apr_size_t headerlen = 4;
uint16_t pktsize, keylen, vallen;
+ const char *script_name;
+ const char *path_info;
+ const char *auth;
ap_add_common_vars(r);
ap_add_cgi_vars(r);
and generally if you host untrusted apps in your server and allows them to read others uid /proc/<pid>
files you have higher problems...
*/
- const char *script_name;
- const char *path_info;
- const char *auth = apr_table_get(r->headers_in, "Authorization");
+ auth = apr_table_get(r->headers_in, "Authorization");
if (auth) {
apr_table_setn(r->subprocess_env, "HTTP_AUTHORIZATION", auth);
}
apr_read_type_e mode = APR_NONBLOCK_READ;
apr_bucket_brigade *pass_bb;
apr_bucket_brigade *bb;
+ proxy_dir_conf *dconf;
request_rec *rp = make_fake_req(backend->connection, r);
rp->proxyreq = PROXYREQ_RESPONSE;
/* honor ProxyErrorOverride and ErrorDocument */
#if AP_MODULE_MAGIC_AT_LEAST(20101106,0)
- proxy_dir_conf *dconf =
+ dconf =
ap_get_module_config(r->per_dir_config, &proxy_module);
if (dconf->error_override && ap_is_HTTP_ERROR(r->status)) {
#else
{
int status;
int delta = 0;
+ int decode_status;
proxy_conn_rec *backend = NULL;
apr_pool_t *p = r->pool;
size_t w_len;
if (u_path_info[0] != '/') {
delta = 1;
}
- int decode_status = ap_unescape_url(url + w_len - delta);
+ decode_status = ap_unescape_url(url + w_len - delta);
if (decode_status) {
ap_log_rerror(APLOG_MARK, APLOG_ERR, 0, r,
"unable to decode uri: %s", url + w_len - delta);