Project

General

Profile

Bug #31

Handle mal-formed requests better

Added by Greg Farnum over 8 years ago. Updated 10 months ago.

Status:
Closed
Priority:
Normal
Assignee:
-
Target version:
-
Start date:
04/13/2010
Due date:
% Done:

0%

Spent time:
Source:
Tags:
Backport:
Regression:
No
Severity:
3 - minor
Reviewed:
Affected Versions:
ceph-qa-suite:
Pull request ID:

Description

RGW can't handle requests that don't include things like the HTTP_HOST header -- it just crashes out.

This was encountered when trying to test Cyberduck with the service; it can't connect. I don't know if Cyberduck is creating malformed requests or if rgw can't accept valid ones, but we probably shouldn't crash out on NPEs either way!

History

#1 Updated by Greg Farnum over 8 years ago

  • Status changed from New to Closed

HTTP_HOST is now an optional header, and I didn't notice any others behaving badly.

Plus it helps if your client and the server can agree on whether they're using HTTPS.

#2 Updated by Sage Weil over 7 years ago

  • Category set to radosgw

#3 Updated by Sage Weil over 7 years ago

  • Project changed from RADOS Gateway to Ceph
  • Category changed from radosgw to 22

#4 Updated by John Spray 10 months ago

  • Project changed from Ceph to rgw
  • Category deleted (22)

Bulk reassign of radosgw category to RGW project.

Also available in: Atom PDF