Return-Path: Delivered-To: new-httpd-archive@hyperreal.org Received: (qmail 12889 invoked by uid 6000); 25 May 1998 10:02:57 -0000 Received: (qmail 12880 invoked from network); 25 May 1998 10:02:54 -0000 Received: from adler.unix-ag.uni-siegen.de (141.99.42.52) by taz.hyperreal.org with SMTP; 25 May 1998 10:02:54 -0000 Received: from doubleshadow.unix-ag.org (isdna73.hrz.uni-siegen.de [141.99.174.73]) by adler.unix-ag.uni-siegen.de (Mailhost) with ESMTP id MAA04482 for ; Mon, 25 May 1998 12:00:11 +0200 Received: (from sfx@localhost) by doubleshadow.unix-ag.org (Mailhost) id LAA00383 for new-httpd@apache.org; Mon, 25 May 1998 11:27:47 +0200 Message-ID: X-Mailer: XFMail 1.3 [p0/sfx] on Linux X-Priority: 3 (Normal) Content-Type: text/plain; charset=iso-8859-1 Content-Transfer-Encoding: 8bit MIME-Version: 1.0 In-Reply-To: X-PGP-KeyID: F88341D9 Date: Mon, 25 May 1998 11:27:46 +0200 (CEST) Organization: German Unix-AG Association From: Lars Eilebrecht To: new-httpd@apache.org Subject: Re: [PATCH] PR#1031 using a type map as a custom error document Sender: new-httpd-owner@apache.org Precedence: bulk Reply-To: new-httpd@apache.org According to Dean Gaudet: > Hey can you explain why you're using r->no_local_copy? I'm confused... > Actually I think I'm just confused because r->no_local_copy appears to > be true iff this expression is true: > > r->status != HTTP_OK && !is_initial_req(r) I know that r->no_local_copy has a different meaning, but I used it as an indicator for a custom response internal redirect, because it is set in ap_die() before ap_internal_redirect(custom_response,r) is called. I wasn't sure if using is_initial_req(r) is a good thing, because this may break things when we are processing an internal redirect, but are not trying to build a custom response. But maybe I'm just missing something. [...] > ... I'd say that the correct fix is to remove the r->status test from > read_type_map and push it into read_types_multi, which is the only caller > that needs the security protection. When read_type_map is called by > handle_map_file() the security protection has already been taken care of. Yes, that seems to be the best fix. ciao... -- Lars Eilebrecht - If you can read this... sfx@unix-ag.org - don't you think you're a wee bit too close? http://www.home.unix-ag.org/sfx/