test717 931 B

1234567891011121314151617181920212223242526272829303132333435363738394041424344454647484950515253545556575859606162636465
  1. <testcase>
  2. <info>
  3. <keywords>
  4. HTTP
  5. SOCKS5
  6. all_proxy
  7. </keywords>
  8. </info>
  9. #
  10. # Server-side
  11. <reply>
  12. <data>
  13. HTTP/1.1 200 OK
  14. Date: Thu, 09 Nov 2010 14:49:00 GMT
  15. Server: test-server/fake
  16. Last-Modified: Tue, 13 Jun 2000 12:10:00 GMT
  17. ETag: "21025-dc7-39462498"
  18. Accept-Ranges: bytes
  19. Content-Length: 6
  20. Connection: close
  21. Content-Type: text/html
  22. Funny-head: yesyes
  23. -foo-
  24. </data>
  25. # method 2 is SOCKS5 asking for user+password
  26. <servercmd>
  27. method 2
  28. user uz3r
  29. password p4ssworm
  30. backendport %HTTPPORT
  31. </servercmd>
  32. </reply>
  33. #
  34. # Client-side
  35. <client>
  36. <server>
  37. socks5
  38. http
  39. </server>
  40. <name>
  41. SOCKS5 proxy auth
  42. </name>
  43. # target a port that won't work without the SOCKS magic
  44. <command>
  45. http://%HOSTIP:1/717 -x socks5://uz3r:p4ssworm@%HOSTIP:%SOCKSPORT
  46. </command>
  47. </client>
  48. #
  49. # Verify data after the test has been "shot"
  50. <verify>
  51. <strip>
  52. ^User-Agent:.*
  53. </strip>
  54. <protocol>
  55. GET /717 HTTP/1.1
  56. Host: %HOSTIP:1
  57. Accept: */*
  58. </protocol>
  59. </verify>
  60. </testcase>