"Headers sent to client:");
t_elt = (const apr_table_entry_t *)(elts->elts);
do {
- ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r, "%s: %s",
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r, " %s: %s",
ap_escape_logitem(r->pool, t_elt->key),
ap_escape_logitem(r->pool, t_elt->val));
t_elt++;
ap_time_process_request(r->connection->sbh, START_PREQUEST);
}
+ if (APLOGrtrace4(r)) {
+ int i;
+ const apr_array_header_t *t_h = apr_table_elts(r->headers_in);
+ const apr_table_entry_t *t_elt = (apr_table_entry_t *)t_h->elts;
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r,
+ "Headers received from client:");
+ for (i = 0; i < t_h->nelts; i++, t_elt++) {
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE4, 0, r, " %s: %s",
+ ap_escape_logitem(r->pool, t_elt->key),
+ ap_escape_logitem(r->pool, t_elt->val));
+ }
+ }
+
#if APR_HAS_THREADS
apr_thread_mutex_create(&r->invoke_mtx, APR_THREAD_MUTEX_DEFAULT, r->pool);
apr_thread_mutex_lock(r->invoke_mtx);
return HTTP_INTERNAL_SERVER_ERROR;
}
else {
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
+ "auth phase '%s' gave status %d: %s", phase,
+ status, r->uri);
return status;
}
}
return decl_die(access_status, "check authorization", r);
}
}
+ else {
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r,
+ "request authorized without authentication by "
+ "access_checker hook and 'Satisfy any': %s",
+ r->uri);
+ }
break;
}
}
if ((access_status = ap_run_fixups(r)) != OK) {
+ ap_log_rerror(APLOG_MARK, APLOG_TRACE3, 0, r, "fixups hook gave %d: %s",
+ access_status, r->uri);
return access_status;
}