Re: from the quick hacks department... x-bit controls mod_cgi

2001-04-17 Thread Cees Hek
On Thu, 12 Apr 2001, Tim Bunce wrote: On Wed, Apr 11, 2001 at 08:22:38PM -0700, Randal L. Schwartz wrote: In an .htaccess, I place: Options +ExecCGI PerlFixupHandler "sub { -f $_[0]-filename and -x _ and $_[0]-handler(q{cgi-script}) }" Now any executable file in this

Re: from the quick hacks department... x-bit controls mod_cgi

2001-04-17 Thread Perrin Harkins
Can you briefly explain why it leaks memory? I haven't tried it, but I'm guessing it's creating a new anonymous sub on every request. I have been playing with Apache::Leak and Devel::Leak trying to figure out what is happening when Perl code leaks memory, but I haven't got my head around it

Re: from the quick hacks department... x-bit controls mod_cgi

2001-04-12 Thread Tim Bunce
On Wed, Apr 11, 2001 at 08:22:38PM -0700, Randal L. Schwartz wrote: In an .htaccess, I place: Options +ExecCGI PerlFixupHandler "sub { -f $_[0]-filename and -x _ and $_[0]-handler(q{cgi-script}) }" Now any executable file in this directory (or below) is processed with mod_cgi.

RE: from the quick hacks department... x-bit controls mod_cgi

2001-04-12 Thread Geoffrey Young
-Original Message- From: [EMAIL PROTECTED] [mailto:[EMAIL PROTECTED]] Sent: Thursday, April 12, 2001 11:27 AM To: Tim Bunce Cc: [EMAIL PROTECTED] Subject: Re: from the "quick hacks" department... x-bit controls mod_cgi "Tim" == Tim Bunce [EMAIL PROTE

RE: from the quick hacks department... x-bit controls mod_cgi

2001-04-12 Thread Geoffrey Young
-Original Message- From: Geoffrey Young Sent: Thursday, April 12, 2001 11:41 AM To: '[EMAIL PROTECTED]' Cc: [EMAIL PROTECTED] Subject: RE: from the "quick hacks" department... x-bit controls mod_cgi $INC/Stonehenge/XBitCGI.pm sub Stonehenge::XBitCG

Re: from the quick hacks department... x-bit controls mod_cgi

2001-04-12 Thread Randal L. Schwartz
"Tim" == Tim Bunce [EMAIL PROTECTED] writes: Tim On Wed, Apr 11, 2001 at 08:22:38PM -0700, Randal L. Schwartz wrote: In an .htaccess, I place: Options +ExecCGI PerlFixupHandler "sub { -f $_[0]-filename and -x _ and $_[0]-handler(q{cgi-script}) }" Now any executable file in this