test3201 1014 B

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263
  1. <testcase>
  2. <info>
  3. <keywords>
  4. HTTP
  5. HTTP GET
  6. proxy
  7. haproxy
  8. </keywords>
  9. </info>
  10. #
  11. # Server-side
  12. <reply name="%TESTNUMBER">
  13. <data nocheck="yes">
  14. HTTP/1.1 200 OK
  15. Date: Tue, 09 Nov 2010 14:49:00 GMT
  16. Server: test-server/fake
  17. Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
  18. ETag: "21025-dc7-39462498"
  19. Accept-Ranges: bytes
  20. Content-Length: 6
  21. Connection: close
  22. Content-Type: text/html
  23. Funny-head: barkbark
  24. -foo-
  25. </data>
  26. </reply>
  27. #
  28. # Client-side
  29. <client>
  30. <server>
  31. http
  32. </server>
  33. <name>
  34. HTTP GET when PROXY Protocol enabled and spoofed client IP
  35. </name>
  36. <command>
  37. http://%HOSTIP:%HTTPPORT/%TESTNUMBER --haproxy-clientip "192.168.1.1" -H "Testno: %TESTNUMBER"
  38. </command>
  39. <features>
  40. proxy
  41. </features>
  42. </client>
  43. #
  44. # Verify data after the test has been "shot"
  45. <verify>
  46. <strippart>
  47. s/^PROXY TCP4 %CLIENTIP 192.168.1.1 (\d*) %HTTPPORT/proxy-line/
  48. </strippart>
  49. <protocol>
  50. proxy-line
  51. GET /%TESTNUMBER HTTP/1.1
  52. Host: %HOSTIP:%HTTPPORT
  53. User-Agent: curl/%VERSION
  54. Accept: */*
  55. Testno: %TESTNUMBER
  56. </protocol>
  57. </verify>
  58. </testcase>