diff options
Diffstat (limited to 'plugins/tests/check_curl.t')
| -rwxr-xr-x | plugins/tests/check_curl.t | 283 |
1 files changed, 236 insertions, 47 deletions
diff --git a/plugins/tests/check_curl.t b/plugins/tests/check_curl.t index 3c914830..248eb4c5 100755 --- a/plugins/tests/check_curl.t +++ b/plugins/tests/check_curl.t | |||
| @@ -15,13 +15,19 @@ | |||
| 15 | # Email Address []:devel@monitoring-plugins.org | 15 | # Email Address []:devel@monitoring-plugins.org |
| 16 | 16 | ||
| 17 | use strict; | 17 | use strict; |
| 18 | use warnings; | ||
| 18 | use Test::More; | 19 | use Test::More; |
| 19 | use NPTest; | 20 | use NPTest; |
| 20 | use FindBin qw($Bin); | 21 | use FindBin qw($Bin); |
| 21 | 22 | ||
| 23 | use URI; | ||
| 24 | use URI::QueryParam; | ||
| 25 | use HTTP::Daemon; | ||
| 26 | use HTTP::Daemon::SSL; | ||
| 27 | |||
| 22 | $ENV{'LC_TIME'} = "C"; | 28 | $ENV{'LC_TIME'} = "C"; |
| 23 | 29 | ||
| 24 | my $common_tests = 73; | 30 | my $common_tests = 95; |
| 25 | my $ssl_only_tests = 8; | 31 | my $ssl_only_tests = 8; |
| 26 | # Check that all dependent modules are available | 32 | # Check that all dependent modules are available |
| 27 | eval "use HTTP::Daemon 6.01;"; | 33 | eval "use HTTP::Daemon 6.01;"; |
| @@ -178,8 +184,130 @@ sub run_server { | |||
| 178 | $c->send_basic_header; | 184 | $c->send_basic_header; |
| 179 | $c->send_crlf; | 185 | $c->send_crlf; |
| 180 | $c->send_response(HTTP::Response->new( 200, 'OK', undef, 'redirected' )); | 186 | $c->send_response(HTTP::Response->new( 200, 'OK', undef, 'redirected' )); |
| 187 | } elsif ($r->url->path eq "/redirect_rel") { | ||
| 188 | $c->send_basic_header(302); | ||
| 189 | $c->send_header("Location", "/redirect2" ); | ||
| 190 | $c->send_crlf; | ||
| 191 | $c->send_response('moved to /redirect2'); | ||
| 181 | } elsif ($r->url->path eq "/redir_timeout") { | 192 | } elsif ($r->url->path eq "/redir_timeout") { |
| 182 | $c->send_redirect( "/timeout" ); | 193 | $c->send_redirect( "/timeout" ); |
| 194 | } elsif ($r->url->path =~ m{^/redirect_with_increment}) { | ||
| 195 | # <scheme>://<username>:<password>@<host>:<port>/<path>;<parameters>?<query>#<fragment> | ||
| 196 | # Find every parameter, query , and fragment keys and increment them | ||
| 197 | |||
| 198 | my $content = ""; | ||
| 199 | |||
| 200 | # Use URI to help with query/fragment; parse path params manually. | ||
| 201 | my $original_url = $r->url->as_string; | ||
| 202 | $content .= " original_url: ${original_url}\n"; | ||
| 203 | my $uri = URI->new($original_url); | ||
| 204 | $content .= " uri: ${uri}\n"; | ||
| 205 | |||
| 206 | my $path = $uri->path // ''; | ||
| 207 | my $query = $uri->query // ''; | ||
| 208 | my $fragment = $uri->fragment // ''; | ||
| 209 | |||
| 210 | $content .= " path: ${path}\n"; | ||
| 211 | $content .= " query: ${query}\n"; | ||
| 212 | $content .= " fragment: ${fragment}\n"; | ||
| 213 | |||
| 214 | # split the URI part and parameters. URI package cannot do this | ||
| 215 | # group 1 is captured: anything without a semicolon: ([^;]*) | ||
| 216 | # group 2 is uncaptured: (?:;(.*))? | ||
| 217 | # (?: ... )? prevents capturing the parameter section | ||
| 218 | # inside group 2, ';' matches the first ever semicolon | ||
| 219 | # group3 is captured: any character string : (.*) | ||
| 220 | # \? matches an actual ? mark, which starts the query parameters | ||
| 221 | my ($before_params, $params) = $uri =~ m{^([^;]*)(?:;(.*))?\?}; | ||
| 222 | $before_params //= ''; | ||
| 223 | $params //= ''; | ||
| 224 | $content .= " before_params: ${before_params}\n"; | ||
| 225 | $content .= " params: ${params}\n"; | ||
| 226 | my @parameter_pairs; | ||
| 227 | if (defined $params && length $params) { | ||
| 228 | for my $p (split /;/, $params) { | ||
| 229 | my ($key,$value) = split /=/, $p, 2; | ||
| 230 | $value //= ''; | ||
| 231 | push @parameter_pairs, [ $key, $value ]; | ||
| 232 | $content .= " parameter: ${key} -> ${value}\n"; | ||
| 233 | } | ||
| 234 | } | ||
| 235 | |||
| 236 | # query parameters are offered directly from the library | ||
| 237 | my @query_form = $uri->query_form; | ||
| 238 | my @query_parameter_pairs; | ||
| 239 | while (@query_form) { | ||
| 240 | my $key = shift @query_form; | ||
| 241 | my $value = shift @query_form; | ||
| 242 | $value //= ''; # there can be valueless keys | ||
| 243 | push @query_parameter_pairs, [ $key, $value ]; | ||
| 244 | $content .= " query: ${key} -> ${value}\n"; | ||
| 245 | } | ||
| 246 | |||
| 247 | # helper to increment value | ||
| 248 | my $increment = sub { | ||
| 249 | my ($v) = @_; | ||
| 250 | return $v if !defined $v || $v eq ''; | ||
| 251 | # numeric integer | ||
| 252 | if ($v =~ /^-?\d+$/) { | ||
| 253 | return $v + 1; | ||
| 254 | } | ||
| 255 | # otherwise -> increment as if its an ascii character | ||
| 256 | # sed replacement syntax, but the $& holds the matched character | ||
| 257 | if (length($v)) { | ||
| 258 | (my $new_v = $v) =~ s/./chr(ord($&) + 1)/ge; | ||
| 259 | return $new_v; | ||
| 260 | } | ||
| 261 | }; | ||
| 262 | |||
| 263 | # increment values in pairs | ||
| 264 | for my $pair (@parameter_pairs) { | ||
| 265 | $pair->[1] = $increment->($pair->[1]); | ||
| 266 | $content .= " parameter new: " . $pair->[0] . " -> " . $pair->[1] . "\n"; | ||
| 267 | } | ||
| 268 | for my $pair (@query_parameter_pairs) { | ||
| 269 | $pair->[1] = $increment->($pair->[1]); | ||
| 270 | $content .= " query parameter new: " . $pair->[0] . " -> " . $pair->[1] . "\n"; | ||
| 271 | } | ||
| 272 | |||
| 273 | # rebuild strings | ||
| 274 | my $new_parameter_str = join(';', map { $_->[0] . '=' . $_->[1] } @parameter_pairs); | ||
| 275 | $content .= " new_parameter_str: ${new_parameter_str}\n"; | ||
| 276 | |||
| 277 | # library can rebuild from an array | ||
| 278 | my @new_query_form; | ||
| 279 | for my $p (@query_parameter_pairs) { push @new_query_form, $p->[0], $p->[1] } | ||
| 280 | |||
| 281 | my $new_fragment_str = ''; | ||
| 282 | for my $pair (@parameter_pairs) { | ||
| 283 | my $key = $pair->[0]; | ||
| 284 | my $value = $pair->[1]; | ||
| 285 | if ($key eq "fragment") { | ||
| 286 | $new_fragment_str = $value | ||
| 287 | } | ||
| 288 | } | ||
| 289 | $content .= " new_fragment_str: ${new_fragment_str}\n"; | ||
| 290 | |||
| 291 | # construct new URI using the library | ||
| 292 | my $new_uri = URI->new(''); | ||
| 293 | $new_uri->path( $before_params . ($new_parameter_str ? ';' . $new_parameter_str : '') ); | ||
| 294 | $new_uri->query_form( \@new_query_form ) if @new_query_form; | ||
| 295 | $new_uri->fragment( $new_fragment_str ) if $new_fragment_str ne ''; | ||
| 296 | $content .= " new_uri: ${new_uri}\n"; | ||
| 297 | |||
| 298 | # Redirect until fail_count or redirect_count reaches 3 | ||
| 299 | if ($new_uri =~ /fail_count=3/){ | ||
| 300 | $c->send_error(HTTP::Status->RC_FORBIDDEN, "fail count reached 3, url path:" . $r->url->path ); | ||
| 301 | } elsif ($new_uri =~ /redirect_count=3/){ | ||
| 302 | $c->send_response(HTTP::Response->new( 200, 'OK', undef , $content )); | ||
| 303 | } elsif ($new_uri =~ /location_redirect_count=3/){ | ||
| 304 | $c->send_basic_header(302); | ||
| 305 | $c->send_header("Location", "$new_uri" ); | ||
| 306 | $c->send_crlf; | ||
| 307 | $c->send_response("$content \n moved to $new_uri"); | ||
| 308 | } else { | ||
| 309 | $c->send_redirect( $new_uri->as_string, 301, $content ); | ||
| 310 | } | ||
| 183 | } elsif ($r->url->path eq "/timeout") { | 311 | } elsif ($r->url->path eq "/timeout") { |
| 184 | # Keep $c from being destroyed, but prevent severe leaks | 312 | # Keep $c from being destroyed, but prevent severe leaks |
| 185 | unshift @persist, $c; | 313 | unshift @persist, $c; |
| @@ -209,7 +337,7 @@ sub run_server { | |||
| 209 | return($chunk); | 337 | return($chunk); |
| 210 | })); | 338 | })); |
| 211 | } else { | 339 | } else { |
| 212 | $c->send_error(HTTP::Status->RC_FORBIDDEN); | 340 | $c->send_error(HTTP::Status->RC_FORBIDDEN, "unknown url path:" . $r->url->path ); |
| 213 | } | 341 | } |
| 214 | $c->close; | 342 | $c->close; |
| 215 | } | 343 | } |
| @@ -240,21 +368,21 @@ SKIP: { | |||
| 240 | 368 | ||
| 241 | $result = NPTest->testCmd( "$command -p $port_https -S -C 14" ); | 369 | $result = NPTest->testCmd( "$command -p $port_https -S -C 14" ); |
| 242 | is( $result->return_code, 0, "$command -p $port_https -S -C 14" ); | 370 | is( $result->return_code, 0, "$command -p $port_https -S -C 14" ); |
| 243 | is( $result->output, "OK - Certificate 'Monitoring Plugins' will expire on $expiry.", "output ok" ); | 371 | like( $result->output, '/.*Certificate \'Monitoring Plugins\' will expire on ' . quotemeta($expiry) . '.*/', "output ok" ); |
| 244 | 372 | ||
| 245 | $result = NPTest->testCmd( "$command -p $port_https -S -C 14000" ); | 373 | $result = NPTest->testCmd( "$command -p $port_https -S -C 14000" ); |
| 246 | is( $result->return_code, 1, "$command -p $port_https -S -C 14000" ); | 374 | is( $result->return_code, 1, "$command -p $port_https -S -C 14000" ); |
| 247 | like( $result->output, '/WARNING - Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta($expiry) . '\)./', "output ok" ); | 375 | like( $result->output, '/.*Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta($expiry) . '\).*/', "output ok" ); |
| 248 | 376 | ||
| 249 | # Expired cert tests | 377 | # Expired cert tests |
| 250 | $result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" ); | 378 | $result = NPTest->testCmd( "$command -p $port_https -S -C 13960,14000" ); |
| 251 | is( $result->return_code, 2, "$command -p $port_https -S -C 13960,14000" ); | 379 | is( $result->return_code, 2, "$command -p $port_https -S -C 13960,14000" ); |
| 252 | like( $result->output, '/CRITICAL - Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta($expiry) . '\)./', "output ok" ); | 380 | like( $result->output, '/.*Certificate \'Monitoring Plugins\' expires in \d+ day\(s\) \(' . quotemeta($expiry) . '\).*/', "output ok" ); |
| 253 | 381 | ||
| 254 | $result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" ); | 382 | $result = NPTest->testCmd( "$command -p $port_https_expired -S -C 7" ); |
| 255 | is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" ); | 383 | is( $result->return_code, 2, "$command -p $port_https_expired -S -C 7" ); |
| 256 | is( $result->output, | 384 | like( $result->output, |
| 257 | 'CRITICAL - Certificate \'Monitoring Plugins\' expired on Wed Jan 2 12:00:00 2008 +0000.', | 385 | '/.*Certificate \'Monitoring Plugins\' expired on Wed Jan\s+2 12:00:00 2008 \+0000.*/', |
| 258 | "output ok" ); | 386 | "output ok" ); |
| 259 | 387 | ||
| 260 | } | 388 | } |
| @@ -269,19 +397,19 @@ SKIP: { | |||
| 269 | $cmd = "./$plugin -H $virtual_host -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host:$port_http\$"; | 397 | $cmd = "./$plugin -H $virtual_host -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host:$port_http\$"; |
| 270 | $result = NPTest->testCmd( $cmd ); | 398 | $result = NPTest->testCmd( $cmd ); |
| 271 | is( $result->return_code, 0, $cmd); | 399 | is( $result->return_code, 0, $cmd); |
| 272 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 400 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 273 | 401 | ||
| 274 | # http with virtual port (!= 80) | 402 | # http with virtual port (!= 80) |
| 275 | $cmd = "./$plugin -H $virtual_host:$virtual_port -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host:$virtual_port\$"; | 403 | $cmd = "./$plugin -H $virtual_host:$virtual_port -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host:$virtual_port\$"; |
| 276 | $result = NPTest->testCmd( $cmd ); | 404 | $result = NPTest->testCmd( $cmd ); |
| 277 | is( $result->return_code, 0, $cmd); | 405 | is( $result->return_code, 0, $cmd); |
| 278 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 406 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 279 | 407 | ||
| 280 | # http with virtual port (80) | 408 | # http with virtual port (80) |
| 281 | $cmd = "./$plugin -H $virtual_host:80 -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host\$"; | 409 | $cmd = "./$plugin -H $virtual_host:80 -I 127.0.0.1 -p $port_http -u /virtual_port -r ^$virtual_host\$"; |
| 282 | $result = NPTest->testCmd( $cmd ); | 410 | $result = NPTest->testCmd( $cmd ); |
| 283 | is( $result->return_code, 0, $cmd); | 411 | is( $result->return_code, 0, $cmd); |
| 284 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 412 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 285 | } | 413 | } |
| 286 | 414 | ||
| 287 | # and the same for SSL | 415 | # and the same for SSL |
| @@ -291,19 +419,19 @@ SKIP: { | |||
| 291 | $cmd = "./$plugin -H $virtual_host -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host:$port_https\$"; | 419 | $cmd = "./$plugin -H $virtual_host -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host:$port_https\$"; |
| 292 | $result = NPTest->testCmd( $cmd ); | 420 | $result = NPTest->testCmd( $cmd ); |
| 293 | is( $result->return_code, 0, $cmd); | 421 | is( $result->return_code, 0, $cmd); |
| 294 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 422 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 295 | 423 | ||
| 296 | # https with virtual port (!= 443) | 424 | # https with virtual port (!= 443) |
| 297 | $cmd = "./$plugin -H $virtual_host:$virtual_port -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host:$virtual_port\$"; | 425 | $cmd = "./$plugin -H $virtual_host:$virtual_port -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host:$virtual_port\$"; |
| 298 | $result = NPTest->testCmd( $cmd ); | 426 | $result = NPTest->testCmd( $cmd ); |
| 299 | is( $result->return_code, 0, $cmd); | 427 | is( $result->return_code, 0, $cmd); |
| 300 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 428 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 301 | 429 | ||
| 302 | # https with virtual port (443) | 430 | # https with virtual port (443) |
| 303 | $cmd = "./$plugin -H $virtual_host:443 -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host\$"; | 431 | $cmd = "./$plugin -H $virtual_host:443 -I 127.0.0.1 -p $port_https --ssl -u /virtual_port -r ^$virtual_host\$"; |
| 304 | $result = NPTest->testCmd( $cmd ); | 432 | $result = NPTest->testCmd( $cmd ); |
| 305 | is( $result->return_code, 0, $cmd); | 433 | is( $result->return_code, 0, $cmd); |
| 306 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 434 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 307 | } | 435 | } |
| 308 | 436 | ||
| 309 | 437 | ||
| @@ -316,164 +444,225 @@ sub run_common_tests { | |||
| 316 | 444 | ||
| 317 | $result = NPTest->testCmd( "$command -u /file/root" ); | 445 | $result = NPTest->testCmd( "$command -u /file/root" ); |
| 318 | is( $result->return_code, 0, "/file/root"); | 446 | is( $result->return_code, 0, "/file/root"); |
| 319 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" ); | 447 | like( $result->output, '/.*HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second.*/', "Output correct" ); |
| 320 | 448 | ||
| 321 | $result = NPTest->testCmd( "$command -u /file/root -s Root" ); | 449 | $result = NPTest->testCmd( "$command -u /file/root -s Root" ); |
| 322 | is( $result->return_code, 0, "/file/root search for string"); | 450 | is( $result->return_code, 0, "/file/root search for string"); |
| 323 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second/', "Output correct" ); | 451 | like( $result->output, '/.*HTTP/1.1 200 OK - 274 bytes in [\d\.]+ second.*/', "Output correct" ); |
| 324 | 452 | ||
| 325 | $result = NPTest->testCmd( "$command -u /file/root -s NonRoot" ); | 453 | $result = NPTest->testCmd( "$command -u /file/root -s NonRoot" ); |
| 326 | is( $result->return_code, 2, "Missing string check"); | 454 | is( $result->return_code, 2, "Missing string check"); |
| 327 | like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRoot' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location"); | 455 | like( $result->output, qr%string 'NonRoot' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location"); |
| 328 | 456 | ||
| 329 | $result = NPTest->testCmd( "$command -u /file/root -s NonRootWithOver30charsAndMoreFunThanAWetFish" ); | 457 | $result = NPTest->testCmd( "$command -u /file/root -s NonRootWithOver30charsAndMoreFunThanAWetFish" ); |
| 330 | is( $result->return_code, 2, "Missing string check"); | 458 | is( $result->return_code, 2, "Missing string check"); |
| 331 | like( $result->output, qr%HTTP CRITICAL: HTTP/1\.1 200 OK - string 'NonRootWithOver30charsAndM...' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location"); | 459 | like( $result->output, qr%string 'NonRootWithOver30charsAndM...' not found on 'https?://127\.0\.0\.1:\d+/file/root'%, "Shows search string and location"); |
| 332 | 460 | ||
| 333 | $result = NPTest->testCmd( "$command -u /header_check -d foo" ); | 461 | $result = NPTest->testCmd( "$command -u /header_check -d foo" ); |
| 334 | is( $result->return_code, 0, "header_check search for string"); | 462 | is( $result->return_code, 0, "header_check search for string"); |
| 335 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 96 bytes in [\d\.]+ second/', "Output correct" ); | 463 | like( $result->output, '/.*HTTP/1.1 200 OK - 96 bytes in [\d\.]+ second.*/', "Output correct" ); |
| 336 | 464 | ||
| 337 | $result = NPTest->testCmd( "$command -u /header_check -d bar" ); | 465 | $result = NPTest->testCmd( "$command -u /header_check -d bar" ); |
| 338 | is( $result->return_code, 2, "Missing header string check"); | 466 | is( $result->return_code, 2, "Missing header string check"); |
| 339 | like( $result->output, qr%^HTTP CRITICAL: HTTP/1\.1 200 OK - header 'bar' not found on 'https?://127\.0\.0\.1:\d+/header_check'%, "Shows search string and location"); | 467 | like( $result->output, qr%header 'bar' not found on 'https?://127\.0\.0\.1:\d+/header_check'%, "Shows search string and location"); |
| 340 | 468 | ||
| 341 | $result = NPTest->testCmd( "$command -u /header_broken_check" ); | 469 | $result = NPTest->testCmd( "$command -u /header_broken_check" ); |
| 342 | is( $result->return_code, 0, "header_check search for string"); | 470 | is( $result->return_code, 0, "header_check search for string"); |
| 343 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - 138 bytes in [\d\.]+ second/', "Output correct" ); | 471 | like( $result->output, '/.*HTTP/1.1 200 OK - 138 bytes in [\d\.]+ second.*/', "Output correct" ); |
| 344 | 472 | ||
| 345 | my $cmd; | 473 | my $cmd; |
| 346 | $cmd = "$command -u /slow"; | 474 | $cmd = "$command -u /slow"; |
| 347 | $result = NPTest->testCmd( $cmd ); | 475 | $result = NPTest->testCmd( $cmd ); |
| 348 | is( $result->return_code, 0, "$cmd"); | 476 | is( $result->return_code, 0, "$cmd"); |
| 349 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 477 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 350 | $result->output =~ /in ([\d\.]+) second/; | 478 | $result->output =~ /in ([\d\.]+) second/; |
| 351 | cmp_ok( $1, ">", 1, "Time is > 1 second" ); | 479 | cmp_ok( $1, ">", 1, "Time is > 1 second" ); |
| 352 | 480 | ||
| 353 | $cmd = "$command -u /statuscode/200"; | 481 | $cmd = "$command -u /statuscode/200"; |
| 354 | $result = NPTest->testCmd( $cmd ); | 482 | $result = NPTest->testCmd( $cmd ); |
| 355 | is( $result->return_code, 0, $cmd); | 483 | is( $result->return_code, 0, $cmd); |
| 356 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 484 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 357 | 485 | ||
| 358 | $cmd = "$command -u /statuscode/200 -e 200"; | 486 | $cmd = "$command -u /statuscode/200 -e 200"; |
| 359 | $result = NPTest->testCmd( $cmd ); | 487 | $result = NPTest->testCmd( $cmd ); |
| 360 | is( $result->return_code, 0, $cmd); | 488 | is( $result->return_code, 0, $cmd); |
| 361 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - Status line output matched "200" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 489 | like( $result->output, '/.*Status line output matched "200".*/', "Output correct: ".$result->output ); |
| 362 | 490 | ||
| 363 | $cmd = "$command -u /statuscode/201"; | 491 | $cmd = "$command -u /statuscode/201"; |
| 364 | $result = NPTest->testCmd( $cmd ); | 492 | $result = NPTest->testCmd( $cmd ); |
| 365 | is( $result->return_code, 0, $cmd); | 493 | is( $result->return_code, 0, $cmd); |
| 366 | like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output ); | 494 | like( $result->output, '/.*HTTP/1.1 201 Created - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 367 | 495 | ||
| 368 | $cmd = "$command -u /statuscode/201 -e 201"; | 496 | $cmd = "$command -u /statuscode/201 -e 201"; |
| 369 | $result = NPTest->testCmd( $cmd ); | 497 | $result = NPTest->testCmd( $cmd ); |
| 370 | is( $result->return_code, 0, $cmd); | 498 | is( $result->return_code, 0, $cmd); |
| 371 | like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - Status line output matched "201" - \d+ bytes in [\d\.]+ second /', "Output correct: ".$result->output ); | 499 | like( $result->output, '/.*Status line output matched "201".*/', "Output correct: ".$result->output ); |
| 372 | 500 | ||
| 373 | $cmd = "$command -u /statuscode/201 -e 200"; | 501 | $cmd = "$command -u /statuscode/201 -e 200"; |
| 374 | $result = NPTest->testCmd( $cmd ); | 502 | $result = NPTest->testCmd( $cmd ); |
| 375 | is( $result->return_code, 2, $cmd); | 503 | is( $result->return_code, 2, $cmd); |
| 376 | like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port \d+: HTTP/1.1 201 Created/', "Output correct: ".$result->output ); | 504 | like( $result->output, '/.*Invalid HTTP response received from host on port \d+: HTTP/1.1 201 Created.*/', "Output correct: ".$result->output ); |
| 377 | 505 | ||
| 378 | $cmd = "$command -u /statuscode/200 -e 200,201,202"; | 506 | $cmd = "$command -u /statuscode/200 -e 200,201,202"; |
| 379 | $result = NPTest->testCmd( $cmd ); | 507 | $result = NPTest->testCmd( $cmd ); |
| 380 | is( $result->return_code, 0, $cmd); | 508 | is( $result->return_code, 0, $cmd); |
| 381 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 509 | like( $result->output, '/.*Status line output matched "200,201,202".*/', "Output correct: ".$result->output ); |
| 382 | 510 | ||
| 383 | $cmd = "$command -u /statuscode/201 -e 200,201,202"; | 511 | $cmd = "$command -u /statuscode/201 -e 200,201,202"; |
| 384 | $result = NPTest->testCmd( $cmd ); | 512 | $result = NPTest->testCmd( $cmd ); |
| 385 | is( $result->return_code, 0, $cmd); | 513 | is( $result->return_code, 0, $cmd); |
| 386 | like( $result->output, '/^HTTP OK: HTTP/1.1 201 Created - Status line output matched "200,201,202" - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 514 | like( $result->output, '/.*Status line output matched "200,201,202".*/', "Output correct: ".$result->output ); |
| 387 | 515 | ||
| 388 | $cmd = "$command -u /statuscode/203 -e 200,201,202"; | 516 | $cmd = "$command -u /statuscode/203 -e 200,201,202"; |
| 389 | $result = NPTest->testCmd( $cmd ); | 517 | $result = NPTest->testCmd( $cmd ); |
| 390 | is( $result->return_code, 2, $cmd); | 518 | is( $result->return_code, 2, $cmd); |
| 391 | like( $result->output, '/^HTTP CRITICAL - Invalid HTTP response received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information/', "Output correct: ".$result->output ); | 519 | like( $result->output, '/.*Invalid HTTP response received from host on port (\d+): HTTP/1.1 203 Non-Authoritative Information.*/', "Output correct: ".$result->output ); |
| 392 | 520 | ||
| 393 | $cmd = "$command -j HEAD -u /method"; | 521 | $cmd = "$command -j HEAD -u /method"; |
| 394 | $result = NPTest->testCmd( $cmd ); | 522 | $result = NPTest->testCmd( $cmd ); |
| 395 | is( $result->return_code, 0, $cmd); | 523 | is( $result->return_code, 0, $cmd); |
| 396 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 HEAD - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 524 | like( $result->output, '/.*HTTP/1.1 200 HEAD - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 397 | 525 | ||
| 398 | $cmd = "$command -j POST -u /method"; | 526 | $cmd = "$command -j POST -u /method"; |
| 399 | $result = NPTest->testCmd( $cmd ); | 527 | $result = NPTest->testCmd( $cmd ); |
| 400 | is( $result->return_code, 0, $cmd); | 528 | is( $result->return_code, 0, $cmd); |
| 401 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 529 | like( $result->output, '/.*HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 402 | 530 | ||
| 403 | $cmd = "$command -j GET -u /method"; | 531 | $cmd = "$command -j GET -u /method"; |
| 404 | $result = NPTest->testCmd( $cmd ); | 532 | $result = NPTest->testCmd( $cmd ); |
| 405 | is( $result->return_code, 0, $cmd); | 533 | is( $result->return_code, 0, $cmd); |
| 406 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 534 | like( $result->output, '/.*HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 407 | 535 | ||
| 408 | $cmd = "$command -u /method"; | 536 | $cmd = "$command -u /method"; |
| 409 | $result = NPTest->testCmd( $cmd ); | 537 | $result = NPTest->testCmd( $cmd ); |
| 410 | is( $result->return_code, 0, $cmd); | 538 | is( $result->return_code, 0, $cmd); |
| 411 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 539 | like( $result->output, '/.*HTTP/1.1 200 GET - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 412 | 540 | ||
| 413 | $cmd = "$command -P foo -u /method"; | 541 | $cmd = "$command -P foo -u /method"; |
| 414 | $result = NPTest->testCmd( $cmd ); | 542 | $result = NPTest->testCmd( $cmd ); |
| 415 | is( $result->return_code, 0, $cmd); | 543 | is( $result->return_code, 0, $cmd); |
| 416 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 544 | like( $result->output, '/.*HTTP/1.1 200 POST - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 417 | 545 | ||
| 418 | $cmd = "$command -j DELETE -u /method"; | 546 | $cmd = "$command -j DELETE -u /method"; |
| 419 | $result = NPTest->testCmd( $cmd ); | 547 | $result = NPTest->testCmd( $cmd ); |
| 420 | is( $result->return_code, 1, $cmd); | 548 | is( $result->return_code, 1, $cmd); |
| 421 | like( $result->output, '/^HTTP WARNING: HTTP/1.1 405 Method Not Allowed/', "Output correct: ".$result->output ); | 549 | like( $result->output, '/.*HTTP/1.1 405 Method Not Allowed.*/', "Output correct: ".$result->output ); |
| 422 | 550 | ||
| 423 | $cmd = "$command -j foo -u /method"; | 551 | $cmd = "$command -j foo -u /method"; |
| 424 | $result = NPTest->testCmd( $cmd ); | 552 | $result = NPTest->testCmd( $cmd ); |
| 425 | is( $result->return_code, 2, $cmd); | 553 | is( $result->return_code, 2, $cmd); |
| 426 | like( $result->output, '/^HTTP CRITICAL: HTTP/1.1 501 Not Implemented/', "Output correct: ".$result->output ); | 554 | like( $result->output, '/.*HTTP/1.1 501 Not Implemented.*/', "Output correct: ".$result->output ); |
| 427 | 555 | ||
| 428 | $cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude"; | 556 | $cmd = "$command -P stufftoinclude -u /postdata -s POST:stufftoinclude"; |
| 429 | $result = NPTest->testCmd( $cmd ); | 557 | $result = NPTest->testCmd( $cmd ); |
| 430 | is( $result->return_code, 0, $cmd); | 558 | is( $result->return_code, 0, $cmd); |
| 431 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 559 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 432 | 560 | ||
| 433 | $cmd = "$command -j PUT -P stufftoinclude -u /postdata -s PUT:stufftoinclude"; | 561 | $cmd = "$command -j PUT -P stufftoinclude -u /postdata -s PUT:stufftoinclude"; |
| 434 | $result = NPTest->testCmd( $cmd ); | 562 | $result = NPTest->testCmd( $cmd ); |
| 435 | is( $result->return_code, 0, $cmd); | 563 | is( $result->return_code, 0, $cmd); |
| 436 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 564 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 437 | 565 | ||
| 438 | # To confirm that the free doesn't segfault | 566 | # To confirm that the free doesn't segfault |
| 439 | $cmd = "$command -P stufftoinclude -j PUT -u /postdata -s PUT:stufftoinclude"; | 567 | $cmd = "$command -P stufftoinclude -j PUT -u /postdata -s PUT:stufftoinclude"; |
| 440 | $result = NPTest->testCmd( $cmd ); | 568 | $result = NPTest->testCmd( $cmd ); |
| 441 | is( $result->return_code, 0, $cmd); | 569 | is( $result->return_code, 0, $cmd); |
| 442 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 570 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 443 | 571 | ||
| 444 | $cmd = "$command -u /redirect"; | 572 | $cmd = "$command -u /redirect"; |
| 445 | $result = NPTest->testCmd( $cmd ); | 573 | $result = NPTest->testCmd( $cmd ); |
| 446 | is( $result->return_code, 0, $cmd); | 574 | is( $result->return_code, 0, $cmd); |
| 447 | like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 575 | like( $result->output, '/.*HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 448 | 576 | ||
| 449 | $cmd = "$command -f follow -u /redirect"; | 577 | $cmd = "$command -f follow -u /redirect"; |
| 450 | $result = NPTest->testCmd( $cmd ); | 578 | $result = NPTest->testCmd( $cmd ); |
| 451 | is( $result->return_code, 0, $cmd); | 579 | is( $result->return_code, 0, $cmd); |
| 452 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 580 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 453 | 581 | ||
| 454 | $cmd = "$command -u /redirect -k 'follow: me'"; | 582 | $cmd = "$command -u /redirect -k 'follow: me'"; |
| 455 | $result = NPTest->testCmd( $cmd ); | 583 | $result = NPTest->testCmd( $cmd ); |
| 456 | is( $result->return_code, 0, $cmd); | 584 | is( $result->return_code, 0, $cmd); |
| 457 | like( $result->output, '/^HTTP OK: HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 585 | like( $result->output, '/.*HTTP/1.1 301 Moved Permanently - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 458 | 586 | ||
| 459 | $cmd = "$command -f follow -u /redirect -k 'follow: me'"; | 587 | $cmd = "$command -f follow -u /redirect -k 'follow: me'"; |
| 460 | $result = NPTest->testCmd( $cmd ); | 588 | $result = NPTest->testCmd( $cmd ); |
| 461 | is( $result->return_code, 0, $cmd); | 589 | is( $result->return_code, 0, $cmd); |
| 462 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 590 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 463 | 591 | ||
| 464 | $cmd = "$command -f sticky -u /redirect -k 'follow: me'"; | 592 | $cmd = "$command -f sticky -u /redirect -k 'follow: me'"; |
| 465 | $result = NPTest->testCmd( $cmd ); | 593 | $result = NPTest->testCmd( $cmd ); |
| 466 | is( $result->return_code, 0, $cmd); | 594 | is( $result->return_code, 0, $cmd); |
| 467 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 595 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 468 | 596 | ||
| 469 | $cmd = "$command -f stickyport -u /redirect -k 'follow: me'"; | 597 | $cmd = "$command -f stickyport -u /redirect -k 'follow: me'"; |
| 470 | $result = NPTest->testCmd( $cmd ); | 598 | $result = NPTest->testCmd( $cmd ); |
| 471 | is( $result->return_code, 0, $cmd); | 599 | is( $result->return_code, 0, $cmd); |
| 472 | like( $result->output, '/^HTTP OK: HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second/', "Output correct: ".$result->output ); | 600 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); |
| 601 | |||
| 602 | $cmd = "$command -f follow -u /redirect_rel -s redirected"; | ||
| 603 | $result = NPTest->testCmd( $cmd ); | ||
| 604 | is( $result->return_code, 0, $cmd); | ||
| 605 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct: ".$result->output ); | ||
| 606 | |||
| 607 | # Redirect with increment tests. These are for checking if the url parameters, query parameters and fragment are parsed. | ||
| 608 | # The server at this point has dynamic redirection. It tries to increment values that it sees in these fields, then redirects. | ||
| 609 | # It also appends some debug log and writes it into HTTP content, pass the -vvv parameter to see them. | ||
| 610 | |||
| 611 | $cmd = "$command -u '/redirect_with_increment/path1/path2/path3/path4' --onredirect=follow -vvv"; | ||
| 612 | $result = NPTest->testCmd( "$cmd" ); | ||
| 613 | is( $result->return_code, 1, $cmd); | ||
| 614 | like( $result->output, '/.*HTTP/1.1 403 Forbidden - \d+ bytes in [\d\.]+ second.*/', "Output correct, redirect_count was not present, got redirected to / : ".$result->output ); | ||
| 615 | |||
| 616 | # redirect_count=0 is parsed as a parameter and incremented. When it goes up to 3, the redirection returns HTTP OK | ||
| 617 | $cmd = "$command -u '/redirect_with_increment/path1/path2;redirect_count=0;p1=1;p2=ab?qp1=10&qp2=kl#f1=test' --onredirect=follow -vvv"; | ||
| 618 | $result = NPTest->testCmd( "$cmd" ); | ||
| 619 | is( $result->return_code, 0, $cmd); | ||
| 620 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, redirect_count went up to 3, and returned OK: ".$result->output ); | ||
| 621 | |||
| 622 | # location_redirect_count=0 goes up to 3, which uses the HTTP 302 style of redirection with 'Location' header | ||
| 623 | $cmd = "$command -u '/redirect_with_increment/path1/path2;location_redirect_count=0;p1=1;p2=ab?qp1=10&qp2=kl#f1=test' --onredirect=follow -vvv"; | ||
| 624 | $result = NPTest->testCmd( "$cmd" ); | ||
| 625 | is( $result->return_code, 0, $cmd); | ||
| 626 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, location_redirect_count went up to 3: ".$result->output ); | ||
| 473 | 627 | ||
| 474 | # These tests may block | 628 | # fail_count parameter may also go up to 3, which returns a HTTP 403 |
| 475 | print "ALRM\n"; | 629 | $cmd = "$command -u '/redirect_with_increment/path1/path2;redirect_count=0;fail_count=2' --onredirect=follow -vvv"; |
| 630 | $result = NPTest->testCmd( "$cmd" ); | ||
| 631 | is( $result->return_code, 1, $cmd); | ||
| 632 | like( $result->output, '/.*HTTP/1.1 403 Forbidden - \d+ bytes in [\d\.]+ second.*/', "Output correct, early due to fail_count reaching 3: ".$result->output ); | ||
| 633 | |||
| 634 | # redirect_count=0, p1=1 , p2=ab => redirect_count=1, p1=2 , p2=bc => redirect_count=2, p1=3 , p2=cd => redirect_count=3 , p1=4 , p2=de | ||
| 635 | # Last visited URI returns HTTP OK instead of redirect, and the one before that contains the new_uri in its content | ||
| 636 | $cmd = "$command -u '/redirect_with_increment/path1/path2;redirect_count=0;p1=1;p2=ab?qp1=10&qp2=kl#f1=test' --onredirect=follow -vvv"; | ||
| 637 | $result = NPTest->testCmd( "$cmd" ); | ||
| 638 | is( $result->return_code, 0, $cmd); | ||
| 639 | like( $result->output, '/.*redirect_count=3;p1=4;p2=de\?*/', "Output correct, parsed and incremented both parameters p1 and p2 : ".$result->output ); | ||
| 640 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, location_redirect_count went up to 3: ".$result->output ); | ||
| 641 | |||
| 642 | # Same incrementation as before, uses the query parameters that come after the first '?' : qp1 and qp2 | ||
| 643 | $cmd = "$command -u '/redirect_with_increment/path1/path2;redirect_count=0;p1=1;p2=ab?qp1=10&qp2=kl#f1=test' --onredirect=follow -vvv"; | ||
| 644 | $result = NPTest->testCmd( "$cmd" ); | ||
| 645 | is( $result->return_code, 0, $cmd); | ||
| 646 | like( $result->output, '/.*\?qp1=13&qp2=no*/', "Output correct, parsed and incremented both query parameters qp1 and qp2 : ".$result->output ); | ||
| 647 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, location_redirect_count went up to 3: ".$result->output ); | ||
| 648 | |||
| 649 | # Check if the query parameter order is kept intact | ||
| 650 | $cmd = "$command -u '/redirect_with_increment;redirect_count=0;?qp0=0&qp1=1&qp2=2&qp3=3&qp4=4&qp5=5' --onredirect=follow -vvv"; | ||
| 651 | $result = NPTest->testCmd( "$cmd" ); | ||
| 652 | is( $result->return_code, 0, $cmd); | ||
| 653 | like( $result->output, '/.*\?qp0=3&qp1=4&qp2=5&qp3=6&qp4=7&qp5=8*/', "Output correct, parsed and incremented query parameters qp1,qp2,qp3,qp4,qp5 in order : ".$result->output ); | ||
| 654 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, location_redirect_count went up to 3: ".$result->output ); | ||
| 655 | |||
| 656 | # The fragment is passed as another parameter. | ||
| 657 | # During the server redirects the fragment will be set to its value, if such a key is present. | ||
| 658 | # 'ebiil' => 'fcjjm' => 'gdkkn' => 'hello' | ||
| 659 | $cmd = "$command -u '/redirect_with_increment/path1/path2;redirect_count=0;fragment=ebiil?qp1=0' --onredirect=follow -vvv"; | ||
| 660 | $result = NPTest->testCmd( "$cmd" ); | ||
| 661 | is( $result->return_code, 0, $cmd); | ||
| 662 | like( $result->output, '/.*redirect_count=3;fragment=hello\?qp1=3#hello*/', "Output correct, fragments are specified by server and followed by check_curl: ".$result->output ); | ||
| 663 | like( $result->output, '/.*HTTP/1.1 200 OK - \d+ bytes in [\d\.]+ second.*/', "Output correct, location_redirect_count went up to 3: ".$result->output ); | ||
| 476 | 664 | ||
| 665 | # These tests may block | ||
| 477 | # stickyport - on full urlS port is set back to 80 otherwise | 666 | # stickyport - on full urlS port is set back to 80 otherwise |
| 478 | $cmd = "$command -f stickyport -u /redir_external -t 5 -s redirected"; | 667 | $cmd = "$command -f stickyport -u /redir_external -t 5 -s redirected"; |
| 479 | eval { | 668 | eval { |
