Bhushan Shelke <bhushan.she...@gmail.com> added the comment:

Hmm... intriguing... I just downloaded the files, an executed again, following 
is response

Server
```127.0.0.1 - - [14/Dec/2020 13:07:34] "{}POST 
http://localhost:6000/getResponse HTTP/1.1" 405 -```

Client
```py flask_client.py
b'<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">\n<title>405 Method 
Not Allowed</title>\n<h1>Method Not Allowed</h1>\n<p>The method is not allowed 
for the requested URL.</p>\n'
<http.client.HTTPResponse object at 0x0000020BE4532CD0>
```

Since my theory is based on - body being appended sent fist before header in 
TCP packet. I just uploaded a file(flask_client_long_headers.py) having long 
header values. Could you please use this and check if you can reproduce it now. 
Also please suggest me any other alternative through which I could send more 
relevant information.

----------
Added file: https://bugs.python.org/file49676/flask_client_long_headers.py

_______________________________________
Python tracker <rep...@bugs.python.org>
<https://bugs.python.org/issue42417>
_______________________________________
_______________________________________________
Python-bugs-list mailing list
Unsubscribe: 
https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com

Reply via email to