[bug] redirecting response headers
In verbose mode, kurly doesn't print the response headers of the redirecting requests (3xx)
kurly output :
* Trying 52.71.238.102...
* TCP_NODELAY set
* Connected to httpbin.org (52.71.238.102) port 443 (#0)
* APLN, server accepted to use http/1.1
* TLSv1.2, TLS Handshake finished
* SSL connection using TLSv1.2 / ECDHE-RSA-AES-128-GCM-SHA256
* Server certificate:
* subject: CN=httpbin.org
* start date: Sun, 13 May 2018 00:53:54 UTC
* expire date: Sat, 11 Aug 2018 00:53:54 UTC
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /redirect/1 HTTP/1.1
> User-Agent [Kurly/1.2.1]
> Accept [*/*]
> Host [httpbin.org]
* Ignoring the response body
* Issuing request to this URL : https://httpbin.org/get
* Re-using existing connection! (#0) with host httpbin.org
* Connected to httpbin.org (52.71.238.102) port 443 (#1)
> GET /redirect/1 HTTP/1.1
> User-Agent [Kurly/1.2.1]
> Accept [*/*]
> Host [httpbin.org]
< HTTP/1.1 200 OK
< Content-Type [application/json]
< Content-Length [232]
< Access-Control-Allow-Origin [*]
< Access-Control-Allow-Credentials [true]
< Via [1.1 vegur]
< Connection [keep-alive]
< Server [gunicorn/19.8.1]
< Date [Tue, 15 May 2018 17:55:24 GMT]
[<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<<] 232 B/232 B
SOME BODY
curl output :
* Trying 52.71.238.102...
* TCP_NODELAY set
* Connected to httpbin.org (52.71.238.102) port 443 (#0)
* ALPN, offering h2
* ALPN, offering http/1.1
* Cipher selection: PROFILE=SYSTEM
* successfully set certificate verify locations:
* CAfile: /etc/pki/tls/certs/ca-bundle.crt
CApath: none
* TLSv1.2 (OUT), TLS handshake, Client hello (1):
* TLSv1.2 (IN), TLS handshake, Server hello (2):
* TLSv1.2 (IN), TLS handshake, Certificate (11):
* TLSv1.2 (IN), TLS handshake, Server key exchange (12):
* TLSv1.2 (IN), TLS handshake, Server finished (14):
* TLSv1.2 (OUT), TLS handshake, Client key exchange (16):
* TLSv1.2 (OUT), TLS change cipher, Client hello (1):
* TLSv1.2 (OUT), TLS handshake, Finished (20):
* TLSv1.2 (IN), TLS handshake, Finished (20):
* SSL connection using TLSv1.2 / ECDHE-RSA-AES128-GCM-SHA256
* ALPN, server accepted to use http/1.1
* Server certificate:
* subject: CN=httpbin.org
* start date: May 13 00:53:54 2018 GMT
* expire date: Aug 11 00:53:54 2018 GMT
* subjectAltName: host "httpbin.org" matched cert's "httpbin.org"
* issuer: C=US; O=Let's Encrypt; CN=Let's Encrypt Authority X3
* SSL certificate verify ok.
> GET /redirect/1 HTTP/1.1
> Host: httpbin.org
> User-Agent: curl/7.55.1
> Accept: */*
>
Start Missing part
< HTTP/1.1 302 FOUND
< Connection: keep-alive
< Server: gunicorn/19.8.1
< Date: Tue, 15 May 2018 17:55:56 GMT
< Content-Type: text/html; charset=utf-8
< Content-Length: 215
< Location: /get
< Access-Control-Allow-Origin: *
< Access-Control-Allow-Credentials: true
< Via: 1.1 vegur
<
End Missing part
* Ignoring the response-body
* Connection #0 to host httpbin.org left intact
* Issue another request to this URL: 'https://httpbin.org/get'
* Found bundle for host httpbin.org: 0x555927ffb5a0 [can pipeline]
* Re-using existing connection! (#0) with host httpbin.org
* Connected to httpbin.org (52.71.238.102) port 443 (#0)
> GET /get HTTP/1.1
> Host: httpbin.org
> User-Agent: curl/7.55.1
> Accept: */*
>
< HTTP/1.1 200 OK
< Connection: keep-alive
< Server: gunicorn/19.8.1
< Date: Tue, 15 May 2018 17:55:56 GMT
< Content-Type: application/json
< Content-Length: 164
< Access-Control-Allow-Origin: *
< Access-Control-Allow-Credentials: true
< Via: 1.1 vegur
<
SOME BODY