name, fs_path); | |
469 | } | |
470 | } | |
471 | @@ -920,7 +920,7 @@ | |
472 | } | |
473 | else if (strcasecmp(option, "-user") == 0) { | |
474 | #ifdef WIN32 | |
475 | - return ap_psprintf(tp, | |
476 | + return apr_psprintf(tp, | |
477 | "%s %s: the -user option isn't supported on WIN", name, fs_path); | |
478 | #else | |
479 | s->user = ap_getword_conf(tp, &arg); | |
480 | @@ -930,7 +930,7 @@ | |
481 | } | |
482 | else if (strcasecmp(option, "-group") == 0) { | |
483 | #ifdef WIN32 | |
484 | - return ap_psprintf(tp, | |
485 | + return apr_psprintf(tp, | |
486 | "%s %s: the -group option isn't supported on WIN", name, fs_path); | |
487 | #else | |
488 | s->group = ap_getword_conf(tp, &arg); | |
489 | @@ -939,7 +939,7 @@ | |
490 | #endif | |
491 | } | |
492 | else { | |
493 | - return ap_psprintf(tp, "%s %s: invalid option: %s", name, fs_path, option); | |
494 | + return apr_psprintf(tp, "%s %s: invalid option: %s", name, fs_path, option); | |
495 | } | |
496 | } /* while */ | |
497 | ||
498 | @@ -949,12 +949,12 @@ | |
499 | { | |
500 | if (s->group == NULL) | |
501 | { | |
502 | - s->group = ap_psprintf(tp, "#%ld", fcgi_util_get_server_gid(cmd->server)); | |
503 | + s->group = apr_psprintf(tp, "#%ld", fcgi_util_get_server_gid(cmd->server)); | |
504 | } | |
505 | ||
506 | if (s->user == NULL) | |
507 | { | |
508 | - s->user = ap_psprintf(p, "#%ld", fcgi_util_get_server_uid(cmd->server)); | |
509 | + s->user = apr_psprintf(p, "#%ld", fcgi_util_get_server_uid(cmd->server)); | |
510 | } | |
511 | ||
512 | s->uid = ap_uname2id(s->user); | |
513 | @@ -968,19 +968,19 @@ | |
514 | ||
515 | if ((err = fcgi_util_fs_set_uid_n_gid(p, s, s->uid, s->gid))) | |
516 | { | |
517 | - return ap_psprintf(tp, | |
518 | + return apr_psprintf(tp, | |
519 | "%s %s: invalid user or group: %s", name, fs_path, err); | |
520 | } | |
521 | #endif /* !WIN32 */ | |
522 | ||
523 | /* Require one of -socket or -host, but not both */ | |
524 | if (s->socket_path != NULL && s->port != 0) { | |
525 | - return ap_psprintf(tp, | |
526 | + return apr_psprintf(tp, | |
527 | "%s %s: -host and -socket are mutually exclusive options", | |
528 | name, fs_path); | |
529 | } | |
530 | if (s->socket_path == NULL && s->port == 0) { | |
531 | - return ap_psprintf(tp, | |
532 | + return apr_psprintf(tp, | |
533 | "%s %s: -socket or -host option missing", name, fs_path); | |
534 | } | |
535 | ||
536 | @@ -989,7 +989,7 @@ | |
537 | err = fcgi_util_socket_make_inet_addr(p, (struct sockaddr_in **)&s->socket_addr, | |
538 | &s->socket_addr_len, s->host, s->port); | |
539 | if (err != NULL) | |
540 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
541 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
542 | } else { | |
543 | ||
544 | if (fcgi_socket_dir == NULL) | |
545 | @@ -1006,7 +1006,7 @@ | |
546 | err = fcgi_util_socket_make_domain_addr(p, (struct sockaddr_un **)&s->socket_addr, | |
547 | &s->socket_addr_len, s->socket_path); | |
548 | if (err != NULL) | |
549 | - return ap_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
550 | + return apr_psprintf(tp, "%s %s: %s", name, fs_path, err); | |
551 | #endif | |
552 | } | |
553 | ||
08b8dbf5 AM |
554 | @@ -1037,7 +1037,7 @@ |
555 | ||
556 | /* Allocate temp storage for an initial environment */ | |
557 | unsigned int envc = 0; | |
558 | - char **envp = (char **)ap_pcalloc(tp, sizeof(char *) * (MAX_INIT_ENV_VARS + 3)); | |
559 | + char **envp = (char **)apr_pcalloc(tp, sizeof(char *) * (MAX_INIT_ENV_VARS + 3)); | |
560 | ||
561 | err = ap_check_cmd_context(cmd, GLOBAL_ONLY); | |
562 | if (err) | |
25a8184f AM |
563 | @@ -1131,20 +1131,20 @@ |
564 | dynamicFlush = TRUE; | |
565 | } | |
566 | else { | |
567 | - return ap_psprintf(tp, "%s: invalid option: %s", name, option); | |
568 | + return apr_psprintf(tp, "%s: invalid option: %s", name, option); | |
569 | } | |
570 | } /* while */ | |
571 | ||
572 | if (dynamicProcessSlack >= dynamicMaxProcs + 1) { | |
573 | /* the kill policy would work unexpectedly */ | |
574 | - return ap_psprintf(tp, | |
575 | + return apr_psprintf(tp, | |
576 | "%s: processSlack (%u) must be less than maxProcesses (%u) + 1", | |
577 | name, dynamicProcessSlack, dynamicMaxProcs); | |
578 | } | |
08b8dbf5 AM |
579 | |
580 | /* Move env array to a surviving pool, leave 2 extra slots for | |
581 | * WIN32 _FCGI_MUTEX_ and _FCGI_SHUTDOWN_EVENT_ */ | |
582 | - dynamicEnvp = (char **)ap_pcalloc(p, sizeof(char *) * (envc + 4)); | |
583 | + dynamicEnvp = (char **)apr_pcalloc(p, sizeof(char *) * (envc + 4)); | |
584 | memcpy(dynamicEnvp, envp, sizeof(char *) * envc); | |
585 | ||
586 | return NULL; | |
587 | @@ -1152,7 +1152,7 @@ | |
588 | ||
589 | void *fcgi_config_create_dir_config(pool *p, char *dummy) | |
590 | { | |
591 | - fcgi_dir_config *dir_config = ap_pcalloc(p, sizeof(fcgi_dir_config)); | |
592 | + fcgi_dir_config *dir_config = apr_pcalloc(p, sizeof(fcgi_dir_config)); | |
593 | ||
594 | dir_config->authenticator_options = FCGI_AUTHORITATIVE; | |
595 | dir_config->authorizer_options = FCGI_AUTHORITATIVE; | |
25a8184f AM |
596 | @@ -1171,7 +1171,7 @@ |
597 | ||
598 | #ifdef APACHE2 | |
599 | if (apr_filepath_merge(&auth_server, "", fs_path, 0, cmd->pool)) | |
600 | - return ap_psprintf(tp, "%s %s: invalid filepath", cmd->cmd->name, fs_path); | |
601 | + return apr_psprintf(tp, "%s %s: invalid filepath", cmd->cmd->name, fs_path); | |
602 | #else | |
603 | auth_server = (char *) ap_os_canonical_filename(cmd->pool, fs_path); | |
604 | #endif | |
605 | @@ -1184,11 +1184,11 @@ | |
606 | { | |
607 | const char *err = fcgi_util_fs_is_path_ok(tp, auth_server, NULL); | |
608 | if (err) | |
609 | - return ap_psprintf(tp, "%s: \"%s\" %s", cmd->cmd->name, auth_server, err); | |
610 | + return apr_psprintf(tp, "%s: \"%s\" %s", cmd->cmd->name, auth_server, err); | |
611 | } | |
612 | ||
613 | if (compat && strcasecmp(compat, "-compat")) | |
614 | - return ap_psprintf(cmd->temp_pool, "%s: unknown option: \"%s\"", cmd->cmd->name, compat); | |
615 | + return apr_psprintf(cmd->temp_pool, "%s: unknown option: \"%s\"", cmd->cmd->name, compat); | |
616 | ||
617 | switch((int)cmd->info) { | |
618 | case FCGI_AUTH_TYPE_AUTHENTICATOR: | |
da9b5889 AM |
619 | diff -urN mod_fastcgi-2.4.2.org/fcgi_pm.c mod_fastcgi-2.4.2/fcgi_pm.c |
620 | --- mod_fastcgi-2.4.2.org/fcgi_pm.c 2004-10-06 20:30:46.337894116 +0200 | |
3021dd26 AM |
621 | +++ mod_fastcgi-2.4.2/fcgi_pm.c 2004-10-06 21:53:04.263059457 +0200 |
622 | @@ -225,7 +225,7 @@ | |
623 | #ifdef WIN32 | |
624 | errno = WSAGetLastError(); | |
625 | #endif | |
626 | - ap_snprintf(port, sizeof(port), "port=%d", | |
627 | + apr_snprintf(port, sizeof(port), "port=%d", | |
628 | ((struct sockaddr_in *)fs->socket_addr)->sin_port); | |
629 | ||
630 | ap_log_error(FCGI_LOG_CRIT_ERRNO, fcgi_apache_main_server, | |
08b8dbf5 AM |
631 | @@ -365,7 +365,7 @@ |
632 | if (dnEnd == NULL) { | |
633 | dirName = "./"; | |
634 | } else { | |
635 | - dirName = ap_pcalloc(fcgi_config_pool, dnEnd - fs->fs_path + 1); | |
636 | + dirName = apr_pcalloc(fcgi_config_pool, dnEnd - fs->fs_path + 1); | |
637 | dirName = memcpy(dirName, fs->fs_path, dnEnd - fs->fs_path); | |
638 | } | |
639 | if (chdir(dirName) < 0) { | |
25a8184f AM |
640 | @@ -489,7 +489,7 @@ |
641 | ||
642 | SetHandleInformation(process->terminationEvent, HANDLE_FLAG_INHERIT, TRUE); | |
643 | ||
644 | - termination_env_string = ap_psprintf(tp, | |
645 | + termination_env_string = apr_psprintf(tp, | |
646 | "_FCGI_SHUTDOWN_EVENT_=%ld", process->terminationEvent); | |
647 | ||
648 | while (fs->envp[i]) i++; | |
da9b5889 AM |
649 | @@ -576,7 +576,7 @@ |
650 | fs->envp[i - 1] = NULL; | |
651 | } | |
652 | ||
653 | - ap_destroy_pool(tp); | |
16e18e7f | 654 | + apr_pool_destroy(tp); |
da9b5889 AM |
655 | |
656 | return proc.pid; | |
657 | ||
25a8184f AM |
658 | @@ -614,7 +614,7 @@ |
659 | } | |
660 | SetHandleInformation(process->terminationEvent, HANDLE_FLAG_INHERIT, TRUE); | |
661 | ||
662 | - termination_env_string = ap_psprintf(tp, | |
663 | + termination_env_string = apr_psprintf(tp, | |
664 | "_FCGI_SHUTDOWN_EVENT_=%ld", process->terminationEvent); | |
665 | ||
666 | if (fs->socket_path) | |
da9b5889 AM |
667 | @@ -659,7 +659,7 @@ |
668 | "FastCGI: %s is not executable; ensure interpreted scripts have " | |
669 | "\"#!\" as their first line", | |
670 | fs->fs_path); | |
671 | - ap_destroy_pool(tp); | |
16e18e7f | 672 | + apr_pool_destroy(tp); |
da9b5889 AM |
673 | goto CLEANUP; |
674 | } | |
675 | ||
b266052a AM |
676 | @@ -668,9 +668,9 @@ |
677 | * the arguments (if there are any). | |
678 | * Build the command string to pass to CreateProcess. | |
679 | */ | |
680 | - quoted_filename = ap_pstrcat(tp, "\"", fs->fs_path, "\"", NULL); | |
681 | + quoted_filename = apr_pstrcat(tp, "\"", fs->fs_path, "\"", NULL); | |
682 | if (interpreter && *interpreter) { | |
683 | - pCommand = ap_pstrcat(tp, interpreter, " ", quoted_filename, NULL); | |
684 | + pCommand = apr_pstrcat(tp, interpreter, " ", quoted_filename, NULL); | |
685 | } | |
686 | else { | |
687 | pCommand = quoted_filename; | |
08b8dbf5 AM |
688 | @@ -704,7 +704,7 @@ |
689 | iEnvBlockLen += strlen(termination_env_string) + 1; | |
690 | iEnvBlockLen += strlen(fs->mutex_env_string) + 1; | |
691 | ||
692 | - pEnvBlock = (char *) ap_pcalloc(tp, iEnvBlockLen); | |
693 | + pEnvBlock = (char *) apr_pcalloc(tp, iEnvBlockLen); | |
694 | ||
695 | i = 0; | |
696 | pNext = pEnvBlock; | |
da9b5889 AM |
697 | @@ -744,7 +744,7 @@ |
698 | CloseHandle(listen_handle); | |
699 | } | |
700 | ||
701 | - ap_destroy_pool(tp); | |
16e18e7f | 702 | + apr_pool_destroy(tp); |
da9b5889 AM |
703 | |
704 | return pid; | |
705 | ||
25a8184f AM |
706 | @@ -1071,10 +1071,10 @@ |
707 | s->flush = dynamicFlush; | |
90890b93 AM |
708 | |
709 | #ifdef WIN32 | |
25a8184f | 710 | - s->mutex_env_string = ap_psprintf(sp, "_FCGI_MUTEX_=%ld", mutex); |
90890b93 | 711 | - s->fs_path = ap_pstrdup(sp, cjob->fs_path); |
25a8184f | 712 | + s->mutex_env_string = apr_psprintf(sp, "_FCGI_MUTEX_=%ld", mutex); |
90890b93 AM |
713 | + s->fs_path = apr_pstrdup(sp, cjob->fs_path); |
714 | #else | |
715 | - s->fs_path = ap_pstrdup(sp, execName); | |
716 | + s->fs_path = apr_pstrdup(sp, execName); | |
717 | #endif | |
718 | ap_getparents(s->fs_path); | |
719 | ap_no2slash(s->fs_path); | |
08b8dbf5 AM |
720 | @@ -1094,7 +1094,7 @@ |
721 | s->socket_path = fcgi_util_socket_make_path_absolute(sp, s->socket_path, 1); | |
722 | ||
723 | /* Create sockaddr, prealloc it so it won't get created in tp */ | |
724 | - s->socket_addr = ap_pcalloc(sp, sizeof(struct sockaddr_un)); | |
725 | + s->socket_addr = apr_pcalloc(sp, sizeof(struct sockaddr_un)); | |
726 | err = fcgi_util_socket_make_domain_addr(tp, (struct sockaddr_un **)&s->socket_addr, | |
727 | &s->socket_addr_len, s->socket_path); | |
728 | if (err) { | |
25a8184f | 729 | @@ -1120,11 +1120,11 @@ |
90890b93 AM |
730 | goto BagNewServer; |
731 | } | |
732 | s->uid = pw->pw_uid; | |
733 | - s->user = ap_pstrdup(sp, user); | |
734 | + s->user = apr_pstrdup(sp, user); | |
735 | s->username = s->user; | |
736 | ||
737 | s->gid = pw->pw_gid; | |
25a8184f AM |
738 | - s->group = ap_psprintf(sp, "%ld", (long)s->gid); |
739 | + s->group = apr_psprintf(sp, "%ld", (long)s->gid); | |
740 | } | |
741 | else { | |
742 | struct passwd *pw; | |
90890b93 AM |
743 | @@ -1137,11 +1137,11 @@ |
744 | execName, (long)s->uid); | |
745 | goto BagNewServer; | |
746 | } | |
747 | - s->user = ap_pstrdup(sp, user); | |
748 | - s->username = ap_pstrdup(sp, pw->pw_name); | |
749 | + s->user = apr_pstrdup(sp, user); | |
750 | + s->username = apr_pstrdup(sp, pw->pw_name); | |
751 | ||
752 | s->gid = (gid_t)atol(group); | |
753 | - s->group = ap_pstrdup(sp, group); | |
754 | + s->group = apr_pstrdup(sp, group); | |
755 | } | |
756 | } | |
757 | #else | |
da9b5889 AM |
758 | @@ -1340,7 +1340,7 @@ |
759 | continue; | |
760 | ||
761 | BagNewServer: | |
762 | - if (sp) ap_destroy_pool(sp); | |
16e18e7f | 763 | + if (sp) apr_pool_destroy(sp); |
da9b5889 AM |
764 | |
765 | #ifdef WIN32 | |
766 | free(cjob->fs_path); | |
767 | @@ -1362,7 +1362,7 @@ | |
768 | } | |
769 | #endif | |
770 | ||
771 | - ap_destroy_pool(tp); | |
16e18e7f | 772 | + apr_pool_destroy(tp); |
da9b5889 AM |
773 | } |
774 | ||
775 | /* | |
9148e31a AM |
776 | diff -urN mod_fastcgi-2.4.2.org/fcgi_protocol.c mod_fastcgi-2.4.2/fcgi_protocol.c |
777 | --- mod_fastcgi-2.4.2.org/fcgi_protocol.c 2004-10-06 20:30:46.338893902 +0200 | |
3021dd26 | 778 | +++ mod_fastcgi-2.4.2/fcgi_protocol.c 2004-10-06 21:53:04.266058814 +0200 |
0c3d82c2 | 779 | @@ -110,21 +110,21 @@ |
08b8dbf5 AM |
780 | char *first, *last; |
781 | ||
782 | if (r->the_request == NULL) | |
783 | - return (char *) ap_pcalloc(r->pool, 1); | |
784 | + return (char *) apr_pcalloc(r->pool, 1); | |
785 | ||
786 | first = r->the_request; /* use the request-line */ | |
787 | ||
0c3d82c2 AM |
788 | - while (*first && !ap_isspace(*first)) |
789 | + while (*first && !apr_isspace(*first)) | |
790 | ++first; /* skip over the method */ | |
791 | ||
792 | - while (ap_isspace(*first)) | |
793 | + while (apr_isspace(*first)) | |
794 | ++first; /* and the space(s) */ | |
795 | ||
796 | last = first; | |
797 | - while (*last && !ap_isspace(*last)) | |
798 | + while (*last && !apr_isspace(*last)) | |
a6aa895c AM |
799 | ++last; /* end at next whitespace */ |
800 | ||
801 | - return ap_pstrndup(r->pool, first, last - first); | |
802 | + return apr_pstrndup(r->pool, first, last - first); | |
803 | } | |
804 | ||
805 | /* Based on Apache's ap_add_cgi_vars() in util_script.c. | |
18820dd5 | 806 | @@ -135,18 +135,18 @@ |
b8ef0a1b AM |
807 | { |
808 | table *e = r->subprocess_env; | |
809 | ||
810 | - ap_table_setn(e, "GATEWAY_INTERFACE", "CGI/1.1"); | |
811 | - ap_table_setn(e, "SERVER_PROTOCOL", r->protocol); | |
812 | - ap_table_setn(e, "REQUEST_METHOD", r->method); | |
813 | - ap_table_setn(e, "QUERY_STRING", r->args ? r->args : ""); | |
814 | - ap_table_setn(e, "REQUEST_URI", apache_original_uri(r)); | |
815 | + apr_table_setn(e, "GATEWAY_INTERFACE", "CGI/1.1"); | |
816 | + apr_table_setn(e, "SERVER_PROTOCOL", r->protocol); | |
817 | + apr_table_setn(e, "REQUEST_METHOD", r->method); | |
818 | + apr_table_setn(e, "QUERY_STRING", r->args ? r->args : ""); | |
819 | + apr_table_setn(e, "REQUEST_URI", apache_original_uri(r)); | |
820 | ||
821 | /* The FastCGI spec precludes sending of CONTENT_LENGTH, PATH_INFO, | |
822 | * PATH_TRANSLATED, and SCRIPT_NAME (for some reason?). PATH_TRANSLATED we | |
18820dd5 AM |
823 | * don't have, its the variable that causes Apache to break trying to set |
824 | * up (and thus the reason this fn exists vs. using ap_add_cgi_vars()). */ | |
825 | if (compat) { | |
826 | - ap_table_unset(e, "CONTENT_LENGTH"); | |
827 | + apr_table_unset(e, "CONTENT_LENGTH"); | |
828 | return; | |
829 | } | |
830 | ||
b8ef0a1b AM |
831 | @@ -155,17 +155,17 @@ |
832 | * args and path_info of the original request, and not any that may have | |
833 | * come with the script URI in the include command. Ugh. */ | |
834 | if (!strcmp(r->protocol, "INCLUDED")) { | |
835 | - ap_table_setn(e, "SCRIPT_NAME", r->uri); | |
836 | + apr_table_setn(e, "SCRIPT_NAME", r->uri); | |
837 | if (r->path_info && *r->path_info) | |
838 | - ap_table_setn(e, "PATH_INFO", r->path_info); | |
839 | + apr_table_setn(e, "PATH_INFO", r->path_info); | |
840 | } | |
841 | else if (!r->path_info || !*r->path_info) | |
842 | - ap_table_setn(e, "SCRIPT_NAME", r->uri); | |
843 | + apr_table_setn(e, "SCRIPT_NAME", r->uri); | |
844 | else { | |
845 | int path_info_start = ap_find_path_info(r->uri, r->path_info); | |
846 | ||
847 | - ap_table_setn(e, "SCRIPT_NAME", ap_pstrndup(r->pool, r->uri, path_info_start)); | |
848 | - ap_table_setn(e, "PATH_INFO", r->path_info); | |
a6aa895c | 849 | + apr_table_setn(e, "SCRIPT_NAME", apr_pstrndup(r->pool, r->uri, path_info_start)); |
b8ef0a1b AM |
850 | + apr_table_setn(e, "PATH_INFO", r->path_info); |
851 | } | |
852 | } | |
853 | ||
854 | @@ -178,9 +178,9 @@ | |
9148e31a AM |
855 | int i = ph->nelts; |
856 | ||
857 | for ( ; i; --i, ++elt) { | |
858 | - const char *val = ap_table_get(fr->r->headers_in, *elt); | |
859 | + const char *val = apr_table_get(fr->r->headers_in, *elt); | |
860 | if (val) { | |
b8ef0a1b AM |
861 | - ap_table_setn(fr->r->subprocess_env, *elt, val); |
862 | + apr_table_setn(fr->r->subprocess_env, *elt, val); | |
9148e31a | 863 | } |
b8ef0a1b AM |
864 | } |
865 | } | |
73152fff AM |
866 | @@ -373,7 +373,7 @@ |
867 | ||
868 | if (fr->fs_stderr == NULL) | |
869 | { | |
870 | - fr->fs_stderr = ap_palloc(p, FCGI_SERVER_MAX_STDERR_LINE_LEN + 1); | |
871 | + fr->fs_stderr = apr_palloc(p, FCGI_SERVER_MAX_STDERR_LINE_LEN + 1); | |
872 | } | |
873 | ||
874 | /* We're gonna consume all thats here */ | |
875 | diff -urN mod_fastcgi-2.4.2.org/fcgi_util.c mod_fastcgi-2.4.2/fcgi_util.c | |
876 | --- mod_fastcgi-2.4.2.org/fcgi_util.c 2004-10-06 20:30:46.339893687 +0200 | |
3021dd26 | 877 | +++ mod_fastcgi-2.4.2/fcgi_util.c 2004-10-06 21:53:04.270057958 +0200 |
b266052a AM |
878 | @@ -55,7 +55,7 @@ |
879 | fcgi_util_socket_hash_filename(pool *p, const char *path, | |
880 | const char *user, const char *group) | |
881 | { | |
882 | - char *buf = ap_pstrcat(p, path, user, group, NULL); | |
883 | + char *buf = apr_pstrcat(p, path, user, group, NULL); | |
884 | ||
885 | /* Canonicalize the path (remove "//", ".", "..") */ | |
886 | ap_getparents(buf); | |
887 | @@ -77,13 +77,13 @@ | |
888 | x = strlen(src1); | |
889 | ||
890 | if (x == 0) { | |
891 | - p = ap_pstrcat(a, "\\", src2, NULL); | |
892 | + p = apr_pstrcat(a, "\\", src2, NULL); | |
893 | } | |
894 | else if (src1[x - 1] != '\\' && src1[x - 1] != '/') { | |
895 | - p = ap_pstrcat(a, src1, "\\", src2, NULL); | |
896 | + p = apr_pstrcat(a, src1, "\\", src2, NULL); | |
897 | } | |
898 | else { | |
899 | - p = ap_pstrcat(a, src1, src2, NULL); | |
900 | + p = apr_pstrcat(a, src1, src2, NULL); | |
901 | } | |
902 | ||
903 | q = p ; | |
08b8dbf5 | 904 | @@ -137,12 +137,12 @@ |
b266052a AM |
905 | int socket_pathLen = strlen(socket_path); |
906 | ||
907 | if (socket_pathLen >= sizeof((*socket_addr)->sun_path)) { | |
908 | - return ap_pstrcat(p, "path \"", socket_path, | |
909 | + return apr_pstrcat(p, "path \"", socket_path, | |
910 | "\" is too long for a Domain socket", NULL); | |
911 | } | |
912 | ||
08b8dbf5 AM |
913 | if (*socket_addr == NULL) |
914 | - *socket_addr = ap_pcalloc(p, sizeof(struct sockaddr_un)); | |
915 | + *socket_addr = apr_pcalloc(p, sizeof(struct sockaddr_un)); | |
916 | else | |
917 | memset(*socket_addr, 0, sizeof(struct sockaddr_un)); | |
918 | ||
919 | @@ -194,7 +194,7 @@ | |
920 | int *socket_addr_len, const char *host, unsigned short port) | |
921 | { | |
922 | if (*socket_addr == NULL) | |
923 | - *socket_addr = ap_pcalloc(p, sizeof(struct sockaddr_in)); | |
924 | + *socket_addr = apr_pcalloc(p, sizeof(struct sockaddr_in)); | |
925 | else | |
926 | memset(*socket_addr, 0, sizeof(struct sockaddr_in)); | |
927 | ||
b266052a AM |
928 | @@ -204,7 +204,7 @@ |
929 | /* Get an in_addr represention of the host */ | |
930 | if (host != NULL) { | |
931 | if (convert_string_to_in_addr(host, &(*socket_addr)->sin_addr) != 1) { | |
932 | - return ap_pstrcat(p, "failed to resolve \"", host, | |
933 | + return apr_pstrcat(p, "failed to resolve \"", host, | |
934 | "\" to exactly one IP address", NULL); | |
935 | } | |
936 | } else { | |
25a8184f AM |
937 | @@ -227,7 +227,7 @@ |
938 | ||
939 | if (statBuf == NULL) { | |
940 | if (stat(path, &myStatBuf) < 0) | |
941 | - return ap_psprintf(tp, "stat(%s) failed: %s", path, strerror(errno)); | |
942 | + return apr_psprintf(tp, "stat(%s) failed: %s", path, strerror(errno)); | |
943 | statBuf = &myStatBuf; | |
944 | } | |
945 | ||
f3a4bc7a AM |
946 | @@ -311,7 +311,7 @@ |
947 | fcgi_server *s; | |
948 | ||
949 | /* @@@ This should now be done in the loop below */ | |
950 | - ap_cpystrn(path, ePath, FCGI_MAXPATH); | |
951 | + apr_cpystrn(path, ePath, FCGI_MAXPATH); | |
952 | ap_no2slash(path); | |
953 | ||
954 | for (s = fcgi_servers; s != NULL; s = s->next) { | |
955 | @@ -343,7 +343,7 @@ | |
956 | char path[FCGI_MAXPATH]; | |
957 | fcgi_server *s; | |
958 | ||
959 | - ap_cpystrn(path, ePath, FCGI_MAXPATH); | |
960 | + apr_cpystrn(path, ePath, FCGI_MAXPATH); | |
961 | ap_no2slash(path); | |
962 | ||
963 | for (s = fcgi_servers; s != NULL; s = s->next) { | |
dfbaf0db | 964 | @@ -367,16 +367,16 @@ |
73152fff AM |
965 | const char *err; |
966 | ||
967 | if (finfo == NULL) { | |
968 | - finfo = (struct stat *)ap_palloc(p, sizeof(struct stat)); | |
969 | + finfo = (struct stat *)apr_palloc(p, sizeof(struct stat)); | |
970 | if (stat(fs_path, finfo) < 0) | |
25a8184f AM |
971 | - return ap_psprintf(p, "stat(%s) failed: %s", fs_path, strerror(errno)); |
972 | + return apr_psprintf(p, "stat(%s) failed: %s", fs_path, strerror(errno)); | |
73152fff | 973 | } |
25a8184f AM |
974 | |
975 | if (finfo->st_mode == 0) | |
976 | - return ap_psprintf(p, "script not found or unable to stat()"); | |
977 | + return apr_psprintf(p, "script not found or unable to stat()"); | |
978 | ||
979 | if (S_ISDIR(finfo->st_mode)) | |
980 | - return ap_psprintf(p, "script is a directory!"); | |
981 | + return apr_psprintf(p, "script is a directory!"); | |
982 | ||
983 | /* Let the wrapper determine what it can and can't execute */ | |
984 | if (! fcgi_wrapper) | |
985 | @@ -392,7 +392,7 @@ | |
986 | err = fcgi_util_check_access(p, fs_path, finfo, X_OK, fcgi_user_id, fcgi_group_id); | |
987 | #endif | |
988 | if (err) { | |
989 | - return ap_psprintf(p, | |
990 | + return apr_psprintf(p, | |
991 | "access for server (uid %ld, gid %ld) not allowed: %s", | |
992 | (long)fcgi_user_id, (long)fcgi_group_id, err); | |
993 | } | |
08b8dbf5 AM |
994 | @@ -409,7 +409,7 @@ |
995 | fcgi_server * | |
996 | fcgi_util_fs_new(pool *p) | |
997 | { | |
998 | - fcgi_server *s = (fcgi_server *) ap_pcalloc(p, sizeof(fcgi_server)); | |
999 | + fcgi_server *s = (fcgi_server *) apr_pcalloc(p, sizeof(fcgi_server)); | |
1000 | ||
1001 | /* Initialize anything who's init state is not zeroizzzzed */ | |
1002 | s->listenQueueDepth = FCGI_DEFAULT_LISTEN_Q; | |
25a8184f AM |
1003 | @@ -462,23 +462,23 @@ |
1004 | s->uid = uid; | |
1005 | pw = getpwuid(uid); | |
1006 | if (pw == NULL) { | |
1007 | - return ap_psprintf(p, | |
1008 | + return apr_psprintf(p, | |
1009 | "getpwuid() couldn't determine the username for uid '%ld', " | |
90890b93 AM |
1010 | "you probably need to modify the User directive: %s", |
1011 | (long)uid, strerror(errno)); | |
1012 | } | |
1013 | - s->user = ap_pstrdup(p, pw->pw_name); | |
1014 | + s->user = apr_pstrdup(p, pw->pw_name); | |
1015 | s->username = s->user; | |
1016 | ||
1017 | s->gid = gid; | |
25a8184f AM |
1018 | gr = getgrgid(gid); |
1019 | if (gr == NULL) { | |
1020 | - return ap_psprintf(p, | |
1021 | + return apr_psprintf(p, | |
1022 | "getgrgid() couldn't determine the group name for gid '%ld', " | |
90890b93 AM |
1023 | "you probably need to modify the Group directive: %s", |
1024 | (long)gid, strerror(errno)); | |
1025 | } | |
1026 | - s->group = ap_pstrdup(p, gr->gr_name); | |
1027 | + s->group = apr_pstrdup(p, gr->gr_name); | |
1028 | ||
1029 | #endif /* !WIN32 */ | |
1030 | ||
08b8dbf5 AM |
1031 | @@ -492,7 +492,7 @@ |
1032 | fcgi_util_fs_create_procs(pool *p, int num) | |
1033 | { | |
1034 | int i; | |
1035 | - ServerProcess *proc = (ServerProcess *)ap_pcalloc(p, sizeof(ServerProcess) * num); | |
1036 | + ServerProcess *proc = (ServerProcess *)apr_pcalloc(p, sizeof(ServerProcess) * num); | |
1037 | ||
1038 | for (i = 0; i < num; i++) { | |
1039 | #ifdef WIN32 | |
4c3c1d65 AM |
1040 | diff -urN mod_fastcgi-2.4.2.org/mod_fastcgi.c mod_fastcgi-2.4.2/mod_fastcgi.c |
1041 | --- mod_fastcgi-2.4.2.org/mod_fastcgi.c 2004-10-06 20:30:46.355890260 +0200 | |
3021dd26 | 1042 | +++ mod_fastcgi-2.4.2/mod_fastcgi.c 2004-10-06 21:53:04.284054959 +0200 |
4c3c1d65 AM |
1043 | @@ -267,7 +267,7 @@ |
1044 | ||
1045 | /* Register to reset to default values when the config pool is cleaned */ | |
1046 | ap_block_alarms(); | |
1047 | - ap_register_cleanup(p, NULL, fcgi_config_reset_globals, ap_null_cleanup); | |
1f402f3f | 1048 | + apr_pool_cleanup_register(p, NULL, fcgi_config_reset_globals, apr_pool_cleanup_null); |
4c3c1d65 AM |
1049 | ap_unblock_alarms(); |
1050 | ||
1051 | #ifdef APACHE2 | |
b266052a AM |
1052 | @@ -285,7 +285,7 @@ |
1053 | #ifdef WIN32 | |
1054 | if (fcgi_socket_dir == NULL) | |
1055 | fcgi_socket_dir = DEFAULT_SOCK_DIR; | |
1056 | - fcgi_dynamic_dir = ap_pstrcat(p, fcgi_socket_dir, "dynamic", NULL); | |
1057 | + fcgi_dynamic_dir = apr_pstrcat(p, fcgi_socket_dir, "dynamic", NULL); | |
1058 | #else | |
1059 | ||
1060 | if (fcgi_socket_dir == NULL) | |
25a8184f AM |
1061 | @@ -722,11 +722,11 @@ |
1062 | } | |
1063 | if (statusValue < 0) { | |
1064 | fr->parseHeader = SCAN_CGI_BAD_HEADER; | |
1065 | - return ap_psprintf(r->pool, "invalid Status '%s'", value); | |
1066 | + return apr_psprintf(r->pool, "invalid Status '%s'", value); | |
90890b93 AM |
1067 | } |
1068 | hasStatus = TRUE; | |
1069 | r->status = statusValue; | |
1070 | - r->status_line = ap_pstrdup(r->pool, value); | |
1071 | + r->status_line = apr_pstrdup(r->pool, value); | |
1072 | continue; | |
1073 | } | |
1074 | ||
bcb196ad | 1075 | @@ -738,7 +738,7 @@ |
dfbaf0db | 1076 | #ifdef APACHE2 |
bcb196ad | 1077 | ap_set_content_type(r, value); |
dfbaf0db | 1078 | #else |
90890b93 AM |
1079 | - r->content_type = ap_pstrdup(r->pool, value); |
1080 | + r->content_type = apr_pstrdup(r->pool, value); | |
dfbaf0db | 1081 | #endif |
90890b93 AM |
1082 | continue; |
1083 | } | |
71e695ab AM |
1084 | @@ -745,16 +745,16 @@ |
1085 | goto DuplicateNotAllowed; | |
1086 | } | |
1087 | hasLocation = TRUE; | |
1088 | - ap_table_set(r->headers_out, "Location", value); | |
1089 | + apr_table_set(r->headers_out, "Location", value); | |
1090 | continue; | |
04965467 AM |
1091 | } |
1092 | ||
1093 | /* If the script wants them merged, it can do it */ | |
1094 | - ap_table_add(r->err_headers_out, name, value); | |
1095 | + apr_table_add(r->err_headers_out, name, value); | |
1096 | continue; | |
1097 | } | |
1098 | else { | |
1099 | - ap_table_add(fr->authHeaders, name, value); | |
1100 | + apr_table_add(fr->authHeaders, name, value); | |
1101 | } | |
1102 | } | |
1103 | ||
993e98e3 AM |
1104 | @@ -765,7 +765,7 @@ |
1105 | * Who responds, this handler or Apache? | |
1106 | */ | |
1107 | if (hasLocation) { | |
1108 | - const char *location = ap_table_get(r->headers_out, "Location"); | |
1109 | + const char *location = apr_table_get(r->headers_out, "Location"); | |
1110 | /* | |
1111 | * Based on internal redirect handling in mod_cgi.c... | |
1112 | * | |
25a8184f AM |
1113 | @@ -835,11 +835,11 @@ |
1114 | if ((p = strpbrk(name, "\r\n")) != NULL) | |
1115 | *p = '\0'; | |
1116 | fr->parseHeader = SCAN_CGI_BAD_HEADER; | |
1117 | - return ap_psprintf(r->pool, "malformed header '%s'", name); | |
1118 | + return apr_psprintf(r->pool, "malformed header '%s'", name); | |
1119 | ||
1120 | DuplicateNotAllowed: | |
1121 | fr->parseHeader = SCAN_CGI_BAD_HEADER; | |
1122 | - return ap_psprintf(r->pool, "duplicate header '%s'", name); | |
1123 | + return apr_psprintf(r->pool, "duplicate header '%s'", name); | |
1124 | } | |
1125 | ||
1126 | /* | |
90890b93 | 1127 | @@ -1019,9 +1019,9 @@ |
08b8dbf5 AM |
1128 | char *end = strchr(r->uri + 2, '/'); |
1129 | ||
1130 | if (end) | |
1131 | - *user = memcpy(ap_pcalloc(r->pool, end - r->uri), r->uri + 1, end - r->uri - 1); | |
1132 | + *user = memcpy(apr_pcalloc(r->pool, end - r->uri), r->uri + 1, end - r->uri - 1); | |
1133 | else | |
90890b93 AM |
1134 | - *user = ap_pstrdup(r->pool, r->uri + 1); |
1135 | + *user = apr_pstrdup(r->pool, r->uri + 1); | |
08b8dbf5 | 1136 | *group = "-"; |
90890b93 AM |
1137 | } |
1138 | else { | |
25a8184f AM |
1139 | @@ -1030,8 +1030,8 @@ |
1140 | ||
1141 | get_request_identity(r, &uid, &gid); | |
1142 | ||
1143 | - *user = ap_psprintf(r->pool, "%ld", (long) uid); | |
1144 | - *group = ap_psprintf(r->pool, "%ld", (long) gid); | |
1145 | + *user = apr_psprintf(r->pool, "%ld", (long) uid); | |
1146 | + *group = apr_psprintf(r->pool, "%ld", (long) gid); | |
1147 | } | |
1148 | } | |
1149 | ||
90890b93 AM |
1150 | @@ -1225,7 +1225,7 @@ |
1151 | { | |
1152 | /* xxx this handle should live somewhere (see CloseHandle()s below too) */ | |
1153 | char * wait_npipe_mutex_name, * cp; | |
1154 | - wait_npipe_mutex_name = cp = ap_pstrdup(rp, socket_path); | |
1155 | + wait_npipe_mutex_name = cp = apr_pstrdup(rp, socket_path); | |
1156 | while ((cp = strchr(cp, '\\'))) *cp = '/'; | |
1157 | ||
1158 | wait_npipe_mutex = CreateMutex(NULL, FALSE, wait_npipe_mutex_name); | |
4c3c1d65 AM |
1159 | @@ -2318,7 +2318,7 @@ |
1160 | } | |
1161 | ||
1162 | ap_block_alarms(); | |
1163 | - ap_register_cleanup(rp, (void *)fr, cleanup, ap_null_cleanup); | |
1f402f3f | 1164 | + apr_pool_cleanup_register(rp, (void *)fr, cleanup, apr_pool_cleanup_null); |
4c3c1d65 AM |
1165 | ap_unblock_alarms(); |
1166 | ||
1167 | #ifdef WIN32 | |
08b8dbf5 AM |
1168 | @@ -2422,7 +2422,7 @@ |
1169 | const char *fs_path; | |
1170 | pool * const p = r->pool; | |
1171 | fcgi_server *fs; | |
1172 | - fcgi_request * const fr = (fcgi_request *)ap_pcalloc(p, sizeof(fcgi_request)); | |
1173 | + fcgi_request * const fr = (fcgi_request *)apr_pcalloc(p, sizeof(fcgi_request)); | |
1174 | uid_t uid; | |
1175 | gid_t gid; | |
1176 | ||
73152fff AM |
1177 | @@ -2450,7 +2450,7 @@ |
1178 | else | |
1179 | #endif | |
1180 | { | |
1181 | - my_finfo = (struct stat *) ap_palloc(p, sizeof(struct stat)); | |
1182 | + my_finfo = (struct stat *) apr_palloc(p, sizeof(struct stat)); | |
1183 | ||
1184 | if (stat(fs_path, my_finfo) < 0) | |
1185 | { | |
2ff9aba2 AM |
1186 | @@ -2476,7 +2476,7 @@ |
1187 | fr->erBufPtr = fcgi_buf_new(p, sizeof(FCGI_EndRequestBody) + 1); | |
1188 | fr->gotHeader = FALSE; | |
1189 | fr->parseHeader = SCAN_CGI_READING_HEADERS; | |
1190 | - fr->header = ap_make_array(p, 1, 1); | |
9a987e9c | 1191 | + fr->header = apr_array_make(p, 1, 1); |
2ff9aba2 AM |
1192 | fr->fs_stderr = NULL; |
1193 | fr->r = r; | |
1194 | fr->readingEndRequestBody = FALSE; | |
3e63d3d4 AM |
1195 | @@ -2489,7 +2489,7 @@ |
1196 | fr->keepReadingFromFcgiApp = TRUE; | |
1197 | fr->fs = fs; | |
1198 | fr->fs_path = fs_path; | |
1199 | - fr->authHeaders = ap_make_table(p, 10); | |
1200 | + fr->authHeaders = apr_table_make(p, 10); | |
1201 | #ifdef WIN32 | |
1202 | fr->fd = INVALID_SOCKET; | |
1203 | fr->dynamic = ((fs == NULL) || (fs->directive == APP_CLASS_DYNAMIC)) ? TRUE : FALSE; | |
993e98e3 AM |
1204 | @@ -2531,7 +2531,7 @@ |
1205 | */ | |
1206 | static int apache_is_scriptaliased(request_rec *r) | |
1207 | { | |
1208 | - const char *t = ap_table_get(r->notes, "alias-forced-type"); | |
1209 | + const char *t = apr_table_get(r->notes, "alias-forced-type"); | |
1210 | return t && (!strcasecmp(t, "cgi-script")); | |
1211 | } | |
1212 | ||
18820dd5 AM |
1213 | @@ -2554,9 +2554,9 @@ |
1214 | */ | |
1215 | r->method = "GET"; | |
993e98e3 | 1216 | r->method_number = M_GET; |
18820dd5 AM |
1217 | - ap_table_unset(r->headers_in, "Content-length"); |
1218 | + apr_table_unset(r->headers_in, "Content-length"); | |
993e98e3 AM |
1219 | |
1220 | - ap_internal_redirect_handler(ap_table_get(r->headers_out, "Location"), r); | |
1221 | + ap_internal_redirect_handler(apr_table_get(r->headers_out, "Location"), r); | |
1222 | return OK; | |
1223 | ||
1224 | case SCAN_CGI_SRV_REDIRECT: | |
b8ef0a1b AM |
1225 | @@ -2612,21 +2612,21 @@ |
1226 | if (strncasecmp(key, "Variable-", 9) == 0) | |
1227 | key += 9; | |
1228 | ||
1229 | - ap_table_setn(t, key, val); | |
1230 | + apr_table_setn(t, key, val); | |
1231 | return 1; | |
1232 | } | |
1233 | ||
1234 | static int post_process_auth_passed_compat_header(table *t, const char *key, const char * const val) | |
1235 | { | |
1236 | if (strncasecmp(key, "Variable-", 9) == 0) | |
1237 | - ap_table_setn(t, key + 9, val); | |
1238 | + apr_table_setn(t, key + 9, val); | |
1239 | ||
1240 | return 1; | |
1241 | } | |
1242 | ||
1243 | static int post_process_auth_failed_header(table * const t, const char * const key, const char * const val) | |
1244 | { | |
1245 | - ap_table_setn(t, key, val); | |
1246 | + apr_table_setn(t, key, val); | |
1247 | return 1; | |
1248 | } | |
1249 | ||
be58b6e3 AM |
1250 | @@ -2639,16 +2639,16 @@ |
1251 | ||
1252 | if (passed) { | |
1253 | if (fr->auth_compat) { | |
1254 | - ap_table_do((int (*)(void *, const char *, const char *))post_process_auth_passed_compat_header, | |
1255 | + apr_table_do((int (*)(void *, const char *, const char *))post_process_auth_passed_compat_header, | |
1256 | (void *)r->subprocess_env, fr->authHeaders, NULL); | |
1257 | } | |
1258 | else { | |
1259 | - ap_table_do((int (*)(void *, const char *, const char *))post_process_auth_passed_header, | |
1260 | + apr_table_do((int (*)(void *, const char *, const char *))post_process_auth_passed_header, | |
1261 | (void *)r->subprocess_env, fr->authHeaders, NULL); | |
1262 | } | |
1263 | } | |
1264 | else { | |
1265 | - ap_table_do((int (*)(void *, const char *, const char *))post_process_auth_failed_header, | |
1266 | + apr_table_do((int (*)(void *, const char *, const char *))post_process_auth_failed_header, | |
1267 | (void *)r->err_headers_out, fr->authHeaders, NULL); | |
1268 | } | |
1269 | ||
383fd18f AM |
1270 | @@ -2679,10 +2679,10 @@ |
1271 | } | |
1272 | ||
b8ef0a1b | 1273 | /* Save the existing subprocess_env, because we're gonna muddy it up */ |
383fd18f AM |
1274 | - fr->saved_subprocess_env = ap_copy_table(r->pool, r->subprocess_env); |
1275 | + fr->saved_subprocess_env = apr_table_copy(r->pool, r->subprocess_env); | |
b8ef0a1b AM |
1276 | |
1277 | - ap_table_setn(r->subprocess_env, "REMOTE_PASSWD", password); | |
1278 | - ap_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "AUTHENTICATOR"); | |
1279 | + apr_table_setn(r->subprocess_env, "REMOTE_PASSWD", password); | |
1280 | + apr_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "AUTHENTICATOR"); | |
1281 | ||
1282 | /* The FastCGI Protocol doesn't differentiate authentication */ | |
1283 | fr->role = FCGI_AUTHORIZER; | |
993e98e3 AM |
1284 | @@ -2697,7 +2697,7 @@ |
1285 | post_process_auth(fr, authenticated); | |
1286 | ||
1287 | /* A redirect shouldn't be allowed during the authentication phase */ | |
1288 | - if (ap_table_get(r->headers_out, "Location") != NULL) { | |
1289 | + if (apr_table_get(r->headers_out, "Location") != NULL) { | |
1290 | ap_log_rerror(FCGI_LOG_ERR_NOERRNO, r, | |
1291 | "FastCGI: FastCgiAuthenticator \"%s\" redirected (not allowed)", | |
1292 | dir_config->authenticator); | |
383fd18f AM |
1293 | @@ -2746,9 +2746,9 @@ |
1294 | } | |
1295 | ||
b8ef0a1b | 1296 | /* Save the existing subprocess_env, because we're gonna muddy it up */ |
383fd18f AM |
1297 | - fr->saved_subprocess_env = ap_copy_table(r->pool, r->subprocess_env); |
1298 | + fr->saved_subprocess_env = apr_table_copy(r->pool, r->subprocess_env); | |
b8ef0a1b AM |
1299 | |
1300 | - ap_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "AUTHORIZER"); | |
1301 | + apr_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "AUTHORIZER"); | |
1302 | ||
1303 | fr->role = FCGI_AUTHORIZER; | |
1304 | ||
993e98e3 AM |
1305 | @@ -2762,7 +2762,7 @@ |
1306 | post_process_auth(fr, authorized); | |
1307 | ||
1308 | /* A redirect shouldn't be allowed during the authorization phase */ | |
1309 | - if (ap_table_get(r->headers_out, "Location") != NULL) { | |
1310 | + if (apr_table_get(r->headers_out, "Location") != NULL) { | |
1311 | ap_log_rerror(FCGI_LOG_ERR_NOERRNO, r, | |
1312 | "FastCGI: FastCgiAuthorizer \"%s\" redirected (not allowed)", | |
1313 | dir_config->authorizer); | |
383fd18f AM |
1314 | @@ -2806,9 +2806,9 @@ |
1315 | } | |
1316 | ||
b8ef0a1b | 1317 | /* Save the existing subprocess_env, because we're gonna muddy it up */ |
383fd18f AM |
1318 | - fr->saved_subprocess_env = ap_copy_table(r->pool, r->subprocess_env); |
1319 | + fr->saved_subprocess_env = apr_table_copy(r->pool, r->subprocess_env); | |
b8ef0a1b AM |
1320 | |
1321 | - ap_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "ACCESS_CHECKER"); | |
1322 | + apr_table_setn(r->subprocess_env, "FCGI_APACHE_ROLE", "ACCESS_CHECKER"); | |
1323 | ||
1324 | /* The FastCGI Protocol doesn't differentiate access control */ | |
1325 | fr->role = FCGI_AUTHORIZER; | |
993e98e3 AM |
1326 | @@ -2823,7 +2823,7 @@ |
1327 | post_process_auth(fr, access_allowed); | |
1328 | ||
1329 | /* A redirect shouldn't be allowed during the access check phase */ | |
1330 | - if (ap_table_get(r->headers_out, "Location") != NULL) { | |
1331 | + if (apr_table_get(r->headers_out, "Location") != NULL) { | |
1332 | ap_log_rerror(FCGI_LOG_ERR_NOERRNO, r, | |
1333 | "FastCGI: FastCgiAccessChecker \"%s\" redirected (not allowed)", | |
1334 | dir_config->access_checker); |