57ba21c188eab9510ef65ca53fe557d0339e353b
[privoxy.git] / tests / cts / client-body-filter-https / data / test17
1 <testcase>
2 <info>
3 <keywords>
4 HTTPS
5 HTTP POST
6 client-body-filter
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Content-Length: 29\r
14 Content-Type: text/html
15
16 Received your first request.
17 </data>
18 <data1>
19 HTTP/1.1 200 OK
20 Connection: close
21 Content-Type: text/html
22 X-Connection: swsclose
23
24 Received your second request.
25 </data1>
26 </reply>
27
28 <proxy-reply>
29 <data>
30 HTTP/1.1 200 Connection established\r
31 \r
32 HTTP/1.1 200 OK\r
33 Content-Length: 29\r
34 Content-Type: text/html\r
35 \r
36 Received your first request.
37 </data>
38 <data1>
39 HTTP/1.1 200 OK\r
40 Connection: close\r
41 Content-Type: text/html\r
42 X-Connection: swsclose\r
43 \r
44 Received your second request.
45 </data1>
46 </proxy-reply>
47
48 <client>
49 <server>
50 https
51 </server>
52 <name>
53 Attempt to apply client-body-filter{blafasel-to-bumfidel} to client request on reused connection that is too large to buffer. (based on test12)
54 </name>
55 <features>
56 proxy
57 </features>
58 # We mainly care about the second request which is too large for Privoxy to buffer it.
59 <command>
60 --insecure https://%HOSTIP:%HTTPSPORT/first-request/%TESTNUMBER --next -d "blafasel%repeat[20000 x padding]%" --insecure https://%HOSTIP:%HTTPSPORT/second-request/%TESTNUMBER
61 </command>
62 </client>
63
64 <verify>
65 <protocol nonewline="yes">
66 GET /first-request/%TESTNUMBER HTTP/1.1\r
67 Host: %HOSTIP:%HTTPSPORT\r
68 User-Agent: curl/%VERSION\r
69 Accept: */*\r
70 \r
71 POST /second-request/%TESTNUMBER HTTP/1.1\r
72 Host: %HOSTIP:%HTTPSPORT\r
73 User-Agent: curl/%VERSION\r
74 Accept: */*\r
75 Content-Length: 140008\r
76 Content-Type: application/x-www-form-urlencoded\r
77 \r
78 blafasel%repeat[20000 x padding]%
79 </protocol>
80 </verify>
81 </testcase>