ASF Bugzilla – Attachment 36016 Details for
Bug 60330
reverse proxy of 100-continue aware backend, sends 100 continue even when backend does not
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
curl(1) to Tomcat via HTTPd
curl-tomcat-via-httpd.txt (text/plain), 2.95 KB, created by
Michael Osipov
on 2018-07-06 10:57:28 UTC
(
hide
)
Description:
curl(1) to Tomcat via HTTPd
Filename:
MIME Type:
Creator:
Michael Osipov
Created:
2018-07-06 10:57:28 UTC
Size:
2.95 KB
patch
obsolete
>$ curl --verbose --negotiate -u : https://<hostname>/<app>/rest/documents -X POST -T document.zip -H "Content-Type: application/zip" >* Trying <hostip>... >* TCP_NODELAY set >* Connected to <hostname> (<hostip>) port 443 (#0) >* ALPN, offering http/1.1 >* Cipher selection: ALL:!EXPORT:!EXPORT40:!EXPORT56:!aNULL:!LOW:!RC4:@STRENGTH >* successfully set certificate verify locations: >* CAfile: /usr/local/share/certs/ca-root-nss.crt > CApath: none >* TLSv1.2 (OUT), TLS header, Certificate Status (22): >* TLSv1.2 (OUT), TLS handshake, Client hello (1): >* TLSv1.2 (IN), TLS handshake, Server hello (2): >* TLSv1.2 (IN), TLS handshake, Certificate (11): >* TLSv1.2 (IN), TLS handshake, Server key exchange (12): >* TLSv1.2 (IN), TLS handshake, Server finished (14): >* TLSv1.2 (OUT), TLS handshake, Client key exchange (16): >* TLSv1.2 (OUT), TLS change cipher, Client hello (1): >* TLSv1.2 (OUT), TLS handshake, Finished (20): >* TLSv1.2 (IN), TLS change cipher, Client hello (1): >* TLSv1.2 (IN), TLS handshake, Finished (20): >* SSL connection using TLSv1.2 / ECDHE-RSA-AES256-GCM-SHA384 >* ALPN, server accepted to use http/1.1 >* Server certificate: >* subject: ...; CN=<hostname> >* start date: May 31 13:00:16 2018 GMT >* expire date: May 31 13:00:16 2019 GMT >* subjectAltName: host "<hostname>" matched cert's "<hostname>" >* issuer: <issuer> >* SSL certificate verify ok. >> POST /<app>/rest/documents HTTP/1.1 >> Host: <hostname> >> User-Agent: curl/7.60.0 >> Accept: */* >> Content-Type: application/zip >> Content-Length: 1357 >> Expect: 100-continue >> >< HTTP/1.1 100 Continue >* We are completely uploaded and fine >< HTTP/1.1 401 401 >< Date: Fri, 06 Jul 2018 10:41:54 GMT >< Server: Apache/2.4.33 (FreeBSD) OpenSSL/1.0.2o PHP/5.6.36 SVN/1.9.7 mod_auth_gssapi/1.6.1 >< X-Frame-Options: SAMEORIGIN >< WWW-Authenticate: Negotiate >< Content-Type: text/html;charset=utf-8 >< Content-Language: en >< Content-Length: 1034 >< >* Ignoring the response-body >* Connection #0 to host <hostname> left intact >* Issue another request to this URL: 'https://<hostname>/<app>/rest/documents' >* Found bundle for host <hostname>: 0x28c0b260 [can pipeline] >* Re-using existing connection! (#0) with host <hostname> >* Connected to <hostname> (<hostip>) port 443 (#0) >* Server auth using Negotiate with user '' >> POST /<app>/rest/documents HTTP/1.1 >> Host: <hostname> >> Authorization: Negotiate YIIUKgYG... >> User-Agent: curl/7.60.0 >> Accept: */* >> Content-Type: application/zip >> Content-Length: 1357 >> Expect: 100-continue >> >< HTTP/1.1 100 Continue >* We are completely uploaded and fine >< HTTP/1.1 201 201 >< Date: Fri, 06 Jul 2018 10:41:54 GMT >< Server: Apache/2.4.33 (FreeBSD) OpenSSL/1.0.2o PHP/5.6.36 SVN/1.9.7 mod_auth_gssapi/1.6.1 >< X-Frame-Options: SAMEORIGIN >< WWW-Authenticate: Negotiate oYH1M... >< Location: https://<hostname>/<app>/rest/documents/6667f88a-5783-11e8-857e-001f29e7988e >< Content-Length: 0 >< >* Closing connection 0 >* TLSv1.2 (OUT), TLS alert, Client hello (1):
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Raw
Actions:
View
Attachments on
bug 60330
:
34438
|
34451
|
36015
| 36016 |
36046
|
36047
|
36048
|
36478