REGTEESTS: filters: Fix CONNECT request in random-forwarding script

An invalid CONNECT request was used and make the script failed because of a
recent fix.
This commit is contained in:
Christopher Faulet 2022-07-07 09:52:54 +02:00
parent 12f6dbb863
commit 887a2b5bc4

View File

@ -18,7 +18,7 @@ server s1 {
-bodylen 1048576 -bodylen 1048576
rxreq rxreq
expect req.url == "/" expect req.url == "127.0.0.1:80"
txresp \ txresp \
-hdr "Content-Length: 0" -hdr "Content-Length: 0"
recv 36000 recv 36000
@ -92,7 +92,7 @@ client c1 -connect ${h1_fe1_sock} {
gunzip gunzip
expect resp.bodylen == 1048576 expect resp.bodylen == 1048576
txreq -method "CONNECT" -url "/" -nolen txreq -method "CONNECT" -url "127.0.0.1:80" -nolen
rxresp rxresp
expect resp.status == 200 expect resp.status == 200
send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz" send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz"