DO NOT REPLY TO THIS EMAIL, BUT PLEASE POST YOUR BUG 
RELATED COMMENTS THROUGH THE WEB INTERFACE AVAILABLE AT
<http://nagoya.apache.org/bugzilla/show_bug.cgi?id=16134>.
ANY REPLY MADE TO THIS MESSAGE WILL NOT BE COLLECTED AND 
INSERTED IN THE BUG DATABASE.

http://nagoya.apache.org/bugzilla/show_bug.cgi?id=16134

mod_deflate may lead to HTTP/1.1 400 responce when a request is absolutely 
correct





------- Additional Comments From [EMAIL PROTECTED]  2003-01-15 20:35 -------
Once again the proposed patch agains the most recent version of mod_deflate.c:

--- mod_deflate.c~      2003-01-03 02:12:36.000000000 +0300
+++ mod_deflate.c       2003-01-15 23:31:04.000000000 +0300
@@ -557,7 +557,7 @@
     int zRC;
     apr_status_t rv;
     deflate_filter_config *c;
-
+
     /* just get out of the way of things we don't want. */
     if (mode != AP_MODE_READBYTES) {
         return ap_get_brigade(f->next, bb, mode, block, readbytes);
@@ -655,6 +655,15 @@
             return rv;
         }
 
+               if (APR_BUCKET_IS_EOS(APR_BRIGADE_FIRST(ctx->bb))) {
+                       apr_bucket *eos;
+
+                       apr_brigade_cleanup(ctx->bb);
+                       eos = apr_bucket_eos_create(f->c->bucket_alloc);
+                       APR_BRIGADE_INSERT_TAIL(bb, eos); 
+                       return APR_SUCCESS;
+               }
+
         APR_BRIGADE_FOREACH(bkt, ctx->bb) {
             const char *data;
             apr_size_t len;

---------------------------------------------------------------------
To unsubscribe, e-mail: [EMAIL PROTECTED]
For additional commands, e-mail: [EMAIL PROTECTED]

Reply via email to