Bhushan Shelke <bhushan.she...@gmail.com> added the comment:
Hmm... intriguing... I just downloaded the files, an executed again, following is response Server ```127.0.0.1 - - [14/Dec/2020 13:07:34] "[31m[1m{}POST http://localhost:6000/getResponse HTTP/1.1[0m" 405 -``` Client ```py flask_client.py b'<!DOCTYPE HTML PUBLIC "-//W3C//DTD HTML 3.2 Final//EN">\n<title>405 Method Not Allowed</title>\n<h1>Method Not Allowed</h1>\n<p>The method is not allowed for the requested URL.</p>\n' <http.client.HTTPResponse object at 0x0000020BE4532CD0> ``` Since my theory is based on - body being appended sent fist before header in TCP packet. I just uploaded a file(flask_client_long_headers.py) having long header values. Could you please use this and check if you can reproduce it now. Also please suggest me any other alternative through which I could send more relevant information. ---------- Added file: https://bugs.python.org/file49676/flask_client_long_headers.py _______________________________________ Python tracker <rep...@bugs.python.org> <https://bugs.python.org/issue42417> _______________________________________ _______________________________________________ Python-bugs-list mailing list Unsubscribe: https://mail.python.org/mailman/options/python-bugs-list/archive%40mail-archive.com