xf.li | 6c8fc1e | 2023-08-12 00:11:09 -0700 | [diff] [blame^] | 1 | <testcase> |
| 2 | <info> |
| 3 | <keywords> |
| 4 | HTTP |
| 5 | HTTP GET |
| 6 | </keywords> |
| 7 | </info> |
| 8 | |
| 9 | # Server-side |
| 10 | <reply> |
| 11 | <data> |
| 12 | HTTP/1.0 401 BAD BOY |
| 13 | Server: swsclose |
| 14 | Content-Type: text/html |
| 15 | |
| 16 | This contains a response code >= 400, so curl shouldn't display this. Even |
| 17 | though it's a response code that triggers authentication, we're not using |
| 18 | authentication so we should still fail. |
| 19 | </data> |
| 20 | </reply> |
| 21 | |
| 22 | # Client-side |
| 23 | <client> |
| 24 | <server> |
| 25 | http |
| 26 | </server> |
| 27 | <name> |
| 28 | HTTP GET with an error code that might trick authentication |
| 29 | </name> |
| 30 | <command> |
| 31 | http://%HOSTIP:%HTTPPORT/%TESTNUMBER |
| 32 | </command> |
| 33 | </client> |
| 34 | |
| 35 | # Verify data after the test has been "shot" |
| 36 | <verify> |
| 37 | <protocol> |
| 38 | GET /%TESTNUMBER HTTP/1.1
|
| 39 | Host: %HOSTIP:%HTTPPORT
|
| 40 | User-Agent: curl/%VERSION
|
| 41 | Accept: */*
|
| 42 |
|
| 43 | </protocol> |
| 44 | </verify> |
| 45 | </testcase> |