DO NOT REPLY [Bug 8452] - perchild doesn't compile on Solaris 8

2002-05-24 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8452.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=8452

perchild doesn't compile on Solaris 8





--- Additional Comments From [EMAIL PROTECTED]  2002-05-24 05:52 ---
Try this macro definition:
-D_XOPEN_SOURCE=500 -D__EXTENSIONS__
I'm using Solaris8 IA + gcc-3.1, and apache-2.0.36 + perchild MPM
has been compiled successfully. Also, it works fine.

Additionally, on Solaris8, the alternate thread library is preferred
than the standard thread lib. (Normally, outperforming and stable.)
If /usr/xpg4/lib/libpthread.so exists:
LDFLAGS = -lpthread -R/usr/xpg4/lib
Otherwise:
LDFLAGS = -lpthread -lthread -R/usr/lib/lwp

Note that Solaris7 and earlier don't have the alternate thread lib,
and Solaris9's standard thread lib is equivalent to Solaris8's
alternate thread lib.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 9038] - suexec is NOT being called by Apache 2.0.36

2002-05-24 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038

suexec is NOT being called by Apache 2.0.36





--- Additional Comments From [EMAIL PROTECTED]  2002-05-24 14:54 ---
How about to define mod_suexec/mod_userdir hook order as below:
(This will ensure suexec+userdir would work fine,
 regardless of definition of SuexecUserGroup directives.)

--- httpd-2.0.36/modules/mappers/mod_userdir.c.org  Mon Apr 29 16:45:43 2002
+++ httpd-2.0.36/modules/mappers/mod_userdir.c  Thu May 23 22:32:50 2002
@@ -393,10 +393,13 @@
 static void register_hooks(apr_pool_t *p)
 {
 static const char * const aszSucc[]={ mod_alias.c,NULL };
+#ifdef HAVE_UNIX_SUEXEC
+static const char * const suexSucc[]={ mod_suexec.c,NULL };
+#endif
 
 ap_hook_translate_name(translate_userdir,NULL,aszSucc,APR_HOOK_MIDDLE);
 #ifdef HAVE_UNIX_SUEXEC
-ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,NULL,APR_HOOK_MIDDLE);
+
ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,suexSucc,APR_HOOK_MIDDLE);
 #endif
 }
 
--- httpd-2.0.36/modules/generators/mod_suexec.c.orgThu Apr 25 16:18:39 2002
+++ httpd-2.0.36/modules/generators/mod_suexec.cFri May 24 22:15:49 2002
@@ -164,7 +164,9 @@
 
 static void suexec_hooks(apr_pool_t *p)
 {
-ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,NULL,APR_HOOK_MIDDLE);
+static const char * const suexPre[]={ mod_userdir.c,NULL };
+
+
ap_hook_get_suexec_identity(get_suexec_id_doer,suexPre,NULL,APR_HOOK_MIDDLE);
 ap_hook_post_config(suexec_post_config,NULL,NULL,APR_HOOK_MIDDLE);
 }

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]



DO NOT REPLY [Bug 9038] - suexec is NOT being called by Apache 2.0.36

2002-05-24 Thread bugzilla
DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038

suexec is NOT being called by Apache 2.0.36





--- Additional Comments From [EMAIL PROTECTED]  2002-05-24 15:00 ---
Specifying the order is a good idea ... but shouldnt be the other
way around ? .. ie, if the site admin wants to be able to force a particular
user directory to be a different UserGroup ID shouldnt they be able to ?

All they need do is make sure user directories are within the suexec 
docroot .. which is easily done.

-
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]