Project

General

Profile

Bug #31

Handle mal-formed requests better

Added by Greg Farnum almost 14 years ago. Updated about 6 years ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Target version:
-
% Done:

0%

Spent time:
Source:
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:
Crash signature (v1):
Crash signature (v2):

Description

RGW can't handle requests that don't include things like the HTTP_HOST header -- it just crashes out.

This was encountered when trying to test Cyberduck with the service; it can't connect. I don't know if Cyberduck is creating malformed requests or if rgw can't accept valid ones, but we probably shouldn't crash out on NPEs either way!

History

#1 Updated by Greg Farnum almost 14 years ago

  • Status changed from New to Closed

HTTP_HOST is now an optional header, and I didn't notice any others behaving badly.

Plus it helps if your client and the server can agree on whether they're using HTTPS.

#2 Updated by Sage Weil about 13 years ago

  • Category set to radosgw

#3 Updated by Sage Weil about 13 years ago

  • Project changed from RADOS Gateway to Ceph
  • Category changed from radosgw to 22

#4 Updated by John Spray about 6 years ago

  • Project changed from Ceph to rgw
  • Category deleted (22)

Bulk reassign of radosgw category to RGW project.

Also available in: Atom PDF