diff options
author | Christopher Faulet <cfaulet@haproxy.com> | 2020-10-20 09:10:25 +0200 |
---|---|---|
committer | Christopher Faulet <cfaulet@haproxy.com> | 2020-11-20 13:01:27 +0100 |
commit | fc13967dbb639b0bb5b3f207d97f39603cf5104d (patch) | |
tree | 0f138de4ef0cd3a0cf7ff26afb59259c09408e7a | |
parent | e823f31a6186713134f561a52530785d1e7037e0 (diff) | |
download | haproxy-fc13967dbb639b0bb5b3f207d97f39603cf5104d.tar.gz |
REGTESTS: Fix proxy_protocol_tlv_validation20201118-mux_h1_refactoring-2
Remaining data after the PROXYv2 header now trigger a parsing error in the H1
multiplexer Thus the required version for this test is now set to 2.4.
-rw-r--r-- | reg-tests/connection/proxy_protocol_tlv_validation.vtc | 8 |
1 files changed, 5 insertions, 3 deletions
diff --git a/reg-tests/connection/proxy_protocol_tlv_validation.vtc b/reg-tests/connection/proxy_protocol_tlv_validation.vtc index 24c548f13..284bc9151 100644 --- a/reg-tests/connection/proxy_protocol_tlv_validation.vtc +++ b/reg-tests/connection/proxy_protocol_tlv_validation.vtc @@ -1,6 +1,6 @@ varnishtest "Check that the TLVs are properly validated" -#REQUIRE_VERSION=2.2 +#REQUIRE_VERSION=2.4 feature ignore_unknown_macro @@ -53,7 +53,8 @@ haproxy h2 -conf { http-request return status 200 } -start -# Validate that a TLV after the end of the PROXYv2 header is ignored +# Validate that a TLV after the end of the PROXYv2 header is not parsed +# and handle by the HTTP parser, leading to a 400 bad request error client c2 -connect ${h2_fe1_sock} { # PROXY v2 signature sendhex "0d 0a 0d 0a 00 0d 0a 51 55 49 54 0a" @@ -72,7 +73,8 @@ client c2 -connect ${h2_fe1_sock} { txreq -url "/" rxresp - expect resp.http.echo == "3132333435" + expect resp.status == 400 + expect resp.http.echo == <undef> } -run haproxy h3 -conf { |