]> git.ipfire.org Git - thirdparty/curl.git/commitdiff
test 176, use --ntlm and POST when the server doesn't require any auth
authorDaniel Stenberg <daniel@haxx.se>
Tue, 15 Jun 2004 09:20:04 +0000 (09:20 +0000)
committerDaniel Stenberg <daniel@haxx.se>
Tue, 15 Jun 2004 09:20:04 +0000 (09:20 +0000)
tests/data/Makefile.am
tests/data/test176 [new file with mode: 0644]

index deaca9e814df8a655087d9f38f67ce8023cad06e..b2479aabf6b28be83f50903ebf1f96d4a13456da 100644 (file)
@@ -24,7 +24,7 @@ EXTRA_DIST = test1 test108 test117 test127 test20 test27 test34 test46        \
  test150 test151 test152 test153 test154 test155 test156 test157       \
  test158 test159 test511 test160 test161 test162 test163 test164       \
  test512 test165 test166 test167 test168 test169 test170 test171       \
- test172 test204 test205 test173 test174 test175
+ test172 test204 test205 test173 test174 test175 test176
 
 # The following tests have been removed from the dist since they no longer
 # work. We need to fix the test suite's FTPS server first, then bring them
diff --git a/tests/data/test176 b/tests/data/test176
new file mode 100644 (file)
index 0000000..a270110
--- /dev/null
@@ -0,0 +1,76 @@
+# Server-side
+<reply>
+# the first request has NTLM type-1 included, and then the 1001 is returned
+<data1001>
+HTTP/1.1 200 beng swsclose swsbounce\r
+Server: Microsoft-IIS/6.0\r
+Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth\r
+Content-Type: text/html; charset=iso-8859-1\r
+\r
+</data1001>
+
+# the second request should be auth-less and then this is returned.
+<data>
+HTTP/1.1 200 moo swsclose\r
+Server: Microsoft-IIS/6.0\r
+Content-Type: text/html; charset=iso-8859-1\r
+\r
+content for you
+</data>
+
+<datacheck>
+HTTP/1.1 200 beng swsclose swsbounce\r
+Server: Microsoft-IIS/6.0\r
+Authentication-Info: Passport1.4 tname=MSPAuth,tname=MSPProf,tname=MSPConsent,tname=MSPSecAuth\r
+Content-Type: text/html; charset=iso-8859-1\r
+\r
+HTTP/1.1 200 moo swsclose\r
+Server: Microsoft-IIS/6.0\r
+Content-Type: text/html; charset=iso-8859-1\r
+\r
+content for you
+</datacheck>
+
+</reply>
+
+# Client-side
+<client>
+# require SSL since we need that for NTLM
+<features>
+SSL
+</features>
+<server>
+http
+</server>
+ <name>
+HTTP POST --ntlm to server not requiring any auth at all
+ </name>
+ <command>
+http://%HOSTIP:%HOSTPORT/176 -u auser:apasswd --ntlm -d "junkelijunk"
+</command>
+</test>
+
+# Verify data after the test has been "shot"
+<verify>
+<strip>
+^User-Agent:.*
+</strip>
+<protocol nonewline=yes>
+HEAD /176 HTTP/1.1\r
+Authorization: NTLM TlRMTVNTUAABAAAAAgIAAAAAAAAgAAAAAAAAACAAAAA=\r
+User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6\r
+Host: 127.0.0.1:8999\r
+Pragma: no-cache\r
+Accept: */*\r
+\r
+POST /176 HTTP/1.1\r
+User-Agent: curl/7.12.1-CVS (i686-pc-linux-gnu) libcurl/7.12.1-CVS OpenSSL/0.9.6b ipv6 zlib/1.1.4 GSS libidn/0.4.6\r
+Host: 127.0.0.1:8999\r
+Pragma: no-cache\r
+Accept: */*\r
+Content-Length: 11\r
+Content-Type: application/x-www-form-urlencoded\r
+\r
+junkelijunk
+</protocol>
+</verify>