Hi,

I have a scenario where in when a file is uploaded to the server, if the
file fully exists on the server with matching etag,  the server responds
back with a 200 and closes the connection without actually reading the data
being uploaded.  But unfortunately on libcurl this response is ignored and
the broken pipe error is reported.... Is this a bug or is this working as
expected, if so how do I handle such cases.... Any help is highly
appreciated. Kindly find the curl verbose output attached...

Thanks and Regards,
Arun J
/storage/dtf_storage/APS/DATA/A429 # curl -v -L --insecure 
"https://esightgsq.embraer.com.br/ADG-400/PP-XJE"; -H "Authorization: Bearer 
1ea8dbc7-099a-4002-b35
5-fcf1065ca701" -H "operationType: DownloadToGround" -H "subFolder: DATA//A429" 
-H "fileName:Test_A429_1212_2022_0.zip" -H "Content-range: bytes=1-38716748"
-H 
"etag:b971816c37309fff5dc1a12c277f070725978c28274e4bf446a089e790b3794cc4ee2758f7644824823316c17ecc424da0e51937f455fbffb974240d3ee57d39"
 --data-binary @Tes
t_A429_1212_2022_0.zip
*   Trying 18.216.71.179:443...
* Connected to esightgsq.embraer.com.br (18.216.71.179) port 443 (#0)
* ALPN: offers http/1.1
* TLSv1.3 (OUT), TLS handshake, Client hello (1):
* TLSv1.3 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Change cipher spec (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN: server accepted http/1.1
* Server certificate:
*  subject: CN=*.embraer.com.br
*  start date: Apr  7 00:00:00 2022 GMT
*  expire date: May  6 23:59:59 2023 GMT
*  issuer: C=US; O=Amazon; OU=Server CA 1B; CN=Amazon
*  SSL certificate verify result: unable to get local issuer certificate (20), 
continuing anyway.
> POST /ADG-400/PP-XJE HTTP/1.1
> Host: esightgsq.embraer.com.br
> User-Agent: curl/7.86.0
> Accept: */*
> Authorization: Bearer 1ea8dbc7-099a-4002-b355-fcf1065ca701
> operationType: DownloadToGround
> subFolder: DATA//A429
> fileName:Test_A429_1212_2022_0.zip
> Content-range: bytes=1-38716748
> etag:b971816c37309fff5dc1a12c277f070725978c28274e4bf446a089e790b3794cc4ee2758f7644824823316c17ecc424da0e51937f455fbffb974240d3ee57d39
> Content-Length: 38716748
> Content-Type: application/x-www-form-urlencoded
> Expect: 100-continue
>
* Mark bundle as not supporting multiuse
< HTTP/1.1 100 Continue
* Mark bundle as not supporting multiuse
< HTTP/1.1 200
< Date: Tue, 20 Dec 2022 16:39:10 GMT
< Content-Length: 0
< Connection: keep-alive
< X-Content-Type-Options: nosniff
< X-XSS-Protection: 1; mode=block
< Cache-Control: no-cache, no-store, max-age=0, must-revalidate
< Pragma: no-cache
< Expires: 0
< X-Frame-Options: DENY
<
* OpenSSL SSL_write: Broken pipe, errno 32
* Closing connection 0
curl: (55) OpenSSL SSL_write: Broken pipe, errno 32
/storage/dtf_storage/APS/DATA/A429 #
-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to