Bug 677359

Summary: "TOO MANY ARGUMENTS IN THE URL" error
Product: [Retired] Red Hat Cluster Suite Reporter: Carlos Infantes <carlosinfantes>
Component: piranhaAssignee: Marek Grac <mgrac>
Status: CLOSED WONTFIX QA Contact: Cluster QE <mspqa-list>
Severity: medium Docs Contact:
Priority: unspecified    
Version: 4CC: cluster-maint, edamato
Target Milestone: ---   
Target Release: ---   
Hardware: x86_64   
OS: Linux   
Whiteboard:
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
: 708035 708036 (view as bug list) Environment:
Last Closed: 2011-05-26 15:33:25 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On:    
Bug Blocks: 708035, 708036    

Description Carlos Infantes 2011-02-14 13:45:56 UTC
Description of problem:
When I add more than 50 VIPS (aprox number), in the Virtual Servers tab in piranha-gui if I select any VIP, and I click "Edit", the response is "TOO MANY ARGUMENTS IN URL" and looking the URL that is trying to open its made with a combination of ALL the VIPs.

Version-Release number of selected component (if applicable):

Server version: Apache/2.2.3
Server built:   Apr  4 2010 17:18:37


How reproducible:
Add more than 50 VIPs in a machine running piranha, and the edit option for VIPs stops work.

Steps to Reproduce:
1. In a host running piranha add more than 50 VIPs
2. Try to edit a VIP
3. See the error in the screen
  
Actual results:
Too Many arguments in the URL

Expected results:
The edit options for the selected VIP

Additional info:

Changing some lines in the virtual_main.php file works again:


[root@lb1 secure]# diff virtual_main.php virtual_main.php.orig
5,6c5,6
< 	if (isset($_POST['selected_host'])) {
<         	$selected_host=$_POST['selected_host'];
---
> 	if (isset($_GET['selected_host'])) {
>         	$selected_host=$_GET['selected_host'];
8,9c8,9
< 	if (isset($_POST['virtual_service'])) {
< 		$virtual_service=$_POST['virtual_service'];
---
> 	if (isset($_GET['virtual_service'])) {
> 		$virtual_service=$_GET['virtual_service'];
97,98c97,98
< 	if (isset($_POST['virtual_service'])) {
< 		$virtual_service = $_POST['virtual_service'];
---
> 	if (isset($_GET['virtual_service'])) {
> 		$virtual_service = $_GET['virtual_service'];
133c133
< <FORM METHOD="POST" ENCTYPE="application/x-www-form-urlencoded" ACTION="virtual_main.php">
---
> <FORM METHOD="GET" ENCTYPE="application/x-www-form-urlencoded" ACTION="virtual_main.php">
[root@lb1 secure]#

Comment 1 Marek Grac 2011-05-26 15:31:21 UTC
@Carlos:

Thanks for a patch, I will clone it to RHEL5 and RHEL6 where it can be fixed. RHEL4 is now in very late stage and only very important and security fixes can be included. Situation differs for newer versions where this kind of bugs should be surely fixed and yours patch provides a good solution.