<testcase>
<info>
<keywords>
HTTPS
HTTP POST
client-body-tagger
</keywords>
</info>

<reply>
<data>
HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html

Received your input.
</data>
</reply>

<proxy-reply>
<data>
HTTP/1.1 200 Connection established

HTTP/1.1 200 OK
Content-Length: 21
Content-Type: text/html

Received your input.
</data>
</proxyreply>

<client>
<server>
https
</server>
<name>
Two requests to the same URL on a reused connection. The second one is a POST request with an offending word but it's chunk-encoded so it gets to pass. (based on test 8)
</name>
<features>
proxy
</features>
<command>
-s --write-out '%{stderr}%{response_code}\n' --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER --next -H "Transfer-Encoding: chunked" -d "blafasel" -s --write-out '%{stderr}%{response_code}\n' --insecure https://%HOSTIP:%HTTPSPORT/%TESTNUMBER
</command>
</client>

<verify>
<protocol>
GET /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*

POST /%TESTNUMBER HTTP/1.1
Host: %HOSTIP:%HTTPSPORT
User-Agent: curl/%VERSION
Accept: */*
Transfer-Encoding: chunked
Content-Type: application/x-www-form-urlencoded

8
blafasel
0

</protocol>
<stderr>
200
200
</stderr>

</verify>
</testcase>
