mirror of
https://github.com/apache/httpd.git
synced 2025-08-07 04:02:58 +03:00
Revert spurious commit r1895340.
git-svn-id: https://svn.apache.org/repos/asf/httpd/httpd/trunk@1895341 13f79535-47bb-0310-9956-ffa450edef68
This commit is contained in:
@@ -96,13 +96,6 @@ AP_DECLARE(void) ap_get_mime_headers(request_rec *r);
|
||||
AP_DECLARE(void) ap_get_mime_headers_core(request_rec *r,
|
||||
apr_bucket_brigade *bb);
|
||||
|
||||
/**
|
||||
* Run post_read_request hook and validate.
|
||||
* @param r The current request
|
||||
* @return OK or HTTP_...
|
||||
*/
|
||||
AP_DECLARE(int) ap_post_read_request(request_rec *r);
|
||||
|
||||
/* Finish up stuff after a request */
|
||||
|
||||
/**
|
||||
|
@@ -690,7 +690,7 @@ static request_rec *internal_internal_redirect(const char *new_uri,
|
||||
* to do their thing on internal redirects as well. Perhaps this is a
|
||||
* misnamed function.
|
||||
*/
|
||||
if ((access_status = ap_post_read_request(new))) {
|
||||
if ((access_status = ap_run_post_read_request(new))) {
|
||||
ap_die(access_status, new);
|
||||
return NULL;
|
||||
}
|
||||
|
@@ -383,7 +383,7 @@ request_rec *h2_create_request_rec(const h2_request *req, conn_rec *c)
|
||||
ap_add_input_filter_handle(ap_http_input_filter_handle,
|
||||
NULL, r, r->connection);
|
||||
|
||||
if ((access_status = ap_post_read_request(r))) {
|
||||
if ((access_status = ap_run_post_read_request(r))) {
|
||||
/* Request check post hooks failed. An example of this would be a
|
||||
* request for a vhost where h2 is disabled --> 421.
|
||||
*/
|
||||
|
@@ -1595,7 +1595,7 @@ request_rec *ap_read_request(conn_rec *conn)
|
||||
/* we may have switched to another server */
|
||||
apply_server_config(r);
|
||||
|
||||
if ((access_status = ap_post_read_request(r))) {
|
||||
if ((access_status = ap_run_post_read_request(r))) {
|
||||
goto die;
|
||||
}
|
||||
|
||||
@@ -1650,24 +1650,6 @@ ignore:
|
||||
return NULL;
|
||||
}
|
||||
|
||||
AP_DECLARE(int) ap_post_read_request(request_rec *r)
|
||||
{
|
||||
int status;
|
||||
|
||||
if ((status = ap_run_post_read_request(r))) {
|
||||
return status;
|
||||
}
|
||||
|
||||
/* Enforce http(s) only scheme for non-forward-proxy requests */
|
||||
if (!r->proxyreq
|
||||
&& r->parsed_uri.scheme
|
||||
&& ap_cstr_casecmp(r->parsed_uri.scheme, ap_http_scheme(r)) != 0) {
|
||||
return HTTP_BAD_REQUEST;
|
||||
}
|
||||
|
||||
return OK;
|
||||
}
|
||||
|
||||
/* if a request with a body creates a subrequest, remove original request's
|
||||
* input headers which pertain to the body which has already been read.
|
||||
* out-of-line helper function for ap_set_sub_req_protocol.
|
||||
|
@@ -1735,50 +1735,36 @@ AP_DECLARE(char *) ap_get_token(apr_pool_t *p, const char **accept_line,
|
||||
return token;
|
||||
}
|
||||
|
||||
#define IS_TOKEN_SEP(c) ((c) == ',' || (c) == ';')
|
||||
|
||||
/* find http tokens, see the definition of token from RFC2068 */
|
||||
AP_DECLARE(int) ap_find_token(apr_pool_t *p, const char *line, const char *tok)
|
||||
{
|
||||
const unsigned char *start_token;
|
||||
const unsigned char *s;
|
||||
apr_size_t tlen;
|
||||
|
||||
tlen = strlen(tok);
|
||||
if (!line || !tlen)
|
||||
if (!line)
|
||||
return 0;
|
||||
|
||||
s = (const unsigned char *)line;
|
||||
for (;;) {
|
||||
/* find start of token */
|
||||
while (apr_isspace(*s) || IS_TOKEN_SEP(*s)) {
|
||||
/* find start of token, skip all stop characters */
|
||||
while (*s && TEST_CHAR(*s, T_HTTP_TOKEN_STOP)) {
|
||||
++s;
|
||||
}
|
||||
if (!*s) {
|
||||
return 0;
|
||||
}
|
||||
if (!TEST_CHAR(*s, T_HTTP_TOKEN_STOP)) {
|
||||
/* find end of token */
|
||||
start_token = s;
|
||||
do {
|
||||
++s;
|
||||
} while (!TEST_CHAR(*s, T_HTTP_TOKEN_STOP));
|
||||
|
||||
if (tlen == (apr_size_t)(s - start_token)) {
|
||||
/* only spaces up to the next token separator */
|
||||
while (apr_isspace(*s)) {
|
||||
/* find end of the token */
|
||||
while (*s && !TEST_CHAR(*s, T_HTTP_TOKEN_STOP)) {
|
||||
++s;
|
||||
}
|
||||
if ((!*s || IS_TOKEN_SEP(*s))
|
||||
&& !ap_cstr_casecmpn((const char *)start_token,
|
||||
(const char *)tok, tlen)) {
|
||||
if (!ap_cstr_casecmpn((const char *)start_token, (const char *)tok,
|
||||
s - start_token)) {
|
||||
return 1;
|
||||
}
|
||||
}
|
||||
}
|
||||
/* advance to the next token */
|
||||
while (*s && !IS_TOKEN_SEP(*s)) {
|
||||
++s;
|
||||
if (!*s) {
|
||||
return 0;
|
||||
}
|
||||
}
|
||||
}
|
||||
@@ -1786,38 +1772,24 @@ AP_DECLARE(int) ap_find_token(apr_pool_t *p, const char *line, const char *tok)
|
||||
static const char *find_last_token(apr_pool_t *p, const char *line,
|
||||
const char *tok)
|
||||
{
|
||||
apr_size_t llen, tlen;
|
||||
apr_ssize_t lidx;
|
||||
int llen, tlen, lidx;
|
||||
|
||||
if (!line)
|
||||
return NULL;
|
||||
|
||||
tlen = strlen(tok);
|
||||
if (!tlen)
|
||||
return NULL;
|
||||
|
||||
llen = strlen(line);
|
||||
while (llen > 0 && apr_isspace(line[llen - 1]))
|
||||
--llen;
|
||||
tlen = strlen(tok);
|
||||
lidx = llen - tlen;
|
||||
if (lidx < 0)
|
||||
return NULL;
|
||||
|
||||
if (lidx > 0) {
|
||||
apr_size_t i = lidx - 1;
|
||||
do {
|
||||
if (line[i] == ',')
|
||||
break;
|
||||
if (!apr_isspace(line[i]))
|
||||
return NULL;
|
||||
} while (i--);
|
||||
}
|
||||
|
||||
if (ap_cstr_casecmpn(&line[lidx], tok, tlen) != 0)
|
||||
|
||||
if (lidx < 0 ||
|
||||
(lidx > 0 && !(apr_isspace(line[lidx - 1]) || line[lidx - 1] == ',')))
|
||||
return NULL;
|
||||
|
||||
if (ap_cstr_casecmpn(&line[lidx], tok, tlen) == 0) {
|
||||
return &line[lidx];
|
||||
}
|
||||
return NULL;
|
||||
}
|
||||
|
||||
AP_DECLARE(int) ap_find_last_token(apr_pool_t *p, const char *line,
|
||||
const char *tok)
|
||||
|
Reference in New Issue
Block a user