|
@@ -10657,7 +10657,7 @@ parse_http_request(char *buf, int len, struct mg_request_info *ri)
|
|
return -1;
|
|
return -1;
|
|
}
|
|
}
|
|
ri->http_version += 5;
|
|
ri->http_version += 5;
|
|
-
|
|
|
|
|
|
+
|
|
/* Check for a valid http method */
|
|
/* Check for a valid http method */
|
|
if (!is_valid_http_method(ri->request_method)) {
|
|
if (!is_valid_http_method(ri->request_method)) {
|
|
return -1;
|
|
return -1;
|
|
@@ -14038,10 +14038,6 @@ handle_request(struct mg_connection *conn)
|
|
if (should_decode_url(conn)) {
|
|
if (should_decode_url(conn)) {
|
|
mg_url_decode(
|
|
mg_url_decode(
|
|
ri->local_uri, uri_len, (char *)ri->local_uri, uri_len + 1, 0);
|
|
ri->local_uri, uri_len, (char *)ri->local_uri, uri_len + 1, 0);
|
|
-
|
|
|
|
- if (conn->request_info.query_string) {
|
|
|
|
- url_decode_in_place((char *)conn->request_info.query_string);
|
|
|
|
- }
|
|
|
|
}
|
|
}
|
|
|
|
|
|
/* 1.4. clean URIs, so a path like allowed_dir/../forbidden_file is not
|
|
/* 1.4. clean URIs, so a path like allowed_dir/../forbidden_file is not
|