Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Jim Gallacher
Alexis, Do you a have a small file which shows this behaviour and could be used for testing? Even better would be a function which would generate a test file. This could be included in the mod_python unit tests. Jim Alexis Marrero wrote: All, The current 3.1 mod_python implementation of

Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Nicolas Lehuen
Hi guys, In the pure if it ain't tested, it ain't fixed fashion, I've added a unit test for file upload to the test suite. It uploads a randomly generated 1 MB file to the server, and check that the MD5 digest returned by the server is correct. I could not reproduce Alexis' bug report this way,

Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Nicolas Lehuen
OK, it looks like Alexis' fix solves the problem with ugh.pdf without breaking the other unit tests. So I think we can safely integrate his patch. Shall I do it ? Regards, Nicolas2005/11/6, Nicolas Lehuen [EMAIL PROTECTED]: Hi guys, In the pure if it ain't tested, it ain't fixed fashion, I've

Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Alexis Marrero
Nicolas,Not that I'm the one to give permission whether to integrate things or not, but just to let you know I don't even have svn installed so I won't do it. At least not for a while...BTW, if there are some cherrypy developers in this mailing list, the CherryPy function that handles file uploads

Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Jim Gallacher
I've been spending some quality time with hexedit, vim and a little bit of python. I can now generate a file which can be used in the unit test. The problem seems to occur when a '\r' character is right at readBlockSize boundary, which is 65368 in the current mod_python.util. I have not yet

Re: mod_python.util.StorageField.read_to_boundary has problems in 3.1 and 3.2

2005-11-06 Thread Jim Gallacher
Gregory (Grisha) Trubetskoy wrote: So I guess this means we roll and vote on a 3.2.5b? As much as it pains me to say it, but yes, this is a must fixm so it's on to 3.2.5b. I think we need to do some more extensive testing on Alexis's fix before we roll 3.2.5b. His read_to_boundary is

[jira] Reopened: (MODPYTHON-40) FieldStorage : don't stream file uploads to memory

2005-11-06 Thread Nicolas Lehuen (JIRA)
[ http://issues.apache.org/jira/browse/MODPYTHON-40?page=all ] Nicolas Lehuen reopened MODPYTHON-40: - The fix has a bug - see http://www.modpython.org/pipermail/mod_python/2005-November/019468.html and the python-dev mailing list (GMane archive

Re: SSL enabled - nokeepalive in MSIE for non-SSL connections

2005-11-06 Thread Olaf van der Spek
On 11/5/05, Marc Stern [EMAIL PROTECTED] wrote: It's a bit more complex than that. At a certain point, a fix was released for IE 6 to correct the incompatibility that needed the 'ssl-unclean-shutdown' directive (I guess it's KB 831167). At this point, we had two different flavours of IE+SSL

Tune 'lookup_builtin_method' in '\modules\http'

2005-11-06 Thread Christophe Jaillet
Function 'lookup_builtin_method' in '\modules\http' seems to be optimized for speed. However, looking deeper into it, a few more CPU cycles can be saved. In case 6, we have : ___ case 6: switch (method[0]) { case 'U':

Re: pgp trust for https?

2005-11-06 Thread Phillip Susi
Nick Kew wrote: Why would anyone have to do that? I'll trust a server as much as I trust the PGP key of the person who signed it. That's the same as trusting an httpd download because it's signed by someone whose key I trust. The question then is who is going to sign? You seem to be

Bug report for Apache httpd-1.3 [2005/11/06]

2005-11-06 Thread bugzilla
+---+ | Bugzilla Bug ID | | +-+ | | Status: UNC=Unconfirmed NEW=New ASS=Assigned

Bug report for Apache httpd-2.0 [2005/11/06]

2005-11-06 Thread bugzilla
+---+ | Bugzilla Bug ID | | +-+ | | Status: UNC=Unconfirmed NEW=New ASS=Assigned

Re: pgp trust for https?

2005-11-06 Thread Nick Kew
On Sunday 06 November 2005 21:41, Phillip Susi wrote: Nick Kew wrote: Why would anyone have to do that? I'll trust a server as much as I trust the PGP key of the person who signed it. That's the same as trusting an httpd download because it's signed by someone whose key I trust. The

Re: pgp trust for https?

2005-11-06 Thread Joost de Heer
Personally, I feel this role belongs in the government. Whose government? I don't even trust my own government, so why should I trust a foreign government? Joost

Re: pgp trust for https?

2005-11-06 Thread Peter Djalaliev
It is a little unclear to me about the combination of security and efficiency that we can achieve by using PGP keys and the web-of-trust on the web. Imagine connecting to you bank or online stock broker. If they would certify themselves using PGP certificates, they will need to have a large number

Re: pgp trust for https?

2005-11-06 Thread Phillip Susi
Nick Kew wrote: Huh? The same person who installs the cert now. It's just a different signature. And for those who want a certificate authority, have such authorities (the more the better) sign *their* PGP keys. >From whomsoever is responsible for it. Maybe even more than one

Re: cache trouble (Re: [vote] 2.1.9 as beta)

2005-11-06 Thread Roy T . Fielding
On Nov 4, 2005, at 10:56 AM, William A. Rowe, Jr. wrote: It leaves us wondering; how can allow from/deny from n.n.n.n be mapped to RFC 2616 semantics, or at least, without running the many server hooks on later requests? The only way I can see, is that we should have any more explicit allow

Re: cache trouble (Re: [vote] 2.1.9 as beta)

2005-11-06 Thread Paul Querna
Roy T.Fielding wrote: On Nov 4, 2005, at 10:56 AM, William A. Rowe, Jr. wrote: It leaves us wondering; how can allow from/deny from n.n.n.n be mapped to RFC 2616 semantics, or at least, without running the many server hooks on later requests? The only way I can see, is that we should have