Solved

ISAPI Filter fails when i use database

Posted on 2002-07-28
7
231 Views
Last Modified: 2010-04-04
Hi all,

I am busy writing an ISAPI URL mapping filter. Mapping the physical path work just fine, but as soon as i attempt to use a database (in a datamodule) it hangs. ie IIS will not restart.

I had this will a Com object I wnated to use in the filter as well. As soon as i create the com object (or database connection) IIS hangs.

Im currently using XP pro with Delphi 5 and I have the filter loaded as a global filter with a high priority.

Also, how can i debug this DLL. Its really frustrating not being able to step though the code.
0
Comment
Question by:ggets
7 Comments
 

Expert Comment

by:RayNorrish
ID: 7184002
I suggest using OmniHttp as a debugging webserver.
You can find it at http://www.omnicron.ca/httpd/

Sometimes it's useful to code your isapi app as a cgi exe and then convert it to dll later. It requires only token changes in the project file to compile as either. Running as a cgi app may help shed more light on the problem.

I still use d5 ent with IIS, but apparently d6 allows some IDE debugging, although I`ve not heard enough to persuade me to upgrade yet.

Further, if you say what database (flat file systems may require additional rights) that can help, and I`ll say up front that the BDE sucks as any kind of web middleware.
0
 

Author Comment

by:ggets
ID: 7184584
HI Ray,

Thanks, I will try your suggestions. Im not using the BDE (I decided a long time ago that it sucks and would never use it). The database is SQL7 and im using ADO. I guess rights to the database (or com object) would be the first thing to check.
0
 
LVL 3

Expert Comment

by:SteveWaite
ID: 7199658
Use Run/Parameters/HostApplication and turn off compiler optimization etc. to step through delphi dll's.
Regards,
Steve
0
Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

 

Expert Comment

by:SpideyMod
ID: 8144095
ggets,
You have a few old opened questions that I would like very much if you would take care of in the next 72 hours.  Unfortunatley, if you do not take care of them within 1 week, I am obligated to ask administration to review your account.  I am providing a handy list for you to get to your questions.  Thanks for your cooperation.  If you need help with finalizing any of these questions, drop a note here and I'm happy to help.

http://www.experts-exchange.com/Programming/Programming_Languages/Delphi/Q_20329270.html
http://www.experts-exchange.com/Programming/Programming_Languages/Delphi/Q_20269882.html
http://www.experts-exchange.com/Web/Web_Languages/ASP/Q_20227857.html
http://www.experts-exchange.com/Web/Web_Languages/ASP/Q_20159286.html
http://www.experts-exchange.com/Networking/Linux_Networking/Q_20090247.html

SpideyMod
Community Support Moderator @Experts Exchange
0
 

Author Comment

by:ggets
ID: 8150727
Hi SpideyMod,

None of these comments work and in the end I figured it out myself.

Can you please delete,


Thanks
0
 

Expert Comment

by:SpideyMod
ID: 8152337
ggets,
If you can post your solution to the problem, this will add value to our database and I can refund your question and PAQ it.  If you cannot, then I will have to delete it and that would be a shame.  Thanks.

SpideyMod
Community Support Moderator @Experts Exchange
0
 

Accepted Solution

by:
SpideyMod earned 0 total points
ID: 8173287
PAQ'd and 250 points refunded.  250 points NOT refunded.

ggets,
If you will come back and post how you figured it out yourself, I will be happy to refund the remaining 250 points.  Thanks.

SpideyMod
Community Support Moderator @Experts Exchange
0

Featured Post

Is Your Active Directory as Secure as You Think?

More than 75% of all records are compromised because of the loss or theft of a privileged credential. Experts have been exploring Active Directory infrastructure to identify key threats and establish best practices for keeping data safe. Attend this month’s webinar to learn more.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Suggested Solutions

Objective: - This article will help user in how to convert their numeric value become words. How to use 1. You can copy this code in your Unit as function 2. than you can perform your function by type this code The Code   (CODE) The Im…
Introduction The parallel port is a very commonly known port, it was widely used to connect a printer to the PC, if you look at the back of your computer, for those who don't have newer computers, there will be a port with 25 pins and a small print…
In this video I am going to show you how to back up and restore Office 365 mailboxes using CodeTwo Backup for Office 365. Learn more about the tool used in this video here: http://www.codetwo.com/backup-for-office-365/ (http://www.codetwo.com/ba…
Many functions in Excel can make decisions. The most simple of these is the IF function: it returns a value depending on whether a condition you describe is true or false. Once you get the hang of using the IF function, you will find it easier to us…

863 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question

Need Help in Real-Time?

Connect with top rated Experts

20 Experts available now in Live!

Get 1:1 Help Now