On Wed, Aug 17, 2016 at 12:24 AM, William A Rowe Jr <wr...@rowe-clan.net> wrote:
> On Aug 16, 2016 4:39 PM, "Yann Ylavic" <ylavic....@gmail.com> wrote:
>> > -AP_INIT_ITERATE("HttpProtocol", set_http_protocol, NULL, RSRC_CONF,
>> > -              "'min=0.9' (default) or 'min=1.0' to allow/deny HTTP/0.9;
>> > "
>> > -              "'liberal', 'strict', 'strict,log-only'"),
>> > +AP_INIT_ITERATE("EnforceHttpProtocol", set_enforce_http_protocol, NULL,
>> > RSRC_CONF,
>> > +              "'Allow0.9' or 'Require1.0' (default) to allow or deny
>> > HTTP/0.9; "
>> > +              "'Unsafe' or 'Strict' (default) to process incorrect
>> > requests"),
>>
>> The original min= was naturally mutually exclusive, and the original
>> <option>= looks more extensible (to me)...
>
> It appeared that both exclusivity tests were borked because the value was
> first set, ergo the old bit was unset, and then a meaningless test occurred
> (doh).
>
> Allow0.9 or Require1.0 is more readily apparent in perusing someone else's
> config files. We have too many uses of generic (and case sensitive? Ick)
> keywords that makes it harder to spot misconfiguration. Do you really want
> to grep for the token and the directive name, or an arbitrary search for
> min= which has a number of contextual meanings?

Fair enough.

>
>> Also, since this directive will mainly be used to relax HTTP protocol
>> (wrt RFC 7230) for compatibility reasons, EnforceHttpProtocol may not
>> be appropriate.
>>
>> How about HttpProtocolPolicy [Strict|Unsafe] min=[0.9|1.0|1.1] ?
>
> I'm open to suggestions, what about HTTPProtocolOptions (option list)?

Works for me too.


Thanks,
Yann.

Reply via email to