On 2004.02.18, Dossy <[EMAIL PROTECTED]> wrote: > I haven't nailed it down yet, but gdb'ing through DriverThread() and > ConnRun() hasn't been very interesting -- the Conn structure looks > sane. I think it might have something to do with fastpath -- in > particular, the index.adp isn't a file, it's a symlink (!!!) and I > think this might be fouling things up.
In Ns_ConnRunRequest(), Ns_UrlSpecificGet() returns a reqPtr whose proc points to NsFastGet(). Inside there, it figures out that the directoryfile that exists is index.adp, and does a Ns_ConnRedirect() ... and the second time through ends up with a reqPtr whose proc points to NsAdpProc(). So far, so good. We get into Ns_AdpRequest(), and it pushes the path to the file into objv[0] and objv[1] -- not sure if this is right, yet. We go into NsAdpInclude() which sends us to AdpRun(), which gets us to AdpEval(). It seems in AdpEval() is where the 404 page is being sent back to the client ... time to debug this in more detail tomorrow morning. -- Dossy -- Dossy Shiobara mail: [EMAIL PROTECTED] Panoptic Computer Network web: http://www.panoptic.com/ "He realized the fastest way to change is to laugh at your own folly -- then you can let go and quickly move on." (p. 70) -- AOLserver - http://www.aolserver.com/ To Remove yourself from this list, simply send an email to <[EMAIL PROTECTED]> with the body of "SIGNOFF AOLSERVER" in the email message. You can leave the Subject: field of your email blank.
