]> git.ipfire.org Git - thirdparty/haproxy.git/commitdiff
REGTEESTS: filters: Fix CONNECT request in random-forwarding script
authorChristopher Faulet <cfaulet@haproxy.com>
Thu, 7 Jul 2022 07:52:54 +0000 (09:52 +0200)
committerChristopher Faulet <cfaulet@haproxy.com>
Thu, 7 Jul 2022 07:52:56 +0000 (09:52 +0200)
An invalid CONNECT request was used and make the script failed because of a
recent fix.

reg-tests/filters/random-forwarding.vtc

index 3d01bccb6fd35b0cddde453f8b45a3ab35f013d7..87e29a6c2aa44c5ccc8c9d123e6b439dc0612013 100644 (file)
@@ -18,7 +18,7 @@ server s1 {
           -bodylen 1048576
 
         rxreq
-        expect req.url == "/"
+        expect req.url == "127.0.0.1:80"
         txresp \
           -hdr "Content-Length: 0"
         recv 36000
@@ -92,7 +92,7 @@ client c1 -connect ${h1_fe1_sock} {
        gunzip
         expect resp.bodylen == 1048576
 
-        txreq -method "CONNECT" -url "/" -nolen
+        txreq -method "CONNECT" -url "127.0.0.1:80" -nolen
         rxresp
         expect resp.status == 200
         send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz"