@@ -200,7 +200,7 @@ char *get_env_var(request_rec *r, char *name) {
200200static void get_field_value (const char * from , const char * to , const char * text , char * output ) {
201201 char * first = strstr (text , from );
202202 int first_index = first - text ;
203- char backslash [] = "\\" ;
203+ char backslash [] = "\\" ;
204204
205205 if (first != NULL ) {
206206 if ((first_index > 0 && strncmp ((first - 1 ), backslash , 2 ) != 0 ) || (first_index == 0 )) {
@@ -332,16 +332,16 @@ static void send_waf_log(struct waf_lock* lock, apr_file_t* fd, const char* str1
332332 char waf_ruleset_type [50 ] = "" ;
333333 char waf_ruleset_version [50 ] = "" ;
334334 char waf_detail_message [1024 ] = "" ;
335- char waf_unique_id [100 ] = "" ;
335+ char waf_unique_id [100 ] = "" ;
336336
337337 get_field_value ("[file " , "]" , str1 , waf_filename );
338338 get_field_value ("[id " , "]" , str1 , waf_id );
339339 get_field_value ("[line " , "]" , str1 , waf_line );
340340 get_field_value ("[msg " , "]" , str1 , waf_message );
341341 get_field_value ("[data " , "]" , str1 , waf_data );
342- get_field_value ("[ver " , "]" , str1 , waf_ruleset_info );
343- get_field_value ("[unique_id " , "]" , unique_id , waf_unique_id );
344- get_ip_port (ip_port , waf_ip , waf_port );
342+ get_field_value ("[ver " , "]" , str1 , waf_ruleset_info );
343+ get_field_value ("[unique_id " , "]" , unique_id , waf_unique_id );
344+ get_ip_port (ip_port , waf_ip , waf_port );
345345 get_detail_message (str1 , waf_detail_message );
346346 get_short_filename (waf_filename );
347347 get_ruleset_type_version (waf_ruleset_info , waf_ruleset_type , waf_ruleset_version );
@@ -438,8 +438,8 @@ static void internal_log_ex(request_rec *r, directory_config *dcfg, modsec_rec *
438438
439439 /* Send message levels 1-3 to the Apache error log and
440440 * add it to the message list in the audit log. */
441- char * unique_id = (char * )get_env_var (r , "UNIQUE_ID" );
442- if (level <= 3 ) {
441+ char * unique_id = (char * )get_env_var (r , "UNIQUE_ID" );
442+ if (level <= 3 ) {
443443 char * hostname = (char * )msr -> hostname ;
444444 char * requestheaderhostname = (char * )r -> hostname ;
445445
@@ -469,7 +469,7 @@ static void internal_log_ex(request_rec *r, directory_config *dcfg, modsec_rec *
469469
470470 if (rc != APR_SUCCESS ) {
471471 #if AP_SERVER_MAJORVERSION_NUMBER > 1 && AP_SERVER_MINORVERSION_NUMBER > 2
472- ap_log_rerror (APLOG_MARK , APLOG_ERR | APLOG_NOERRNO , 0 , r ,
472+ ap_log_rerror (APLOG_MARK , APLOG_ERR | APLOG_NOERRNO , 0 , r ,
473473 "ModSecurity not able to reopen %s file" , WAF_LOG_UTIL_FILE );
474474 #else
475475 ap_log_error (APLOG_MARK , APLOG_ERR | APLOG_NOERRNO , 0 , r -> server ,
@@ -484,7 +484,7 @@ static void internal_log_ex(request_rec *r, directory_config *dcfg, modsec_rec *
484484#endif
485485
486486#if AP_SERVER_MAJORVERSION_NUMBER > 1 && AP_SERVER_MINORVERSION_NUMBER > 2
487- ap_log_rerror (APLOG_MARK , APLOG_ERR | APLOG_NOERRNO , 0 , r ,
487+ ap_log_rerror (APLOG_MARK , APLOG_ERR | APLOG_NOERRNO , 0 , r ,
488488 "[client %s] ModSecurity: %s%s [uri \"%s\"]%s%s" , r -> useragent_ip ? r -> useragent_ip : r -> connection -> client_ip , str1 ,
489489 hostname , log_escape (msr -> mp , r -> uri ), unique_id , requestheaderhostname );
490490#else
0 commit comments