static apr_status_t cleanup_tables(void *not_used)
{
ap_log_error(APLOG_MARK, APLOG_INFO, 0, NULL,
- "Digest: cleaning up shared memory");
+ "cleaning up shared memory");
if (client_rmm) {
apr_rmm_destroy(client_rmm);
apr_status_t status;
ap_log_error(APLOG_MARK, APLOG_NOTICE, 0, s,
- "Digest: generating secret for digest authentication ...");
+ "generating secret for digest authentication ...");
#if APR_HAS_RANDOM
status = apr_generate_random_bytes(secret, sizeof(secret));
if (status != APR_SUCCESS) {
char buf[120];
ap_log_error(APLOG_MARK, APLOG_CRIT, status, s,
- "Digest: error generating secret: %s",
+ "error generating secret: %s",
apr_strerror(status, buf, sizeof(buf)));
return status;
}
- ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, "Digest: done");
+ ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s, "done");
return APR_SUCCESS;
}
static void log_error_and_cleanup(char *msg, apr_status_t sts, server_rec *s)
{
ap_log_error(APLOG_MARK, APLOG_ERR, sts, s,
- "Digest: %s - all nonce-count checking, one-time nonces, and "
+ "%s - all nonce-count checking, one-time nonces, and "
"MD5-sess algorithm disabled", msg);
cleanup_tables(NULL);
num_buckets = 1;
}
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, cmd->server,
- "Digest: Set shmem-size: %" APR_SIZE_T_FMT ", num-buckets: %ld",
+ "Set shmem-size: %" APR_SIZE_T_FMT ", num-buckets: %ld",
shmem_size, num_buckets);
return NULL;
if (!entry) {
long num_removed = gc();
ap_log_error(APLOG_MARK, APLOG_INFO, 0, s,
- "Digest: gc'd %ld client entries. Total new clients: "
+ "gc'd %ld client entries. Total new clients: "
"%ld; Total removed clients: %ld; Total renewed clients: "
"%ld", num_removed,
client_list->num_created - client_list->num_renewed,
if (!(entry = add_client(op, &new_entry, r->server))) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: failed to allocate client entry - ignoring "
- "client");
+ "failed to allocate client entry - ignoring client");
return NULL;
}
if (conf->check_nc && !client_shm) {
/* Shouldn't happen, but just in case... */
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "Digest: cannot check nonce count without shared memory");
+ "cannot check nonce count without shared memory");
return OK;
}
/* qop is none, client must not send a nonce count */
if (snc != NULL) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid nc %s received - no nonce count allowed when qop=none",
+ "invalid nc %s received - no nonce count allowed when qop=none",
snc);
return !OK;
}
nc = strtol(snc, &endptr, 16);
if (endptr < (snc+strlen(snc)) && !apr_isspace(*endptr)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid nc %s received - not a number", snc);
+ "invalid nc %s received - not a number", snc);
return !OK;
}
if (nc != resp->client->nonce_count) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: Warning, possible replay attack: nonce-count "
+ "Warning, possible replay attack: nonce-count "
"check failed: %lu != %lu", nc,
resp->client->nonce_count);
return !OK;
if (strlen(resp->nonce) != NONCE_LEN) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid nonce %s received - length is not %d",
+ "invalid nonce %s received - length is not %d",
resp->nonce, NONCE_LEN);
note_digest_auth_failure(r, conf, resp, 1);
return HTTP_UNAUTHORIZED;
if (strcmp(hash, resp->nonce+NONCE_TIME_LEN)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid nonce %s received - hash is not %s",
+ "invalid nonce %s received - hash is not %s",
resp->nonce, hash);
note_digest_auth_failure(r, conf, resp, 1);
return HTTP_UNAUTHORIZED;
dt = r->request_time - nonce_time.time;
if (conf->nonce_lifetime > 0 && dt < 0) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid nonce %s received - user attempted "
+ "invalid nonce %s received - user attempted "
"time travel", resp->nonce);
note_digest_auth_failure(r, conf, resp, 1);
return HTTP_UNAUTHORIZED;
if (conf->nonce_lifetime > 0) {
if (dt > conf->nonce_lifetime) {
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0,r,
- "Digest: user %s: nonce expired (%.2f seconds old "
+ "user %s: nonce expired (%.2f seconds old "
"- max lifetime %.2f) - sending new nonce",
r->user, (double)apr_time_sec(dt),
(double)apr_time_sec(conf->nonce_lifetime));
else if (conf->nonce_lifetime == 0 && resp->client) {
if (memcmp(resp->client->last_nonce, resp->nonce, NONCE_LEN)) {
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
- "Digest: user %s: one-time-nonce mismatch - sending "
+ "user %s: one-time-nonce mismatch - sending "
"new nonce", r->user);
note_digest_auth_failure(r, conf, resp, 1);
return HTTP_UNAUTHORIZED;
if (!ap_auth_name(r)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: need AuthName: %s", r->uri);
+ "need AuthName: %s", r->uri);
return HTTP_INTERNAL_SERVER_ERROR;
}
if (resp->auth_hdr_sts != VALID) {
if (resp->auth_hdr_sts == NOT_DIGEST) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: client used wrong authentication scheme "
- "`%s': %s", resp->scheme, r->uri);
+ "client used wrong authentication scheme `%s': %s",
+ resp->scheme, r->uri);
}
else if (resp->auth_hdr_sts == INVALID) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: missing user, realm, nonce, uri, digest, "
+ "missing user, realm, nonce, uri, digest, "
"cnonce, or nonce_count in authorization header: %s",
r->uri);
}
copy_uri_components(&r_uri, resp->psd_request_uri, r);
if (apr_uri_parse(r->pool, resp->uri, &d_uri) != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid uri <%s> in Authorization header",
+ "invalid uri <%s> in Authorization header",
resp->uri);
return HTTP_BAD_REQUEST;
}
if (apr_table_get(r->subprocess_env,
"AuthDigestEnableQueryStringHack")) {
- ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r, "Digest: "
+ ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
"applying AuthDigestEnableQueryStringHack "
"to uri <%s>", resp->raw_request_uri);
if (r->method_number == M_CONNECT) {
if (!r_uri.hostinfo || strcmp(resp->uri, r_uri.hostinfo)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: uri mismatch - <%s> does not match "
+ "uri mismatch - <%s> does not match "
"request-uri <%s>", resp->uri, r_uri.hostinfo);
return HTTP_BAD_REQUEST;
}
|| strcmp(d_uri.query, r_uri.query)))
) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: uri mismatch - <%s> does not match "
+ "uri mismatch - <%s> does not match "
"request-uri <%s>", resp->uri, resp->raw_request_uri);
return HTTP_BAD_REQUEST;
}
if (resp->opaque && resp->opaque_num == 0) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: received invalid opaque - got `%s'",
+ "received invalid opaque - got `%s'",
resp->opaque);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
if (strcmp(resp->realm, conf->realm)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: realm mismatch - got `%s' but expected `%s'",
+ "realm mismatch - got `%s' but expected `%s'",
resp->realm, conf->realm);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
&& strcasecmp(resp->algorithm, "MD5")
&& strcasecmp(resp->algorithm, "MD5-sess")) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: unknown algorithm `%s' received: %s",
+ "unknown algorithm `%s' received: %s",
resp->algorithm, r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
if (return_code == AUTH_USER_NOT_FOUND) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: user `%s' in realm `%s' not found: %s",
+ "user `%s' in realm `%s' not found: %s",
r->user, conf->realm, r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
else if (return_code == AUTH_DENIED) {
/* authentication denied in the provider before attempting a match */
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: user `%s' in realm `%s' denied by provider: %s",
+ "user `%s' in realm `%s' denied by provider: %s",
r->user, conf->realm, r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
/* old (rfc-2069) style digest */
if (strcmp(resp->digest, old_digest(r, resp, conf->ha1))) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: user %s: password mismatch: %s", r->user,
+ "user %s: password mismatch: %s", r->user,
r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
&& !(conf->qop_list[0] == NULL
&& !strcasecmp(resp->message_qop, "auth"))) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: invalid qop `%s' received: %s",
+ "invalid qop `%s' received: %s",
resp->message_qop, r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
}
if (strcmp(resp->digest, exp_digest)) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: user %s: password mismatch: %s", r->user,
+ "user %s: password mismatch: %s", r->user,
r->uri);
note_digest_auth_failure(r, conf, resp, 0);
return HTTP_UNAUTHORIZED;
ha1 = get_session_HA1(r, resp, conf, 0);
if (!ha1) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "Digest: internal error: couldn't find session "
+ "internal error: couldn't find session "
"info for user %s", resp->username);
return !OK;
}
fspec = ap_server_root_relative(cmd->pool, filename);
if (!fspec) {
ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server,
- "ISAPI: invalid module path, skipping %s", filename);
+ "invalid module path, skipping %s", filename);
return NULL;
}
if ((rv = apr_stat(&tmp, fspec, APR_FINFO_TYPE,
cmd->temp_pool)) != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server,
- "ISAPI: unable to stat, skipping %s", fspec);
+ "unable to stat, skipping %s", fspec);
return NULL;
}
if (tmp.filetype != APR_REG) {
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
- "ISAPI: not a regular file, skipping %s", fspec);
+ "not a regular file, skipping %s", fspec);
return NULL;
}
rv = isapi_lookup(cmd->pool, cmd->server, NULL, fspec, &isa);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_WARNING, rv, cmd->server,
- "ISAPI: unable to cache, skipping %s", fspec);
+ "unable to cache, skipping %s", fspec);
return NULL;
}
if (rv)
{
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
- "ISAPI: failed to load %s", isa->filename);
+ "failed to load %s", isa->filename);
isa->handle = NULL;
return rv;
}
if (rv)
{
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
- "ISAPI: missing GetExtensionVersion() in %s",
+ "missing GetExtensionVersion() in %s",
isa->filename);
apr_dso_unload(isa->handle);
isa->handle = NULL;
if (rv)
{
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
- "ISAPI: missing HttpExtensionProc() in %s",
+ "missing HttpExtensionProc() in %s",
isa->filename);
apr_dso_unload(isa->handle);
isa->handle = NULL;
if (!(isa->GetExtensionVersion)(isa->isapi_version)) {
apr_status_t rv = apr_get_os_error();
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
- "ISAPI: failed call to GetExtensionVersion() in %s",
+ "failed call to GetExtensionVersion() in %s",
isa->filename);
apr_dso_unload(isa->handle);
isa->handle = NULL;
cid->r->status_line = ap_get_status_line(cid->r->status);
cid->ecb->dwHttpStatusCode = cid->r->status;
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, cid->r,
- "ISAPI: Could not determine HTTP response code; using %d",
+ "Could not determine HTTP response code; using %d",
cid->r->status);
}
cid->response_sent = 1;
if (rv != APR_SUCCESS)
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
- "ISAPI: WriteClient ap_pass_brigade "
- "failed: %s", r->filename);
+ "WriteClient ap_pass_brigade failed: %s",
+ r->filename);
}
if ((flags & HSE_IO_ASYNC) && cid->completion) {
cid->response_sent = 1;
if (rv != APR_SUCCESS)
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
- "ISAPI: ServerSupport function "
+ "ServerSupport function "
"HSE_REQ_SEND_RESPONSE_HEADER "
"ap_pass_brigade failed: %s", r->filename);
return (rv == APR_SUCCESS);
}
else if (cid->dconf.log_unsupported) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_DONE_WITH_SESSION is not supported: %s",
r->filename);
}
case HSE_REQ_GET_SSPI_INFO:
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction HSE_REQ_GET_SSPI_INFO "
+ "ServerSupportFunction HSE_REQ_GET_SSPI_INFO "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
}
if (cid->dconf.log_to_errlog)
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
- "ISAPI: %s: %s", cid->r->filename,
+ "%s: %s", cid->r->filename,
(char*) buf_data);
return 1;
}
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction HSE_REQ_IO_COMPLETION "
+ "ServerSupportFunction HSE_REQ_IO_COMPLETION "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
if (!cid->dconf.fake_async && (tf->dwFlags & HSE_IO_ASYNC)) {
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction HSE_REQ_TRANSMIT_FILE "
+ "ServerSupportFunction HSE_REQ_TRANSMIT_FILE "
"as HSE_IO_ASYNC is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
cid->response_sent = 1;
if (rv != APR_SUCCESS)
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
- "ISAPI: ServerSupport function "
+ "ServerSupport function "
"HSE_REQ_TRANSMIT_FILE "
"ap_pass_brigade failed: %s", r->filename);
case HSE_REQ_REFRESH_ISAPI_ACL:
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_REFRESH_ISAPI_ACL "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
if (!cid->dconf.fake_async) {
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: asynchronous I/O not supported: %s",
+ "asynchronous I/O not supported: %s",
r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
case HSE_REQ_GET_IMPERSONATION_TOKEN: /* Added in ISAPI 4.0 */
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_GET_IMPERSONATION_TOKEN "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
case HSE_REQ_ABORTIVE_CLOSE:
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction HSE_REQ_ABORTIVE_CLOSE"
+ "ServerSupportFunction HSE_REQ_ABORTIVE_CLOSE"
" is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
case HSE_REQ_GET_CERT_INFO_EX: /* Added in ISAPI 4.0 */
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_GET_CERT_INFO_EX "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
cid->response_sent = 1;
if (rv != APR_SUCCESS)
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
- "ISAPI: ServerSupport function "
+ "ServerSupport function "
"HSE_REQ_SEND_RESPONSE_HEADER_EX "
"ap_pass_brigade failed: %s", r->filename);
return (rv == APR_SUCCESS);
case HSE_REQ_CLOSE_CONNECTION: /* Added after ISAPI 4.0 */
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_CLOSE_CONNECTION "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
*/
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction "
+ "ServerSupportFunction "
"HSE_REQ_EXTENSION_TRIGGER "
"is not supported: %s", r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
default:
if (cid->dconf.log_unsupported)
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: ServerSupportFunction (%d) not supported: "
+ "ServerSupportFunction (%d) not supported: "
"%s", HSE_code, r->filename);
apr_set_os_error(APR_FROM_OS_ERROR(ERROR_INVALID_PARAMETER));
return 0;
if (!cid->completed || (rv != APR_SUCCESS)) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: Failed to create completion mutex");
+ "Failed to create completion mutex");
return HTTP_INTERNAL_SERVER_ERROR;
}
}
/* Check for a log message - and log it */
if (cid->ecb->lpszLogData && *cid->ecb->lpszLogData)
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
- "ISAPI: %s: %s", r->filename, cid->ecb->lpszLogData);
+ "%s: %s", r->filename, cid->ecb->lpszLogData);
switch(rv) {
case 0: /* Strange, but MS isapi accepts this as success */
}
else if (cid->dconf.log_unsupported) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, 0, r,
- "ISAPI: asynch I/O result HSE_STATUS_PENDING "
+ "asynch I/O result HSE_STATUS_PENDING "
"from HttpExtensionProc() is not supported: %s",
r->filename);
r->status = HTTP_INTERNAL_SERVER_ERROR;
/* end response if we have yet to do so.
*/
ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r,
- "ISAPI: HSE_STATUS_ERROR result from "
+ "HSE_STATUS_ERROR result from "
"HttpExtensionProc(): %s", r->filename);
r->status = HTTP_INTERNAL_SERVER_ERROR;
break;
default:
ap_log_rerror(APLOG_MARK, APLOG_WARNING, apr_get_os_error(), r,
- "ISAPI: unrecognized result code %d "
+ "unrecognized result code %d "
"from HttpExtensionProc(): %s ",
rv, r->filename);
r->status = HTTP_INTERNAL_SERVER_ERROR;
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rv, r,
- "ISAPI: ap_pass_brigade failed to "
+ "ap_pass_brigade failed to "
"complete the response: %s ", r->filename);
}
apr_pool_create_ex(&loaded.pool, pconf, NULL, NULL);
if (!loaded.pool) {
ap_log_error(APLOG_MARK, APLOG_ERR, APR_EGENERAL, NULL,
- "ISAPI: could not create the isapi cache pool");
+ "could not create the isapi cache pool");
return APR_EGENERAL;
}
loaded.hash = apr_hash_make(loaded.pool);
if (!loaded.hash) {
ap_log_error(APLOG_MARK, APLOG_ERR, 0, NULL,
- "ISAPI: Failed to create module cache");
+ "Failed to create module cache");
return APR_EGENERAL;
}
loaded.pool);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, rv, 0, NULL,
- "ISAPI: Failed to create module cache lock");
+ "Failed to create module cache lock");
return rv;
}
return OK;
rv = safe_file_rename(conf, file->tempfile, file->file, file->pool);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: rename tempfile to file failed:"
+ "rename tempfile to file failed:"
" %s -> %s", file->tempfile, file->file);
apr_file_remove(file->tempfile, file->pool);
}
/* we don't support caching of range requests (yet) */
if (r->status == HTTP_PARTIAL_CONTENT) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s partial content response not cached",
+ "URL %s partial content response not cached",
key);
return DECLINED;
}
/* Note, len is -1 if unknown so don't trust it too hard */
if (len > dconf->maxfs) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s failed the size check "
+ "URL %s failed the size check "
"(%" APR_OFF_T_FMT " > %" APR_OFF_T_FMT ")",
key, len, dconf->maxfs);
return DECLINED;
}
if (len >= 0 && len < dconf->minfs) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s failed the size check "
+ "URL %s failed the size check "
"(%" APR_OFF_T_FMT " < %" APR_OFF_T_FMT ")",
key, len, dconf->minfs);
return DECLINED;
if (!error_logged) {
error_logged = 1;
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "cache_disk: Cannot cache files to disk without a CacheRoot specified.");
+ "Cannot cache files to disk without a CacheRoot specified.");
}
return DECLINED;
}
rc = read_array(r, varray, dobj->vary.fd);
if (rc != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
- "cache_disk: Cannot parse vary header file: %s",
+ "Cannot parse vary header file: %s",
dobj->vary.file);
apr_file_close(dobj->vary.fd);
return DECLINED;
}
else if (format != DISK_FORMAT_VERSION) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "cache_disk: File '%s' has a version mismatch. File had version: %d.",
+ "File '%s' has a version mismatch. File had version: %d.",
dobj->vary.file, format);
apr_file_close(dobj->vary.fd);
return DECLINED;
rc = file_cache_recall_mydata(dobj->hdrs.fd, info, dobj, r);
if (rc != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
- "cache_disk: Cannot read header file %s", dobj->hdrs.file);
+ "Cannot read header file %s", dobj->hdrs.file);
apr_file_close(dobj->hdrs.fd);
return DECLINED;
}
/* Is this a cached HEAD request? */
if (dobj->disk_info.header_only && !r->header_only) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, APR_SUCCESS, r,
- "cache_disk: HEAD request cached, non-HEAD requested, ignoring: %s",
+ "HEAD request cached, non-HEAD requested, ignoring: %s",
dobj->hdrs.file);
return DECLINED;
}
rc = apr_file_open(&dobj->data.fd, dobj->data.file, flags, 0, r->pool);
if (rc != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rc, r,
- "cache_disk: Cannot open data file %s", dobj->data.file);
+ "Cannot open data file %s", dobj->data.file);
apr_file_close(dobj->hdrs.fd);
return DECLINED;
}
/* Initialize the cache_handle callback functions */
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Recalled cached URL info header %s", dobj->name);
+ "Recalled cached URL info header %s", dobj->name);
/* make the configuration stick */
h->cache_obj = obj;
/* Oh dear, no luck matching header to the body */
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Cached URL info header '%s' didn't match body, ignoring this entry",
+ "Cached URL info header '%s' didn't match body, ignoring this entry",
dobj->name);
return DECLINED;
/* Delete headers file */
if (dobj->hdrs.file) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Deleting %s from cache.", dobj->hdrs.file);
+ "Deleting %s from cache.", dobj->hdrs.file);
rc = apr_file_remove(dobj->hdrs.file, r->pool);
if ((rc != APR_SUCCESS) && !APR_STATUS_IS_ENOENT(rc)) {
* For reason see log_error_core for the case s == NULL.
*/
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r,
- "cache_disk: Failed to delete headers file %s from cache.",
+ "Failed to delete headers file %s from cache.",
dobj->hdrs.file);
return DECLINED;
}
/* Delete data file */
if (dobj->data.file) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Deleting %s from cache.", dobj->data.file);
+ "Deleting %s from cache.", dobj->data.file);
rc = apr_file_remove(dobj->data.file, r->pool);
if ((rc != APR_SUCCESS) && !APR_STATUS_IS_ENOENT(rc)) {
* For reason see log_error_core for the case s == NULL.
*/
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, rc, r,
- "cache_disk: Failed to delete data file %s from cache.",
+ "Failed to delete data file %s from cache.",
dobj->data.file);
return DECLINED;
}
*/
for (q = dir + dobj->root_len; *q ; ) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Deleting directory %s from cache",
- dir);
+ "Deleting directory %s from cache", dir);
rc = apr_dir_remove(dir, r->pool);
if (rc != APR_SUCCESS && !APR_STATUS_IS_ENOENT(rc)) {
/* This case should not happen... */
if (!dobj->hdrs.fd) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "cache_disk: recalling headers; but no header fd for %s", dobj->name);
+ "recalling headers; but no header fd for %s", dobj->name);
return APR_NOTFOUND;
}
apr_file_close(dobj->hdrs.fd);
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: Recalled headers for URL %s", dobj->name);
+ "Recalled headers for URL %s", dobj->name);
return APR_SUCCESS;
}
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not create vary file %s",
+ "could not create vary file %s",
dobj->vary.tempfile);
return rv;
}
rv = apr_file_write(dobj->vary.tempfd, &format, &amt);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not write to vary file %s",
+ "could not write to vary file %s",
dobj->vary.tempfile);
apr_file_close(dobj->vary.tempfd);
apr_pool_destroy(dobj->vary.pool);
&amt);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not write to vary file %s",
+ "could not write to vary file %s",
dobj->vary.tempfile);
apr_file_close(dobj->vary.tempfd);
apr_pool_destroy(dobj->vary.pool);
rv = apr_file_close(dobj->vary.tempfd);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not close vary file %s",
+ "could not close vary file %s",
dobj->vary.tempfile);
apr_pool_destroy(dobj->vary.pool);
return rv;
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not create header file %s",
+ "could not create header file %s",
dobj->hdrs.tempfile);
return rv;
}
rv = apr_file_writev(dobj->hdrs.tempfd, (const struct iovec *) &iov, 2, &amt);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not write info to header file %s",
+ "could not write info to header file %s",
dobj->hdrs.tempfile);
apr_file_close(dobj->hdrs.tempfd);
apr_pool_destroy(dobj->hdrs.pool);
rv = store_table(dobj->hdrs.tempfd, dobj->headers_out);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not write out-headers to header file %s",
+ "could not write out-headers to header file %s",
dobj->hdrs.tempfile);
apr_file_close(dobj->hdrs.tempfd);
apr_pool_destroy(dobj->hdrs.pool);
rv = store_table(dobj->hdrs.tempfd, dobj->headers_in);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not write in-headers to header file %s",
+ "could not write in-headers to header file %s",
dobj->hdrs.tempfile);
apr_file_close(dobj->hdrs.tempfd);
apr_pool_destroy(dobj->hdrs.pool);
rv = apr_file_close(dobj->hdrs.tempfd); /* flush and close */
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_WARNING, rv, r,
- "cache_disk: could not close header file %s",
+ "could not close header file %s",
dobj->hdrs.tempfile);
apr_pool_destroy(dobj->hdrs.pool);
return rv;
APR_BRIGADE_INSERT_TAIL(out, e);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "cache_disk: Error when reading bucket for URL %s",
+ "Error when reading bucket for URL %s",
h->cache_obj->key);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
apr_pool_destroy(dobj->data.pool);
rv = apr_file_write_full(dobj->data.tempfd, str, length, &written);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
- "cache_disk: Error when writing cache file for URL %s",
+ "Error when writing cache file for URL %s",
h->cache_obj->key);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
apr_pool_destroy(dobj->data.pool);
dobj->file_size += written;
if (dobj->file_size > dconf->maxfs) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s failed the size check "
+ "URL %s failed the size check "
"(%" APR_OFF_T_FMT ">%" APR_OFF_T_FMT ")",
h->cache_obj->key, dobj->file_size, dconf->maxfs);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
if (r->connection->aborted || r->no_cache) {
ap_log_rerror(APLOG_MARK, APLOG_INFO, 0, r,
- "cache_disk: Discarding body for URL %s "
+ "Discarding body for URL %s "
"because connection has been aborted.",
h->cache_obj->key);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
}
if (dobj->file_size < dconf->minfs) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s failed the size check "
+ "URL %s failed the size check "
"(%" APR_OFF_T_FMT "<%" APR_OFF_T_FMT ")",
h->cache_obj->key, dobj->file_size, dconf->minfs);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
apr_int64_t cl = apr_atoi64(cl_header);
if ((errno == 0) && (dobj->file_size != cl)) {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: URL %s didn't receive complete response, not caching",
+ "URL %s didn't receive complete response, not caching",
h->cache_obj->key);
/* Remove the intermediate cache file and return non-APR_SUCCESS */
apr_pool_destroy(dobj->data.pool);
if (APR_SUCCESS != rv) {
remove_url(h, r);
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: commit_entity: URL '%s' not cached due to earlier disk error.",
+ "commit_entity: URL '%s' not cached due to earlier disk error.",
dobj->name);
}
else {
ap_log_rerror(APLOG_MARK, APLOG_DEBUG, 0, r,
- "cache_disk: commit_entity: Headers and body for URL %s cached.",
+ "commit_entity: Headers and body for URL %s cached.",
dobj->name);
}
fspec = ap_server_root_relative(cmd->pool, filename);
if (!fspec) {
ap_log_error(APLOG_MARK, APLOG_WARNING, APR_EBADPATH, cmd->server,
- "mod_file_cache: invalid file path "
+ "invalid file path "
"%s, skipping", filename);
return;
}
if ((rc = apr_stat(&tmp.finfo, fspec, APR_FINFO_MIN,
cmd->temp_pool)) != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
- "mod_file_cache: unable to stat(%s), skipping", fspec);
+ "unable to stat(%s), skipping", fspec);
return;
}
if (tmp.finfo.filetype != APR_REG) {
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
- "mod_file_cache: %s isn't a regular file, skipping", fspec);
+ "%s isn't a regular file, skipping", fspec);
return;
}
if (tmp.finfo.size > AP_MAX_SENDFILE) {
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
- "mod_file_cache: %s is too large to cache, skipping", fspec);
+ "%s is too large to cache, skipping", fspec);
return;
}
APR_OS_DEFAULT, cmd->pool);
if (rc != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
- "mod_file_cache: unable to open(%s, O_RDONLY), skipping", fspec);
+ "unable to open(%s, O_RDONLY), skipping", fspec);
return;
}
apr_file_inherit_set(fd);
APR_MMAP_READ, cmd->pool)) != APR_SUCCESS) {
apr_file_close(fd);
ap_log_error(APLOG_MARK, APLOG_WARNING, rc, cmd->server,
- "mod_file_cache: unable to mmap %s, skipping", filename);
+ "unable to mmap %s, skipping", filename);
return;
}
apr_file_close(fd);
#else
/* Sendfile not supported by this OS */
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
- "mod_file_cache: unable to cache file: %s. Sendfile is not supported on this OS", filename);
+ "unable to cache file: %s. Sendfile is not supported on this OS", filename);
#endif
return NULL;
}
#else
/* MMAP not supported by this OS */
ap_log_error(APLOG_MARK, APLOG_WARNING, 0, cmd->server,
- "mod_file_cache: unable to cache file: %s. MMAP is not supported by this OS", filename);
+ "unable to cache file: %s. MMAP is not supported by this OS", filename);
#endif
return NULL;
}
rv = apr_memcache_create(p, nservers, 0, &ctx->mc);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "socache: Failed to create Memcache Object of '%d' size.",
+ "Failed to create Memcache Object of '%d' size.",
nservers);
return rv;
}
rv = apr_parse_addr_port(&host_str, &scope_id, &port, split, p);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "socache: Failed to Parse memcache Server: '%s'", split);
+ "Failed to Parse memcache Server: '%s'", split);
return rv;
}
if (host_str == NULL) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "socache: Failed to Parse Server, "
+ "Failed to Parse Server, "
"no hostname specified: '%s'", split);
return APR_EINVAL;
}
&st);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "socache: Failed to Create memcache Server: %s:%d",
+ "Failed to Create memcache Server: %s:%d",
host_str, port);
return rv;
}
rv = apr_memcache_add_server(ctx->mc, st);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "socache: Failed to Add memcache Server: %s:%d",
+ "Failed to Add memcache Server: %s:%d",
host_str, port);
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to create listening socket.");
+ "Failed to create listening socket.");
return rv;
}
rv = apr_socket_opt_set(ctx->sock, APR_SO_REUSEADDR, 1);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to set APR_SO_REUSEADDR to 1 on socket.");
+ "Failed to set APR_SO_REUSEADDR to 1 on socket.");
return rv;
}
rv = apr_socket_opt_set(ctx->sock, APR_SO_NONBLOCK, 1);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to set APR_SO_NONBLOCK to 1 on socket.");
+ "Failed to set APR_SO_NONBLOCK to 1 on socket.");
return rv;
}
rv = apr_socket_bind(ctx->sock, ctx->mcast_addr);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to bind on socket.");
+ "Failed to bind on socket.");
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to join multicast group");
+ "Failed to join multicast group");
return rv;
}
rv = apr_mcast_loopback(ctx->sock, 1);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Failed to accept localhost mulitcast on socket.");
+ "Failed to accept localhost mulitcast on socket.");
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to open tmp file: %s", path);
+ "Unable to open tmp file: %s", path);
return rv;
}
rv = apr_file_open(&fpin, ctx->storage_path, APR_READ|APR_BINARY|APR_BUFFERED,
rv = apr_file_info_get(&fi, APR_FINFO_SIZE | APR_FINFO_MTIME, fpin);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to read file: %s", ctx->storage_path);
+ "Unable to read file: %s", ctx->storage_path);
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to read from file: %s", ctx->storage_path);
+ "Unable to read from file: %s", ctx->storage_path);
return rv;
}
rv = apr_file_flush(fp);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to flush file: %s", path);
+ "Unable to flush file: %s", path);
return rv;
}
rv = apr_file_close(fp);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to close file: %s", path);
+ "Unable to close file: %s", path);
return rv;
}
APR_FPROT_WREAD);
if (rv && rv != APR_INCOMPLETE && rv != APR_ENOTIMPL) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to set file permissions on %s",
+ "Unable to set file permissions on %s",
path);
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to move file: %s -> %s", path,
+ "Unable to move file: %s -> %s", path,
ctx->storage_path);
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to open tmp file: %s", path);
+ "Unable to open tmp file: %s", path);
return rv;
}
rv = apr_file_flush(fp);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to flush file: %s", path);
+ "Unable to flush file: %s", path);
return rv;
}
rv = apr_file_close(fp);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to close file: %s", path);
+ "Unable to close file: %s", path);
return rv;
}
APR_FPROT_WREAD);
if (rv && rv != APR_INCOMPLETE && rv != APR_ENOTIMPL) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to set file permissions on %s",
+ "Unable to set file permissions on %s",
path);
return rv;
}
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to move file: %s -> %s", path,
+ "Unable to move file: %s -> %s", path,
ctx->storage_path);
return rv;
}
hm_server_t *s;
/* TODO: REMOVE ME BEFORE PRODUCTION (????) */
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ctx->s,
- "Heartmonitor: %pI busy=%s ready=%s", from,
+ "%pI busy=%s ready=%s", from,
apr_table_get(tbl, "busy"), apr_table_get(tbl, "ready"));
apr_sockaddr_ip_get(&ip, from);
}
else {
ap_log_error(APLOG_MARK, APLOG_CRIT, 0, ctx->s,
- "Heartmonitor: malformed message from %pI",
+ "malformed message from %pI",
from);
}
rv = apr_socket_recvfrom(&from, ctx->sock, 0, buf, &len);
if (APR_STATUS_IS_EAGAIN(rv)) {
- ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: would block");
+ ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s, "would block");
return APR_SUCCESS;
}
else if (rv) {
- ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: recvfrom failed");
+ ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s, "recvfrom failed");
return rv;
}
if (rv) {
ctx->status = rv;
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, ctx->s,
- "Heartmonitor: Unable to listen for connections!");
+ "Unable to listen for connections!");
}
else {
ctx->keep_running = 1;
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ctx->s,
- "Heartmonitor: %s listener started.",
+ "%s listener started.",
HM_WATHCHDOG_NAME);
}
break;
break;
case AP_WATCHDOG_STATE_STOPPING:
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, ctx->s,
- "Heartmonitor: stopping %s listener.",
+ "stopping %s listener.",
HM_WATHCHDOG_NAME);
ctx->keep_running = 0;
hm_watchdog_register_callback = APR_RETRIEVE_OPTIONAL_FN(ap_watchdog_register_callback);
if (!hm_watchdog_get_instance || !hm_watchdog_register_callback) {
ap_log_error(APLOG_MARK, APLOG_CRIT, 0, s,
- "Heartmonitor: mod_watchdog is required");
+ "mod_watchdog is required");
return !OK;
}
0, 1, p);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "Heartmonitor: Failed to create watchdog "
- "instance (%s)", HM_WATHCHDOG_NAME);
+ "Failed to create watchdog instance (%s)",
+ HM_WATHCHDOG_NAME);
return !OK;
}
/* Register a callback with zero interval. */
hm_watchdog_callback);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "Heartmonitor: Failed to register watchdog "
- "callback (%s)", HM_WATHCHDOG_NAME);
+ "Failed to register watchdog callback (%s)",
+ HM_WATHCHDOG_NAME);
return !OK;
}
ap_log_error(APLOG_MARK, APLOG_DEBUG, 0, s,
- "Heartmonitor: wd callback %s", HM_WATHCHDOG_NAME);
+ "wd callback %s", HM_WATHCHDOG_NAME);
return OK;
}
*/
rv = apr_dbd_get_driver(cmd->pool, cfg->name, &driver);
if (APR_STATUS_IS_ENOTIMPL(rv)) {
- return apr_psprintf(cmd->pool, "DBD: No driver for %s", cfg->name);
+ return apr_psprintf(cmd->pool, "No driver for %s", cfg->name);
}
else if (APR_STATUS_IS_EDSOOPEN(rv)) {
return apr_psprintf(cmd->pool,
#ifdef NETWARE
- "DBD: Can't load driver file dbd%s.nlm",
+ "Can't load driver file dbd%s.nlm",
#else
- "DBD: Can't load driver file apr_dbd_%s.so",
+ "Can't load driver file apr_dbd_%s.so",
#endif
cfg->name);
}
else if (APR_STATUS_IS_ESYMNOTFOUND(rv)) {
return apr_psprintf(cmd->pool,
- "DBD: Failed to load driver apr_dbd_%s_driver",
+ "Failed to load driver apr_dbd_%s_driver",
cfg->name);
}
break;
rv = apr_pool_create(&rec_pool, pool);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, cfg->server,
- "DBD: Failed to create memory pool");
+ "Failed to create memory pool");
return rv;
}
if (rv != APR_SUCCESS) {
if (APR_STATUS_IS_ENOTIMPL(rv)) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: driver for %s not available", cfg->name);
+ "driver for %s not available", cfg->name);
}
else if (APR_STATUS_IS_EDSOOPEN(rv)) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: can't find driver for %s", cfg->name);
+ "can't find driver for %s", cfg->name);
}
else if (APR_STATUS_IS_ESYMNOTFOUND(rv)) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: driver for %s is invalid or corrupted",
+ "driver for %s is invalid or corrupted",
cfg->name);
}
else {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: mod_dbd not compatible with APR in get_driver");
+ "mod_dbd not compatible with APR in get_driver");
}
apr_pool_destroy(rec->pool);
return rv;
switch (rv) {
case APR_EGENERAL:
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: Can't connect to %s: %s", cfg->name, err);
+ "Can't connect to %s: %s", cfg->name, err);
break;
default:
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: mod_dbd not compatible with APR in open");
+ "mod_dbd not compatible with APR in open");
break;
}
rv = apr_pool_create(&prepared_pool, rec->pool);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, cfg->server,
- "DBD: Failed to create memory pool");
+ "Failed to create memory pool");
apr_pool_destroy(rec->pool);
return rv;
if (rv != APR_SUCCESS) {
const char *errmsg = apr_dbd_error(rec->driver, rec->handle, rv);
ap_log_error(APLOG_MARK, APLOG_ERR, rv, cfg->server,
- "DBD: failed to prepare SQL statements: %s",
+ "failed to prepare SQL statements: %s",
(errmsg ? errmsg : "[???]"));
apr_pool_destroy(rec->pool);
group->pool);
if (rv != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv, s,
- "DBD: failed to initialise");
+ "failed to initialise");
return rv;
}
rv2 = apr_pool_create(&group->pool, pool);
if (rv2 != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv2, s,
- "DBD: Failed to create reslist cleanup memory pool");
+ "Failed to create reslist cleanup memory pool");
return rv2;
}
APR_THREAD_MUTEX_DEFAULT, pool);
if (rv2 != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv2, s,
- "DBD: Failed to create thread mutex");
+ "Failed to create thread mutex");
return rv2;
}
#endif
apr_status_t rv = dbd_setup_init(p, s);
if (rv) {
ap_log_error(APLOG_MARK, APLOG_CRIT, rv, s,
- "DBD: child init failed!");
+ "child init failed!");
}
}
rv2 = apr_thread_mutex_lock(group->mutex);
if (rv2 != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv2, s,
- "DBD: Failed to acquire thread mutex");
+ "Failed to acquire thread mutex");
return rv2;
}
rv2 = apr_thread_mutex_unlock(group->mutex);
if (rv2 != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ERR, rv2, s,
- "DBD: Failed to release thread mutex");
+ "Failed to release thread mutex");
if (rv == APR_SUCCESS) {
rv = rv2;
}
/* If nothing is configured, we shouldn't be here */
if (cfg->name == no_dbdriver) {
- ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "DBD: not configured");
+ ap_log_error(APLOG_MARK, APLOG_ERR, 0, s, "not configured");
return NULL;
}
rv = apr_pollset_create(&data->pollset, 2, r->pool, 0);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
- "cgi: apr_pollset_create(); check system or user limits");
+ "apr_pollset_create(); check system or user limits");
return NULL;
}
rv = apr_pollset_add(data->pollset, &fd);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
- "cgi: apr_pollset_add(); check system or user limits");
+ "apr_pollset_add(); check system or user limits");
return NULL;
}
rv = apr_pollset_add(data->pollset, &fd);
if (rv != APR_SUCCESS) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r,
- "cgi: apr_pollset_add(); check system or user limits");
+ "apr_pollset_add(); check system or user limits");
return NULL;
}
*/
if ((rv = apr_gethostname(str, sizeof(str) - 1, p)) != APR_SUCCESS) {
ap_log_error(APLOG_MARK, APLOG_ALERT, rv, main_server,
- "mod_unique_id: unable to find hostname of the server");
+ "unable to find hostname of the server");
return HTTP_INTERNAL_SERVER_ERROR;
}
}
else {
ap_log_error(APLOG_MARK, APLOG_ALERT, rv, main_server,
- "mod_unique_id: unable to find IPv4 address of \"%s\"", str);
+ "unable to find IPv4 address of \"%s\"", str);
#if APR_HAVE_IPV6
if ((rv = apr_sockaddr_info_get(&sockaddr, str, AF_INET6, 0, 0, p)) == APR_SUCCESS) {
memcpy(&global_in_addr,
(char *)sockaddr->ipaddr_ptr + sockaddr->ipaddr_len - sizeof(global_in_addr),
sizeof(global_in_addr));
ap_log_error(APLOG_MARK, APLOG_ALERT, rv, main_server,
- "mod_unique_id: using low-order bits of IPv6 address "
+ "using low-order bits of IPv6 address "
"as if they were unique");
}
else
}
apr_sockaddr_ip_get(&ipaddrstr, sockaddr);
- ap_log_error(APLOG_MARK, APLOG_INFO, 0, main_server,
- "mod_unique_id: using ip addr %s",
+ ap_log_error(APLOG_MARK, APLOG_INFO, 0, main_server, "using ip addr %s",
ipaddrstr);
/*
rv = apr_file_mktemp(&fp, "mod_serf_buffer.XXXXXX", 0, pool);
if (rv != APR_SUCCESS) {
- ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "mod_serf: Unable to create temp request body buffer file.");
+ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "Unable to create temp request body buffer file.");
return HTTP_INTERNAL_SERVER_ERROR;
}
if (rv > 0) {
rv = apr_file_write_full(fp, buf, rv, NULL);
if (rv) {
- ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "mod_serf: failed to read request body");
+ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "failed to read request body");
return HTTP_INTERNAL_SERVER_ERROR;
}
}
} while(rv > 0);
if (rv < 0) {
- ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "mod_serf: failed to read request body");
+ ap_log_rerror(APLOG_MARK, APLOG_ERR, rv, r, "failed to read request body");
return HTTP_INTERNAL_SERVER_ERROR;
}
rv = apr_uri_parse(cmd->pool, argv[0], &conf->url);
if (rv != APR_SUCCESS) {
- return "mod_serf: Unable to parse SerfPass url.";
+ return "Unable to parse SerfPass url.";
}
if (!conf->url.scheme) {
- return "mod_serf: Need scheme part in url.";
+ return "Need scheme part in url.";
}
/* XXXX: These are bugs in apr_uri_parse. Fixme. */