mirror of
https://github.com/moparisthebest/curl
synced 2024-11-10 19:45:04 -05:00
5409e1d793
Mostly in order to support broken web sites that redirect to broken URLs that are accepted by browsers. Browsers are typically even more leniant than this as the WHATWG URL spec they should allow an _infinite_ amount. I tested 8000 slashes with Firefox and it just worked. Added test case 1141, 1142 and 1143 to verify the new parser. Closes #791
63 lines
974 B
Plaintext
63 lines
974 B
Plaintext
<testcase>
|
|
<info>
|
|
<keywords>
|
|
HTTP
|
|
HTTP GET
|
|
followlocation
|
|
</keywords>
|
|
</info>
|
|
# Server-side
|
|
<reply>
|
|
<data>
|
|
HTTP/1.1 302 This is a weirdo text message
|
|
Connection: close
|
|
Location: http:////foo.example.com/want/11420001
|
|
|
|
This server reply is for testing
|
|
</data>
|
|
<data1>
|
|
HTTP/1.1 200 hello
|
|
Connection: close
|
|
Content-Length: 4
|
|
|
|
hej
|
|
</data1>
|
|
<datacheck>
|
|
HTTP/1.1 302 This is a weirdo text message
|
|
Connection: close
|
|
Location: http:////foo.example.com/want/11420001
|
|
|
|
</datacheck>
|
|
</reply>
|
|
|
|
# Client-side
|
|
<client>
|
|
<server>
|
|
http
|
|
</server>
|
|
<name>
|
|
HTTP redirect to http://// (four slashes!)
|
|
</name>
|
|
<command>
|
|
%HOSTIP:%HTTPPORT/want/1142 -L -x http://%HOSTIP:%HTTPPORT
|
|
</command>
|
|
</client>
|
|
|
|
# Verify data after the test has been "shot"
|
|
<verify>
|
|
<strip>
|
|
^User-Agent:.*
|
|
</strip>
|
|
<protocol>
|
|
GET http://%HOSTIP:%HTTPPORT/want/1142 HTTP/1.1
|
|
Host: %HOSTIP:%HTTPPORT
|
|
Accept: */*
|
|
|
|
</protocol>
|
|
# 3, CURLE_URL_MALFORMAT for the four slashes
|
|
<errorcode>
|
|
3
|
|
</errorcode>
|
|
</verify>
|
|
</testcase>
|