REGTEESTS: filters: Fix CONNECT request in random-forwarding script
An invalid CONNECT request was used and make the script failed because of a
recent fix.
(cherry picked from commit 887a2b5bc4a0d10be771a7ef65c38cc03f7e9abe)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
(cherry picked from commit 9f0a134e0fe568080c0e2a8f2f84afd2384fed18)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
(cherry picked from commit bac0e32a182f508e4fcdebbb1eb991b2f93796f3)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
diff --git a/reg-tests/filters/random-forwarding.vtc b/reg-tests/filters/random-forwarding.vtc
index 6ea7092..6e3df88 100644
--- a/reg-tests/filters/random-forwarding.vtc
+++ b/reg-tests/filters/random-forwarding.vtc
@@ -18,7 +18,7 @@
-bodylen 1048576
rxreq
- expect req.url == "/"
+ expect req.url == "127.0.0.1:80"
txresp \
-hdr "Content-Length: 0"
recv 36000
@@ -93,7 +93,7 @@
gunzip
expect resp.bodylen == 1048576
- txreq -method "CONNECT" -url "/" -nolen
+ txreq -method "CONNECT" -url "127.0.0.1:80" -hdr "host: 127.0.0.1:80" -nolen
rxresp
expect resp.status == 200
send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz"