42d3312b6f09d03349c25500c1661ba9d3b62e5b
[privoxy.git] / tests / cts / client-body-filter-https / data / test12
1 <testcase>
2 <info>
3 <keywords>
4 HTTPS
5 HTTP POST
6 client-body-filter
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Connection: close
14 Content-Type: text/html
15 X-Connection: swsclose
16
17 Received your first request.
18 </data>
19 <data1>
20 HTTP/1.1 200 OK
21 Connection: close
22 Content-Type: text/html
23 X-Connection: swsclose
24
25 Received your second request.
26 </data1>
27 </reply>
28
29 <proxy-reply>
30 <data>
31 HTTP/1.1 200 Connection established\r
32 \r
33 HTTP/1.1 200 OK\r
34 Connection: close\r
35 Content-Type: text/html\r
36 X-Connection: swsclose\r
37 \r
38 Received your first request.
39 </data>
40 <data1>
41 HTTP/1.1 200 OK\r
42 Connection: close\r
43 Content-Type: text/html\r
44 X-Connection: swsclose\r
45 \r
46 Received your second request.
47 </data1>
48 </proxy-reply>
49
50 <client>
51 <server>
52 https
53 </server>
54 <name>
55 Attempt to apply client-body-filter{blafasel-to-bumfidel} to client request that is too large to buffer.
56 </name>
57 <features>
58 proxy
59 </features>
60 # Sending the first request to appease the test framework.
61 # We mainly care about the second request which is too large for Privoxy to buffer it.
62 <command>
63 --insecure https://%HOSTIP:%HTTPSPORT/first-request/%TESTNUMBER --next -d "blafasel%repeat[20000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/second-request/%TESTNUMBER
64 </command>
65 </client>
66
67 <verify>
68 <protocol nonewline="yes">
69 GET /first-request/%TESTNUMBER HTTP/1.1\r
70 Host: %HOSTIP:%HTTPSPORT\r
71 User-Agent: curl/%VERSION\r
72 Accept: */*\r
73 \r
74 POST /second-request/%TESTNUMBER HTTP/1.1\r
75 Host: %HOSTIP:%HTTPSPORT\r
76 User-Agent: curl/%VERSION\r
77 Accept: */*\r
78 Content-Length: 140008\r
79 Content-Type: application/x-www-form-urlencoded\r
80 \r
81 blafasel%repeat[20000 x padding]%
82 </protocol>
83 </verify>
84 </testcase>