From 887a2b5bc4a0d10be771a7ef65c38cc03f7e9abe Mon Sep 17 00:00:00 2001 From: Christopher Faulet Date: Thu, 7 Jul 2022 09:52:54 +0200 Subject: [PATCH] REGTEESTS: filters: Fix CONNECT request in random-forwarding script An invalid CONNECT request was used and make the script failed because of a recent fix. --- reg-tests/filters/random-forwarding.vtc | 4 ++-- 1 file changed, 2 insertions(+), 2 deletions(-) diff --git a/reg-tests/filters/random-forwarding.vtc b/reg-tests/filters/random-forwarding.vtc index 3d01bccb6f..87e29a6c2a 100644 --- a/reg-tests/filters/random-forwarding.vtc +++ b/reg-tests/filters/random-forwarding.vtc @@ -18,7 +18,7 @@ server s1 { -bodylen 1048576 rxreq - expect req.url == "/" + expect req.url == "127.0.0.1:80" txresp \ -hdr "Content-Length: 0" recv 36000 @@ -92,7 +92,7 @@ client c1 -connect ${h1_fe1_sock} { gunzip expect resp.bodylen == 1048576 - txreq -method "CONNECT" -url "/" -nolen + txreq -method "CONNECT" -url "127.0.0.1:80" -nolen rxresp expect resp.status == 200 send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz" -- 2.47.3