lh | 9ed821d | 2023-04-07 01:36:19 -0700 | [diff] [blame] | 1 | <testcase> |
| 2 | <info> |
| 3 | <keywords> |
| 4 | HTTP |
| 5 | HTTP GET |
| 6 | --fail |
| 7 | </keywords> |
| 8 | </info> |
| 9 | |
| 10 | # Server-side |
| 11 | <reply> |
| 12 | <data nocheck="yes"> |
| 13 | HTTP/1.0 401 BAD BOY |
| 14 | Server: swsclose |
| 15 | Content-Type: text/html |
| 16 | |
| 17 | This contains a response code >= 400, so curl shouldn't display this. Even |
| 18 | though it's a response code that triggers authentication, we're not using |
| 19 | authentication so we should still fail. |
| 20 | </data> |
| 21 | </reply> |
| 22 | |
| 23 | # Client-side |
| 24 | <client> |
| 25 | <server> |
| 26 | http |
| 27 | </server> |
| 28 | <name> |
| 29 | HTTP GET with an error code that might trick authentication and --fail |
| 30 | </name> |
| 31 | <command> |
| 32 | http://%HOSTIP:%HTTPPORT/152 --fail |
| 33 | </command> |
| 34 | </client> |
| 35 | |
| 36 | # Verify data after the test has been "shot" |
| 37 | <verify> |
| 38 | <strip> |
| 39 | ^User-Agent: curl/.* |
| 40 | </strip> |
| 41 | <protocol> |
| 42 | GET /152 HTTP/1.1
|
| 43 | User-Agent: curl/7.8.1-pre3 (sparc-sun-solaris2.7) libcurl 7.8.1-pre3 (OpenSSL 0.9.6a) (krb4 enabled)
|
| 44 | Host: %HOSTIP:%HTTPPORT
|
| 45 | Accept: */*
|
| 46 |
|
| 47 | </protocol> |
| 48 | <errorcode> |
| 49 | 22 |
| 50 | </errorcode> |
| 51 | </verify> |
| 52 | </testcase> |