Skip to content

Commit f87f819

Browse files
MDA2AVclaude
andcommitted
Glossary sidebar collapsed by default
Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
1 parent 636e75a commit f87f819

8 files changed

Lines changed: 8 additions & 8 deletions

File tree

docs/content/docs/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -2,7 +2,7 @@
22
title: Glossary
33
description: "Glossary — Http11Probe documentation"
44
sidebar:
5-
open: true
5+
open: false
66
---
77

88
Reference documentation for every test in Http11Probe, organized by topic. Each page explains the RFC requirement, what the test sends, what response is expected, and why it matters.

docs/content/docs/content-length/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Content-Length
33
description: "Content-Length — Http11Probe documentation"
44
weight: 6
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
The `Content-Length` header indicates the size of the message body in bytes. Its grammar is strict: `Content-Length = 1*DIGIT`. Any deviation — non-numeric characters, plus signs, leading zeros, negative values, overflow — can cause parsers to disagree on body boundaries.

docs/content/docs/headers/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Header Syntax
33
description: "Header Syntax — Http11Probe documentation"
44
weight: 4
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
HTTP header fields follow a strict grammar: `field-name ":" OWS field-value OWS`. RFC 9112 Section 5 and RFC 9110 Section 5.6.2 define what constitutes a valid header. Violations can lead to parser disagreements and smuggling.

docs/content/docs/host-header/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Host Header
33
description: "Host Header — Http11Probe documentation"
44
weight: 5
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
The Host header is the only header where RFC 9112 **explicitly mandates a 400 response** for violations. This makes the Host header tests the strictest in the entire suite — close or timeout is NOT acceptable.

docs/content/docs/line-endings/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Line Endings
33
description: "Line Endings — Http11Probe documentation"
44
weight: 2
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
RFC 9112 Section 2.2 defines that HTTP/1.1 messages use **CRLF** (`\r\n`) as the line terminator for the request-line and header fields. Deviations from this — bare LF, bare CR — are framing violations that can lead to request smuggling or parser confusion.

docs/content/docs/malformed-input/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Malformed Input
33
description: "Malformed Input — Http11Probe documentation"
44
weight: 8
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
These tests send pathological, oversized, or completely invalid payloads. The goal is not RFC compliance (there's no RFC section for "what to do with binary garbage") — it's robustness. A well-implemented server should reject gracefully, not crash, hang, or consume unbounded resources.

docs/content/docs/request-line/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Request Line
33
description: "Request Line — Http11Probe documentation"
44
weight: 3
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
The request-line is the first line of an HTTP request: `method SP request-target SP HTTP-version CRLF`. RFC 9112 Section 3 defines its grammar strictly. Malformed request-lines are a common vector for parser confusion.

docs/content/docs/smuggling/_index.md

Lines changed: 1 addition & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -3,7 +3,7 @@ title: Request Smuggling
33
description: "Request Smuggling — Http11Probe documentation"
44
weight: 7
55
sidebar:
6-
open: true
6+
open: false
77
---
88

99
HTTP request smuggling exploits disagreements between HTTP processors about where one request ends and the next begins. When two servers parse the same byte stream differently, an attacker can hide a request inside another.

0 commit comments

Comments
 (0)