REGTEESTS: filters: Fix CONNECT request in random-forwarding script

An invalid CONNECT request was used and make the script failed because of a
recent fix.

(cherry picked from commit 887a2b5bc4a0d10be771a7ef65c38cc03f7e9abe)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
(cherry picked from commit 9f0a134e0fe568080c0e2a8f2f84afd2384fed18)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
(cherry picked from commit bac0e32a182f508e4fcdebbb1eb991b2f93796f3)
Signed-off-by: Christopher Faulet <cfaulet@haproxy.com>
diff --git a/reg-tests/filters/random-forwarding.vtc b/reg-tests/filters/random-forwarding.vtc
index 6ea7092..6e3df88 100644
--- a/reg-tests/filters/random-forwarding.vtc
+++ b/reg-tests/filters/random-forwarding.vtc
@@ -18,7 +18,7 @@
           -bodylen 1048576
 
         rxreq
-        expect req.url == "/"
+        expect req.url == "127.0.0.1:80"
         txresp \
           -hdr "Content-Length: 0"
         recv 36000
@@ -93,7 +93,7 @@
 	gunzip
         expect resp.bodylen == 1048576
 
-        txreq -method "CONNECT" -url "/" -nolen
+        txreq -method "CONNECT" -url "127.0.0.1:80" -hdr "host: 127.0.0.1:80" -nolen
         rxresp
         expect resp.status == 200
         send_n 1000 "0123456789abcdefghijklmnopqrstuvwxyz"