DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT <http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038>. ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND INSERTED IN THE BUG DATABASE.
http://nagoya.apache.org/bugzilla/show_bug.cgi?id=9038 suexec is NOT being called by Apache 2.0.36 ------- Additional Comments From [EMAIL PROTECTED] 2002-05-25 07:55 ------- Yes. If we could use SuexecUserGroup directives in <Directory> directives, SuexecUserGroup should have priority over userdir. But now, SuexecUserGroup is not allowed in <Directory>. Can this limitation be modified as below? --- httpd-2.0.36/modules/mappers/mod_userdir.c.org Mon Apr 29 16:45:43 2002 +++ httpd-2.0.36/modules/mappers/mod_userdir.c Sat May 25 13:30:00 2002 @@ -393,10 +393,13 @@ static void register_hooks(apr_pool_t *p) { static const char * const aszSucc[]={ "mod_alias.c",NULL }; +#ifdef HAVE_UNIX_SUEXEC + static const char * const suexPre[]={ "mod_suexec.c",NULL }; +#endif ap_hook_translate_name(translate_userdir,NULL,aszSucc,APR_HOOK_MIDDLE); #ifdef HAVE_UNIX_SUEXEC - ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,NULL,APR_HOOK_MIDDLE); + ap_hook_get_suexec_identity(get_suexec_id_doer,suexPre,NULL,APR_HOOK_MIDDLE); #endif } --- httpd-2.0.36/modules/generators/mod_suexec.c.org Thu Apr 25 16:18:39 2002 +++ httpd-2.0.36/modules/generators/mod_suexec.c Sat May 25 13:56:59 2002 @@ -102,7 +102,7 @@ const char *uid, const char *gid) { suexec_config_t *cfg = (suexec_config_t *) mconfig; - const char *err = ap_check_cmd_context(cmd, NOT_IN_DIR_LOC_FILE|NOT_IN_LIMIT); + const char *err = ap_check_cmd_context(cmd, NOT_IN_LOCATION|NOT_IN_FILES|NOT_IN_LIMIT); if (err != NULL) { return err; @@ -157,14 +157,16 @@ { /* XXX - Another important reason not to allow this in .htaccess is that * the ap_[ug]name2id() is not thread-safe */ - AP_INIT_TAKE2("SuexecUserGroup", set_suexec_ugid, NULL, RSRC_CONF, + AP_INIT_TAKE2("SuexecUserGroup", set_suexec_ugid, NULL, ACCESS_CONF, "User and group for spawned processes"), { NULL } }; static void suexec_hooks(apr_pool_t *p) { - ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,NULL,APR_HOOK_MIDDLE); + static const char * const suexSucc[]={ "mod_userdir.c",NULL }; + + ap_hook_get_suexec_identity(get_suexec_id_doer,NULL,suexSucc,APR_HOOK_MIDDLE); ap_hook_post_config(suexec_post_config,NULL,NULL,APR_HOOK_MIDDLE); } --------------------------------------------------------------------- To unsubscribe, e-mail: [EMAIL PROTECTED] For additional commands, e-mail: [EMAIL PROTECTED]
