|
|
b5a845 |
|
|
|
b5a845 |
Fixes for 2.4 API.
|
|
|
b5a845 |
|
|
|
b5a845 |
--- mod_auth_kerb-5.4/src/mod_auth_kerb.c.httpd24
|
|
|
b5a845 |
+++ mod_auth_kerb-5.4/src/mod_auth_kerb.c
|
|
|
b5a845 |
@@ -179,6 +179,16 @@ static apr_global_mutex_t *s4u2proxy_loc
|
|
|
b5a845 |
#define PROXYREQ_PROXY STD_PROXY
|
|
|
b5a845 |
#endif
|
|
|
b5a845 |
|
|
|
b5a845 |
+#if MODULE_MAGIC_NUMBER_MAJOR >= 20100606
|
|
|
b5a845 |
+/* 2.4.x or later */
|
|
|
b5a845 |
+#define WITH_HTTPD24 1
|
|
|
b5a845 |
+#define client_ip(r) ((r)->useragent_ip)
|
|
|
b5a845 |
+APLOG_USE_MODULE(auth_kerb);
|
|
|
b5a845 |
+#else
|
|
|
b5a845 |
+#define client_ip(r) ((r)->connection->remote_ip)
|
|
|
b5a845 |
+#define ap_unixd_set_global_mutex_perms unixd_set_global_mutex_perms
|
|
|
b5a845 |
+#endif
|
|
|
b5a845 |
+
|
|
|
b5a845 |
/***************************************************************************
|
|
|
b5a845 |
Auth Configuration Structure
|
|
|
b5a845 |
***************************************************************************/
|
|
|
b5a845 |
@@ -383,7 +393,11 @@ cmd_delegationlock(cmd_parms *cmd, void
|
|
|
b5a845 |
}
|
|
|
b5a845 |
|
|
|
b5a845 |
static void
|
|
|
b5a845 |
-log_rerror(const char *file, int line, int level, int status,
|
|
|
b5a845 |
+log_rerror(const char *file, int line,
|
|
|
b5a845 |
+#ifdef WITH_HTTPD24
|
|
|
b5a845 |
+ int module_index,
|
|
|
b5a845 |
+#endif
|
|
|
b5a845 |
+ int level, int status,
|
|
|
b5a845 |
const request_rec *r, const char *fmt, ...)
|
|
|
b5a845 |
{
|
|
|
b5a845 |
char errstr[1024];
|
|
|
b5a845 |
@@ -394,7 +408,9 @@ log_rerror(const char *file, int line, i
|
|
|
b5a845 |
va_end(ap);
|
|
|
b5a845 |
|
|
|
b5a845 |
|
|
|
b5a845 |
-#ifdef STANDARD20_MODULE_STUFF
|
|
|
b5a845 |
+#if defined(WITH_HTTPD24)
|
|
|
b5a845 |
+ ap_log_rerror(file, line, module_index, level, status, r, "%s", errstr);
|
|
|
b5a845 |
+#elif defined(STANDARD20_MODULE_STUFF)
|
|
|
b5a845 |
ap_log_rerror(file, line, level | APLOG_NOERRNO, status, r, "%s", errstr);
|
|
|
b5a845 |
#else
|
|
|
b5a845 |
ap_log_rerror(file, line, level | APLOG_NOERRNO, r, "%s", errstr);
|
|
|
b5a845 |
@@ -1860,8 +1876,8 @@ already_succeeded(request_rec *r, char *
|
|
|
b5a845 |
char keyname[1024];
|
|
|
b5a845 |
|
|
|
b5a845 |
snprintf(keyname, sizeof(keyname) - 1,
|
|
|
b5a845 |
- "mod_auth_kerb::connection::%s::%ld", r->connection->remote_ip,
|
|
|
b5a845 |
- r->connection->id);
|
|
|
b5a845 |
+ "mod_auth_kerb::connection::%s::%ld", client_ip(r),
|
|
|
b5a845 |
+ r->connection->id);
|
|
|
b5a845 |
|
|
|
b5a845 |
if (apr_pool_userdata_get((void**)&conn_data, keyname, r->connection->pool) != 0)
|
|
|
b5a845 |
return NULL;
|
|
|
b5a845 |
@@ -2014,7 +2030,7 @@ kerb_authenticate_user(request_rec *r)
|
|
|
b5a845 |
prevauth->last_return = ret;
|
|
|
b5a845 |
snprintf(keyname, sizeof(keyname) - 1,
|
|
|
b5a845 |
"mod_auth_kerb::connection::%s::%ld",
|
|
|
b5a845 |
- r->connection->remote_ip, r->connection->id);
|
|
|
b5a845 |
+ client_ip(r), r->connection->id);
|
|
|
b5a845 |
apr_pool_userdata_set(prevauth, keyname, NULL, r->connection->pool);
|
|
|
b5a845 |
}
|
|
|
b5a845 |
|
|
|
b5a845 |
@@ -2073,7 +2089,7 @@ s4u2proxylock_create(server_rec *s, apr_
|
|
|
b5a845 |
}
|
|
|
b5a845 |
|
|
|
b5a845 |
#ifdef AP_NEED_SET_MUTEX_PERMS
|
|
|
b5a845 |
- rc = unixd_set_global_mutex_perms(s4u2proxy_lock);
|
|
|
b5a845 |
+ rc = ap_unixd_set_global_mutex_perms(s4u2proxy_lock);
|
|
|
b5a845 |
if (rc != APR_SUCCESS) {
|
|
|
b5a845 |
ap_log_error(APLOG_MARK, APLOG_CRIT, rc, s,
|
|
|
b5a845 |
"mod_auth_kerb: Parent could not set permissions "
|