From: Christopher Faulet Date: Thu, 7 Jul 2022 07:52:54 +0000 (+0200) Subject: REGTEESTS: filters: Fix CONNECT request in random-forwarding script X-Git-Tag: v2.7-dev2~84 X-Git-Url: http://git.ipfire.org/?a=commitdiff_plain;h=887a2b5bc4a0d10be771a7ef65c38cc03f7e9abe;p=thirdparty%2Fhaproxy.git REGTEESTS: filters: Fix CONNECT request in random-forwarding script An invalid CONNECT request was used and make the script failed because of a recent fix. --- diff --git a/reg-tests/filters/random-forwarding.vtc b/reg-tests/filters/random-forwarding.vtc index 3d01bccb6f..87e29a6c2a 100644 --- a/reg-tests/filters/random-forwarding.vtc +++ b/reg-tests/filters/random-forwarding.vtc @@ -18,7 +18,7 @@ server s1 { -bodylen 1048576 rxreq - expect req.url == "/" + expect req.url == "127.0.0.1:80" txresp \ -hdr "Content-Length: 0" recv 36000 @@ -92,7 +92,7 @@ client c1 -connect ${h1_fe1_sock} { gunzip expect resp.bodylen == 1048576 - txreq -method "CONNECT" -url "/" -nolen + txreq -method "CONNECT" -url "127.0.0.1:80" -nolen rxresp expect resp.status == 200 send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz"