Ivan Zhakov <i...@visualsvn.com> writes: > -get_access_conf(request_rec *r, authz_svn_config_rec *conf) > +get_access_conf(request_rec *r, authz_svn_config_rec *conf, apr_pool_t > *scratch_pool)
That line is longer than 80 characters. > +subreq_bypass2(request_rec *r, > + const char *repos_path, > + const char *repos_name, > + apr_pool_t *scratch_pool) > { > svn_error_t *svn_err = NULL; > svn_authz_t *access_conf = NULL; > @@ -595,7 +597,7 @@ > > conf = ap_get_module_config(r->per_dir_config, > &authz_svn_module); > - username_to_authorize = get_username_to_authorize(r, conf); > + username_to_authorize = get_username_to_authorize(r, conf, scratch_pool); > > /* If configured properly, this should never be true, but just in case. */ > if (!conf->anonymous > @@ -606,7 +608,7 @@ > } > > /* Retrieve authorization file */ > - access_conf = get_access_conf(r, conf); > + access_conf = get_access_conf(r, conf, scratch_pool); > if (access_conf == NULL) > return HTTP_FORBIDDEN; > The call svn_repos_authz_check_access needs to be changed to pass scratch_pool. > @@ -650,6 +652,25 @@ > } -- Certified & Supported Apache Subversion Downloads: http://www.wandisco.com/subversion/download