2
0

test736 964 B

12345678910111213141516171819202122232425262728293031323334353637383940414243444546474849505152535455565758
  1. <testcase>
  2. <info>
  3. <keywords>
  4. IPFS
  5. </keywords>
  6. </info>
  7. #
  8. # Server-side
  9. <reply>
  10. <data nocheck="yes">
  11. HTTP/1.1 200 OK
  12. Date: Tue, 09 Nov 2010 14:49:00 GMT
  13. Server: test-server/fake
  14. Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
  15. ETag: "21025-dc7-39462498"
  16. Accept-Ranges: bytes
  17. Content-Length: 21
  18. Connection: close
  19. Content-Type: text/plain
  20. Funny-head: yesyes
  21. Hello curl from IPFS
  22. </data>
  23. </reply>
  24. #
  25. # Client-side
  26. <client>
  27. <server>
  28. http
  29. </server>
  30. <setenv>
  31. IPFS_PATH=%LOGDIR/.ipfs
  32. </setenv>
  33. <name>
  34. IPFS with IPFS_PATH set, no trailing slash
  35. </name>
  36. <command>
  37. ipfs://bafybeidecnvkrygux6uoukouzps5ofkeevoqland7kopseiod6pzqvjg7u
  38. </command>
  39. <file name="%LOGDIR/.ipfs/gateway" >
  40. http://%HOSTIP:%HTTPPORT
  41. </file>
  42. </client>
  43. #
  44. # Verify data after the test has been "shot"
  45. <verify>
  46. <protocol crlf="yes">
  47. GET /ipfs/bafybeidecnvkrygux6uoukouzps5ofkeevoqland7kopseiod6pzqvjg7u HTTP/1.1
  48. Host: %HOSTIP:%HTTPPORT
  49. User-Agent: curl/%VERSION
  50. Accept: */*
  51. </protocol>
  52. </verify>
  53. </testcase>