This issue tracker has been migrated to GitHub, and is currently read-only.
For more information, see the GitHub FAQs in the Python's Developer Guide.

Author bhushan.shelke
Recipients andrei.avk, bhushan.shelke, christian.heimes, paul.moore, ronaldoussoren, steve.dower, tim.golden, zach.ware
Date 2020-12-14.07:50:06
SpamBayes Score -1.0
Marked as misclassified Yes
Message-id <1607932207.18.0.645274736396.issue42417@roundup.psfhosted.org>
In-reply-to
Content
Hmm... intriguing... I just downloaded the files, an executed again, following is response

Server
```127.0.0.1 - - [14/Dec/2020 13:07:34] "{}POST http://localhost:6000/getResponse HTTP/1.1" 405 -```

Client
```py flask_client.py
b'<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">\n<title>405 Method Not Allowed</title>\n<h1>Method Not Allowed</h1>\n<p>The method is not allowed for the requested URL.</p>\n'
<http.client.HTTPResponse object at 0x0000020BE4532CD0>
```

Since my theory is based on - body being appended sent fist before header in TCP packet. I just uploaded a file(flask_client_long_headers.py) having long header values. Could you please use this and check if you can reproduce it now. Also please suggest me any other alternative through which I could send more relevant information.
History
Date User Action Args
2020-12-14 07:50:07bhushan.shelkesetrecipients: + bhushan.shelke, paul.moore, ronaldoussoren, christian.heimes, tim.golden, zach.ware, steve.dower, andrei.avk
2020-12-14 07:50:07bhushan.shelkesetmessageid: <1607932207.18.0.645274736396.issue42417@roundup.psfhosted.org>
2020-12-14 07:50:07bhushan.shelkelinkissue42417 messages
2020-12-14 07:50:06bhushan.shelkecreate