123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116 |
- <testcase>
- <info>
- <keywords>
- HTTP
- HTTP POST
- HTTP NTLM auth
- </keywords>
- </info>
- # Server-side
- <reply>
- <data>
- HTTP/1.1 200 Thanks for this! swsclose
- Content-Length: 25
- This is the final page !
- </data>
- <data1001>
- HTTP/1.1 401 Now gimme that second request of crap
- Server: Microsoft-IIS/5.0
- Content-Type: text/html; charset=iso-8859-1
- Content-Length: 34
- WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
- This is not the real page either!
- </data1001>
- # This is supposed to be returned when the server gets the second
- # Authorization: NTLM line passed-in from the client
- <data1002>
- HTTP/1.1 302 Thanks for this, but we want to redir you!
- Server: Microsoft-IIS/5.0
- Content-Type: text/html; charset=iso-8859-1
- Location: /1100
- Content-Length: 34
- This is not the real page either!
- </data1002>
- <datacheck>
- HTTP/1.1 401 Now gimme that second request of crap
- Server: Microsoft-IIS/5.0
- Content-Type: text/html; charset=iso-8859-1
- Content-Length: 34
- WWW-Authenticate: NTLM TlRMTVNTUAACAAAAAgACADAAAAAGgoEAc51AYVDgyNcAAAAAAAAAAG4AbgAyAAAAQ0MCAAQAQwBDAAEAEgBFAEwASQBTAEEAQgBFAFQASAAEABgAYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAwAsAGUAbABpAHMAYQBiAGUAdABoAC4AYwBjAC4AaQBjAGUAZABlAHYALgBuAHUAAAAAAA==
- HTTP/1.1 302 Thanks for this, but we want to redir you!
- Server: Microsoft-IIS/5.0
- Content-Type: text/html; charset=iso-8859-1
- Location: /1100
- Content-Length: 34
- HTTP/1.1 200 Thanks for this! swsclose
- Content-Length: 25
- This is the final page !
- </datacheck>
- </reply>
- # Client-side
- <client>
- <features>
- NTLM
- </features>
- <server>
- http
- </server>
- <name>
- HTTP POST with NTLM authorization and following a 302 redirect
- </name>
- <setenv>
- # we force our own host name, in order to make the test machine independent
- CURL_GETHOSTNAME=curlhost
- # we try to use the LD_PRELOAD hack, if not a debug build
- LD_PRELOAD=%PWD/libtest/.libs/libhostname.so
- </setenv>
- <command>
- http://%HOSTIP:%HTTPPORT/1100 -u testuser:testpass --ntlm -L -d "stuff to send away"
- </command>
- <precheck>
- chkhostname curlhost
- </precheck>
- </client>
- # Verify data after the test has been "shot"
- <verify>
- <strip>
- ^User-Agent:.*
- </strip>
- <protocol>
- POST /1100 HTTP/1.1
- Authorization: NTLM TlRMTVNTUAABAAAABoIIAAAAAAAAAAAAAAAAAAAAAAA=
- User-Agent: curl/7.10.6-pre1 (i686-pc-linux-gnu) libcurl/7.10.6-pre1 OpenSSL/0.9.7a ipv6 zlib/1.1.3
- Host: %HOSTIP:%HTTPPORT
- Accept: */*
- Content-Length: 0
- Content-Type: application/x-www-form-urlencoded
- POST /1100 HTTP/1.1
- Authorization: NTLM TlRMTVNTUAADAAAAGAAYAEAAAAAYABgAWAAAAAAAAABwAAAACAAIAHAAAAAIAAgAeAAAAAAAAAAAAAAABoKBAFpkQwKRCZFMhjj0tw47wEjKHRHlvzfxQamFcheMuv8v+xeqphEO5V41xRd7R9deOXRlc3R1c2VyY3VybGhvc3Q=
- User-Agent: curl/7.10.6-pre1 (i686-pc-linux-gnu) libcurl/7.10.6-pre1 OpenSSL/0.9.7a ipv6 zlib/1.1.3
- Host: %HOSTIP:%HTTPPORT
- Accept: */*
- Content-Length: 18
- Content-Type: application/x-www-form-urlencoded
- stuff to send awayGET /1100 HTTP/1.1
- User-Agent: curl/7.19.5-CVS (i686-pc-linux-gnu) libcurl/7.19.5-CVS GnuTLS/2.6.6 zlib/1.2.3.3 c-ares/1.6.1-CVS libidn/1.14 libssh2/1.1
- Host: %HOSTIP:%HTTPPORT
- Accept: */*
- </protocol>
- </verify>
- </testcase>
|