As mentioned in my previous email, it looks like it is safe to assume that
the release plan for HTTP Client 1.0 will be approved. Hence let's proceed
as if it is until we find out otherwise.
Per the release plan
(http://cvs.apache.org/viewcvs/~checkout~/jakarta-commons/httpclient/RELEASE_PLAN_1_0.txt)
our first task is to determine (via a lazy majority vote) the
changes/additions/removals/etc. to the Jakarta-Slide/main branch versions of
HTTP Client will be considered "in-scope" for the 1.0 release. The
intention is to have these changes identified (but not necessarily
implemented) by 23:59:59 GMT on Wednesday, 5 September 2001.
Here's a first pass toward that end. I've tried to enumerate the issues I am
aware of and what seemed to be the viable alternatives for each. If you'd
like to raise additional issues, or suggest additional alternatives, feel
free to do so. As always, non-binding votes are welcome, but only votes from
committers are significant for decision making purposes.
If you need clarification on any of the following, I'd be happy to try to
provide it.
<ballot>
1) Select one:
[ ] (a) Keep the org.apache.commons.httpclient.log package
[ ] (b) Return to stdout/stderr based logging/debugging
[ ] (c) Remove logging/debugging output altogether
2) Select one:
[ ] (a) Continue not to support multiple headers with the same
name, leaving the current behavior (second header
overwrites the first)
[ ] (b) Support multiple headers with the same name
(i.e., when headers like "a: one" and "a: two"
are received, treat as "a: one, two")
3) Select one:
[ ] (a) Continue to ignore query string changes during redirect
[ ] (b) Throw an exception for query string changes during redirect
[ ] (c) Respect query string changes during redirect
4) Select one:
[ ] (a) Continue to ignore host/port changes during redirect
[ ] (b) Throw exception when host/port changes during redirect
[ ] (c) Support host/port changes during redirect
5) Select one:
[ ] (a) Continue to ignore protocol changes during redirect
[ ] (b) Throw exception when protocol changes during redirect
[ ] (c) Support redirects from HTTP to HTTPS, but throw an
exception when redirecting from HTTPS to HTTP
(also see question 6.1)
6) Select one:
[ ] (a) Retain support for HTTPS, possibly addressing the
following issues
(If selected, continue with questions 6.x)
[ ] (b) Drop support for HTTPS
(If selected, skip to question 7)
6.1) Select one:
[ ] (a) Continue to throw exception when a redirect is
encountered in response to an HTTPS request
[ ] (b) Continue to throw exception, but make the message more
explicit
[ ] (b) Support redirects from HTTPS to HTTPS
(also see question 5)
6.2) Select one:
[ ] (a) Continue to ignore HTTPS/secure parameter when
proxying.
[ ] (b) Drop support for proxies altogether
[ ] (c) Make HTTPS work with proxies and vice versa.
7) Select one:
[ ] (a) Continue to support cookies, possibly addressing the
following issues
(If selected, continue with questions 7.x)
[ ] (b) Drop support for cookies.
(If selected, skip to question 8)
7.1) Select one:
[ ] (a) Correct Cookie.isToBeDiscarded() (currently returns
false for true/true for false)
[ ] (b) Leave Cookie.isToBeDiscarded() alone
7.2) Select one:
[ ] (a) Continue to ignore the request path when accepting
cookies.
[ ] (b) Pay attention to request path when accepting cookies,
per RFC 2109
7.3) Select one:
[ ] (a) Continue to send "secure" parameter when submitting
cookies.
[ ] (b) Don't send "secure" parameter when submitting cookies
(per RFC 2109)
7.4) Select one:
[ ] (a) Continue to ignore secure parameter when accepting
cookies
[ ] (b) Don't accept "secure" cookies over insecure connections
7.5) Select one:
[ ] (a) Continue to ignore secure parameter when sending
cookies
[ ] (b) Don't submit "secure" cookies over insecure connections
7.6) Select one:
[ ] (a) Continue to default to null for path attribute when
a cookie without any "extra" parameter (domain, max-age,
comment, etc.) is received, but default to "/" when
at least one "extra" parameter is received.
[ ] (b) Make path attribute default to "/" in all cases for
which no path parameter is returned in the set-cookie
header
[ ] (c) Make path attribute default to directory/path of request
in all cases for which no path parameter is returned
in the set-cookie header, per RFC 2109
7.7) Select one:
[ ] (a) Continue to accept only the specific RFC 2109 format
for "expires" attribute of cookies
[ ] (b) Accept some additional "expires" date formats, as
returned by Catalina and other servers (optional comma,
y2k friendly years, etc.)
7.8) Select one:
[ ] (a) Continue to submit a "Cookie: $Version=1" header when
cookies exist in State but none match the given request.
[ ] (b) Don't submit/add a "Cookie" header at all when Cookies
exist in State but none match the given request.
8) Select one:
[ ] (a) Continue to throw NullPointerException when
NameValuePair.equals method is invoked with a null name
or value
[ ] (b) Don't throw an exception in this case, treating
null == null.
</ballot>
_________________________________________________________________
Get your FREE download of MSN Explorer at http://explorer.msn.com/intl.asp