Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Fix #50: Add check for null header values in incoming request #61

Merged
merged 1 commit into from
May 8, 2024

Conversation

51-code
Copy link

@51-code 51-code commented May 8, 2024

Checks for null headers in incoming request. #50 was caused by Accept header being null in the test plan.

Changes null values to be empty Strings, is this okay?

The fix could also be implemented in rlo_14 instead.

Tested with the same test plan with JMeter, no unit test yet as end to end testing is not implemented yet (see #53).

@51-code 51-code added the bug Something isn't working label May 8, 2024
@51-code 51-code requested a review from kortemik May 8, 2024 08:50
@51-code 51-code self-assigned this May 8, 2024
@kortemik
Copy link
Member

kortemik commented May 8, 2024

yes i think it is proper because http header without a value is empty string, netty is using null instead of empty string for some reason.

@kortemik kortemik merged commit 83dd1bc into teragrep:main May 8, 2024
1 check passed
@51-code 51-code deleted the fix_#50 branch May 15, 2024 06:40
@51-code 51-code linked an issue Jun 4, 2024 that may be closed by this pull request
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
bug Something isn't working
Projects
None yet
Development

Successfully merging this pull request may close these issues.

no auth causes npe
2 participants