Add test scenario client-body-tagger
[privoxy.git] / tests / cts / client-body-tagger / data / test7
1 <testcase>
2 <info>
3 <keywords>
4 HTTP
5 HTTP POST
6 client-body-tagger
7 </keywords>
8 </info>
9
10 <reply>
11 <data>
12 HTTP/1.1 200 OK
13 Connection: close
14 Content-Type: text/html
15 X-Connection: swsclose
16
17 Received your input.
18 </data>
19 </reply>
20
21 <client>
22 <server>
23 http
24 </server>
25 <name>
26 Two requests to the same URL. The second one is a POST request with an offending word but it's too large to buffer and tag so it gets to pass. (XXX: Privoxy could execute the tagger based on the data that fits into the buffer)
27 </name>
28 <features>
29 proxy
30 </features>
31 <command>
32 -s --write-out '%{stderr}%{response_code}\n' http://%HOSTIP:%HTTPPORT/%TESTNUMBER --next -d "blafasel%repeat[20000 x padding]%" -s --write-out '%{stderr}%{response_code}\n' http://%HOSTIP:%HTTPPORT/%TESTNUMBER
33 </command>
34 </client>
35
36 <verify>
37 <protocol nonewline="yes">
38 GET /%TESTNUMBER HTTP/1.1\r
39 Host: %HOSTIP:%HTTPPORT\r
40 User-Agent: curl/%VERSION\r
41 Accept: */*\r
42 Connection: close\r
43 \r
44 POST /%TESTNUMBER HTTP/1.1\r
45 Host: %HOSTIP:%HTTPPORT\r
46 User-Agent: curl/%VERSION\r
47 Accept: */*\r
48 Content-Length: 140008\r
49 Content-Type: application/x-www-form-urlencoded\r
50 Connection: close\r
51 \r
52 blafasel%repeat[20000 x padding]%
53 </protocol>
54 <stderr>
55 200
56 200
57 </stderr>
58
59 </verify>
60 </testcase>