From c6ffae22748bc22d5ef88fea2a3ca67f480ee74b Mon Sep 17 00:00:00 2001 From: Eric Wong Date: Fri, 19 Nov 2010 10:19:45 +0000 Subject: max_body: rewrite wrappers to be safer To avoid denial-of-service attacks, the wrappers need to intercept requests *before* they hit the memory allocator, so we need to reimplement the read(all) and gets cases to use smaller buffers whenever the application does not specify one. --- t/t0105-rack-input-limit-bigger.sh | 2 ++ 1 file changed, 2 insertions(+) (limited to 't/t0105-rack-input-limit-bigger.sh') diff --git a/t/t0105-rack-input-limit-bigger.sh b/t/t0105-rack-input-limit-bigger.sh index e8cf95a..642dd2b 100755 --- a/t/t0105-rack-input-limit-bigger.sh +++ b/t/t0105-rack-input-limit-bigger.sh @@ -22,6 +22,7 @@ t_begin "stops a regular request" && { rm -f $tmp dbgcat curl_err dbgcat curl_out + grep 413 $curl_err test -e $ok } @@ -32,6 +33,7 @@ t_begin "stops a large chunked request" && { http://$listen/ > $curl_out 2> $curl_err || > $ok dbgcat curl_err dbgcat curl_out + grep 413 $curl_err test -e $ok } -- cgit v1.2.3-24-ge0c7