473,729 Members | 2,359 Online
Bytes | Software Development & Data Engineering Community
+ Post

Home Posts Topics Members FAQ

Non-Existent folder urlrewrite without changing ISAPI

Hello,

The webhost that I have my asp.net website with does not allow me to
change the ISAPI handler for IIS, I am wondering if there is a way to
accomplish this without modifying the ISAPI handler.

a user goes to: http://www.mysite.com/username/

and it redirects to:

http://www.mysite.com/default.aspx?u=username

Now, I see you can do this with an HttpModule, but because of the fact
that the folder /username/ doesnt exist, IIS will throw a 404 error.

Is there anyway around this since I can't modify or add my own ISAPI
handler?

Apr 12 '06 #1
4 1562
HttpContext.Rew ritePath(string filePath, string pathInfo, string
queryString).

I call it in Application_Beg inRequest (Global.asax.cs ), and then in the
page load (default.aspx) write it back to the requested url. The code
is something like:

1) if the requested file is an ".axd" (resource handler request, such
as for freetextbox) then return without rewrite
2) check if requested physical page exists on the server, and if so
return without rewrite (to allow hardcoded pages to be accessible)
3) process the requested url and see if you know what it means. In
your case check the last folder name, look the user up, if they do not
exist, return without rewrite so a 404 error occurs. If they do exist,
call rewrite path with your new url.
4) you really should write the url back to the original in the page
load if you expect that page to post back to the server. Otherwise
when they post back they will not see your hackable (friendly) url in
the address bar anymore, but instead see your rewritten url.

This resource may help:
http://odetocode.com/blogs/scott/arc...01/01/509.aspx

You can look at my site to see the friendly urls in use. None of the
following pages physically exist on the server. They are all really
just default.aspx, which you can also access directly:
http://www.xquisoft.com/Products/VersionPolicy.aspx
http://www.xquisoft.com/Products/Portal/Overview.aspx
http://www.xquisoft.com/Products/Portal/Progress.aspx
http://www.xquisoft.com/home.aspx

are all really just...
http://www.xquisoft.com/default.aspx

Michael Lang
XQuiSoft LLC
(XQuiSoft Portal Framework)
http://www.xquisoft.com/

Apr 12 '06 #2
excellent!

I thought there was a way to do this without changing the ISAPI
handler. I cringe at the thought :)

Now, one more question.

This is one of first asp.net 2.0 apps, up to this point they were all
v1.1

I noticed in asp.net 2.0 there is no global.asax.cs, how do i add this
functionality to the Authenticate_Re quest with no Global.asax?

thanks alot!

Sean

Apr 12 '06 #3
I was answering for .net 1.1 I found an article for easier url
rewriting in .net 2.0. It's not as good as the route I've mentioned
earlier (check out the article comments). However, it may be fine for
your situation?
http://pietschsoft.com/Blog/Post.aspx?PostID=715

There is a global.asax in 2.0. You may have to add it manually.

Apr 12 '06 #4
actually the odetocode link you gave me earlier has a link to C# 2005
code, which explains it in framework 2.0.

the previous example is not very scalable as they have all the entries
hard coded into the web.config.

I beleieve the original solution would be perfect! thanks

sean

Apr 12 '06 #5

This thread has been closed and replies have been disabled. Please start a new discussion.

Similar topics

12
4423
by: lothar | last post by:
re: 4.2.1 Regular Expression Syntax http://docs.python.org/lib/re-syntax.html *?, +?, ?? Adding "?" after the qualifier makes it perform the match in non-greedy or minimal fashion; as few characters as possible will be matched. the regular expression module fails to perform non-greedy matches as described in the documentation: more than "as few characters as possible"
5
3749
by: klaus triendl | last post by:
hi, recently i discovered a memory leak in our code; after some investigation i could reduce it to the following problem: return objects of functions are handled as temporary objects, hence their dtor is called immediately and not at the end of the function. to be able to use return objects (to avoid copying) i often assign them to a const reference. now, casting a const return object from a function to a non-const reference to this...
3
12256
by: Mario | last post by:
Hello, I couldn't find a solution to the following problem (tried google and dejanews), maybe I'm using the wrong keywords? Is there a way to open a file (a linux fifo pipe actually) in nonblocking mode in c++? I did something ugly like --- c/c++ mixture --- mkfifo( "testpipe", 777);
32
4522
by: Adrian Herscu | last post by:
Hi all, In which circumstances it is appropriate to declare methods as non-virtual? Thanx, Adrian.
22
12045
by: Steve - DND | last post by:
We're currently doing some tests to determine the performance of static vs non-static functions, and we're coming up with some odd(in our opinion) results. We used a very simple setup. One class had a static function, and the one class had a non-static function. Both of these functions did the exact same thing. The test function: public void Test(){ decimal y = 2; decimal x = 3;
8
3507
by: Bern McCarty | last post by:
Is it at all possible to leverage mixed-mode assemblies from AppDomains other than the default AppDomain? Is there any means at all of doing this? Mixed-mode is incredibly convenient, but if I cannot load/unload/reload extensions into my large and slow-to-load application during development without restarting the process then the disadvantages may outweigh the advantages. I've got a mixed-mode program in which I create a new AppDomain...
14
8454
by: Patrick Kowalzick | last post by:
Dear all, I have an existing piece of code with a struct with some PODs. struct A { int x; int y; };
11
3444
by: ypjofficial | last post by:
Hello All, So far I have been reading that in case of a polymorphic class ( having at least one virtual function in it), the virtual function call get resolved at run time and during that the vtable pointer is made use of.. eg. class one {
2
6114
by: Ian825 | last post by:
I need help writing a function for a program that is based upon the various operations of a matrix and I keep getting a "non-aggregate type" error. My guess is that I need to dereference my pointers, but I'm not sure. Please help. The code: void equate(matrix *A, matrix *B) { int i, j; assert(A.row_dim == B.col_dim && A.col_dim == B.col_dim); for(i=0; i < A.row_dim; i++) for(j=0; j < A.col_dim; j++)
399
12868
by: =?UTF-8?B?Ik1hcnRpbiB2LiBMw7Z3aXMi?= | last post by:
PEP 1 specifies that PEP authors need to collect feedback from the community. As the author of PEP 3131, I'd like to encourage comments to the PEP included below, either here (comp.lang.python), or to python-3000@python.org In summary, this PEP proposes to allow non-ASCII letters as identifiers in Python. If the PEP is accepted, the following identifiers would also become valid as class, function, or variable names: Löffelstiel,...
0
8921
marktang
by: marktang | last post by:
ONU (Optical Network Unit) is one of the key components for providing high-speed Internet services. Its primary function is to act as an endpoint device located at the user's premises. However, people are often confused as to whether an ONU can Work As a Router. In this blog post, we’ll explore What is ONU, What Is Router, ONU & Router’s main usage, and What is the difference between ONU and Router. Let’s take a closer look ! Part I. Meaning of...
0
8763
by: Hystou | last post by:
Most computers default to English, but sometimes we require a different language, especially when relocating. Forgot to request a specific language before your computer shipped? No problem! You can effortlessly switch the default language on Windows 10 without reinstalling. I'll walk you through it. First, let's disable language synchronization. With a Microsoft account, language settings sync across devices. To prevent any complications,...
0
9427
Oralloy
by: Oralloy | last post by:
Hello folks, I am unable to find appropriate documentation on the type promotion of bit-fields when using the generalised comparison operator "<=>". The problem is that using the GNU compilers, it seems that the internal comparison operator "<=>" tries to promote arguments from unsigned to signed. This is as boiled down as I can make it. Here is my compilation command: g++-12 -std=c++20 -Wnarrowing bit_field.cpp Here is the code in...
0
9284
jinu1996
by: jinu1996 | last post by:
In today's digital age, having a compelling online presence is paramount for businesses aiming to thrive in a competitive landscape. At the heart of this digital strategy lies an intricately woven tapestry of website design and digital marketing. It's not merely about having a website; it's about crafting an immersive digital experience that captivates audiences and drives business growth. The Art of Business Website Design Your website is...
1
9202
by: Hystou | last post by:
Overview: Windows 11 and 10 have less user interface control over operating system update behaviour than previous versions of Windows. In Windows 11 and 10, there is no way to turn off the Windows Update option using the Control Panel or Settings app; it automatically checks for updates and installs any it finds, whether you like it or not. For most users, this new feature is actually very convenient. If you want to control the update process,...
0
9148
tracyyun
by: tracyyun | last post by:
Dear forum friends, With the development of smart home technology, a variety of wireless communication protocols have appeared on the market, such as Zigbee, Z-Wave, Wi-Fi, Bluetooth, etc. Each protocol has its own unique characteristics and advantages, but as a user who is planning to build a smart home system, I am a bit confused by the choice of these technologies. I'm particularly interested in Zigbee because I've heard it does some...
0
4528
by: TSSRALBI | last post by:
Hello I'm a network technician in training and I need your help. I am currently learning how to create and manage the different types of VPNs and I have a question about LAN-to-LAN VPNs. The last exercise I practiced was to create a LAN-to-LAN VPN between two Pfsense firewalls, by using IPSEC protocols. I succeeded, with both firewalls in the same network. But I'm wondering if it's possible to do the same thing, with 2 Pfsense firewalls...
1
3238
by: 6302768590 | last post by:
Hai team i want code for transfer the data from one system to another through IP address by using C# our system has to for every 5mins then we have to update the data what the data is updated we have to send another system
3
2165
bsmnconsultancy
by: bsmnconsultancy | last post by:
In today's digital era, a well-designed website is crucial for businesses looking to succeed. Whether you're a small business owner or a large corporation in Toronto, having a strong online presence can significantly impact your brand's success. BSMN Consultancy, a leader in Website Development in Toronto offers valuable insights into creating effective websites that not only look great but also perform exceptionally well. In this comprehensive...

By using Bytes.com and it's services, you agree to our Privacy Policy and Terms of Use.

To disable or enable advertisements and analytics tracking please visit the manage ads & tracking page.