Return-Path: Delivered-To: apmail-new-httpd-archive@apache.org Received: (qmail 91415 invoked by uid 500); 3 Oct 2000 20:47:45 -0000 Mailing-List: contact new-httpd-help@apache.org; run by ezmlm Precedence: bulk Reply-To: new-httpd@apache.org list-help: list-unsubscribe: list-post: Delivered-To: mailing list new-httpd@apache.org Received: (qmail 91390 invoked from network); 3 Oct 2000 20:47:41 -0000 Sender: gregames@raleigh.ibm.com Message-ID: <39DA40AA.801B2F49@raleigh.ibm.com> Date: Tue, 03 Oct 2000 20:25:14 +0000 From: Greg Ames X-Mailer: Mozilla 4.61 [en] (X11; I; Linux 2.2.13-7mdk i686) X-Accept-Language: en MIME-Version: 1.0 To: new-httpd@apache.org Subject: Re: FW: cvs commit: apache-2.0/src/main http_core.c http_protocol.c http_request.c References: Content-Type: text/plain; charset=us-ascii Content-Transfer-Encoding: 7bit X-Spam-Rating: locus.apache.org 1.6.2 0/1000/N rbb@covalent.net wrote: > Modified: src CHANGES > src/main http_core.c http_protocol.c http_request.c > Log: > Combine the calls to add the core_filter to one place. Basically, it is > safe to add the core_filter during the post_read_request, and it means > that we only have to add the filter once in the code. This should make > it easier to add an SSL module in the future. Unfortunately, post_read_request isn't soon enough :-(. There are a number of HTTP protocol errors detected by ap_read_request prior to this hook, and we're back to getting no error response body. Here are a couple of failed test cases: [greg@ojibwa src]$ nc 127.0.0.1 80 GET / HTTP/1.0 no_colon HTTP/1.1 400 Bad Request Date: Tue, 03 Oct 2000 17:14:31 GMT Server: Apache/2.0a7 (Unix) Connection: close Content-Type: text/html; charset=iso-8859-1 [greg@ojibwa src]$ nc 127.0.0.1 80 HEAD / <-- Note that HEAD is illegal for HTTP 0.9 [greg@ojibwa src]$ I'll back out this change, then post a suggestion for dealing with SSL. Greg