Received: (from majordom@localhost) by hyperreal.org (8.8.5/8.8.5) id BAA16819; Fri, 19 Sep 1997 01:39:09 -0700 (PDT) Received: (from coar@localhost) by hyperreal.org (8.8.5/8.8.5) id BAA16814 for apache-cvs; Fri, 19 Sep 1997 01:39:07 -0700 (PDT) Date: Fri, 19 Sep 1997 01:39:07 -0700 (PDT) From: Rodent of Unusual Size Message-Id: <199709190839.BAA16814@hyperreal.org> To: apache-cvs@hyperreal.org Subject: cvs commit: apachen/src/modules/standard mod_include.c Sender: apache-cvs-owner@apache.org Precedence: bulk Reply-To: new-httpd@apache.org coar 97/09/19 01:39:06 Modified: src/modules/standard mod_include.c Log: Change references to a "200" status to "HTTP_OK", and change the references to HTTP error codes (NOT_FOUND and FORBIDDEN) to use the HTTP_ prefixed ones. Revision Changes Path 1.53 +5 -5 apachen/src/modules/standard/mod_include.c Index: mod_include.c =================================================================== RCS file: /export/home/cvs/apachen/src/modules/standard/mod_include.c,v retrieving revision 1.52 retrieving revision 1.53 diff -u -r1.52 -r1.53 --- mod_include.c 1997/09/19 08:35:50 1.52 +++ mod_include.c 1997/09/19 08:39:04 1.53 @@ -554,7 +554,7 @@ { request_rec *rr = sub_req_lookup_uri(s, r); - if (rr->status != 200) { + if (rr->status != HTTP_OK) { return -1; } @@ -623,7 +623,7 @@ rr = sub_req_lookup_uri(parsed_string, r); } - if (!error_fmt && rr->status != 200) { + if (!error_fmt && rr->status != HTTP_OK) { error_fmt = "unable to include \"%s\" in parsed file %s"; } @@ -958,7 +958,7 @@ else if (!strcmp(tag, "virtual")) { request_rec *rr = sub_req_lookup_uri(tag_val, r); - if (rr->status == 200 && rr->finfo.st_mode != 0) { + if (rr->status == HTTP_OK && rr->finfo.st_mode != 0) { memcpy((char *) finfo, (const char *) &rr->finfo, sizeof(struct stat)); destroy_sub_req(rr); @@ -2181,13 +2181,13 @@ (r->path_info ? pstrcat(r->pool, r->filename, r->path_info, NULL) : r->filename)); - return NOT_FOUND; + return HTTP_NOT_FOUND; } if (!(f = pfopen(r->pool, r->filename, "r"))) { aplog_error(APLOG_MARK, APLOG_ERR, r->server, "file permissions deny server access: %s", r->filename); - return FORBIDDEN; + return HTTP_FORBIDDEN; } if ((*state == xbithack_full)