Message382959
Hmm... intriguing... I just downloaded the files, an executed again, following is response
Server
```127.0.0.1 - - [14/Dec/2020 13:07:34] "[31m[1m{}POST http://localhost:6000/getResponse HTTP/1.1[0m" 405 -```
Client
```py flask_client.py
b'<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">\n<title>405 Method Not Allowed</title>\n<h1>Method Not Allowed</h1>\n<p>The method is not allowed for the requested URL.</p>\n'
<http.client.HTTPResponse object at 0x0000020BE4532CD0>
```
Since my theory is based on - body being appended sent fist before header in TCP packet. I just uploaded a file(flask_client_long_headers.py) having long header values. Could you please use this and check if you can reproduce it now. Also please suggest me any other alternative through which I could send more relevant information. |
|
Date |
User |
Action |
Args |
2020-12-14 07:50:07 | bhushan.shelke | set | recipients:
+ bhushan.shelke, paul.moore, ronaldoussoren, christian.heimes, tim.golden, zach.ware, steve.dower, andrei.avk |
2020-12-14 07:50:07 | bhushan.shelke | set | messageid: <1607932207.18.0.645274736396.issue42417@roundup.psfhosted.org> |
2020-12-14 07:50:07 | bhushan.shelke | link | issue42417 messages |
2020-12-14 07:50:06 | bhushan.shelke | create | |
|