Mercurial > hg > nginx-tests
view access.t @ 1897:38f1fd9ca3e6
Tests: unbreak reading new stderr data after eof.
Tests don't expect to stop reading redirected stderr when end of file is
reached, but rather to read new data being appended, similar to "tail -f".
The behaviour is found changed in Ubuntu 23.04's Perl 5.36, which applies
the upstream patch [1] expected for inclusion in the upcoming Perl 5.38.
The fix is to clear the filehandle's error state to continue reading.
[1] https://github.com/Perl/perl5/commit/80c1f1e45e8e
Updated mail_error_log.t and stream_error_log.t for consistency.
author | Sergey Kandaurov <pluknet@nginx.com> |
---|---|
date | Mon, 29 May 2023 17:27:11 +0400 |
parents | fcd65708672d |
children |
line wrap: on
line source
#!/usr/bin/perl # (C) Sergey Kandaurov # Tests for nginx access module. # At the moment only the new "unix:" syntax is tested (cf "all"). ############################################################################### use warnings; use strict; use Test::More; BEGIN { use FindBin; chdir($FindBin::Bin); } use lib 'lib'; use Test::Nginx; ############################################################################### select STDERR; $| = 1; select STDOUT; $| = 1; my $t = Test::Nginx->new()->has(qw/http proxy access unix/); $t->write_file_expand('nginx.conf', <<'EOF'); %%TEST_GLOBALS%% daemon off; events { } http { %%TEST_GLOBALS_HTTP%% server { listen 127.0.0.1:8080; server_name localhost; location /inet/ { proxy_pass http://127.0.0.1:8081/; } location /inet6/ { proxy_pass http://[::1]:%%PORT_8081%%/; } location /unix/ { proxy_pass http://unix:%%TESTDIR%%/unix.sock:/; } } server { listen 127.0.0.1:8081; listen [::1]:%%PORT_8081%%; listen unix:%%TESTDIR%%/unix.sock; location /allow_all { allow all; } location /allow_unix { allow unix:; } location /deny_all { deny all; } location /deny_unix { deny unix:; } } } EOF $t->try_run('no inet6 support')->plan(12); ############################################################################### # tests with inet socket like(http_get('/inet/allow_all'), qr/404 Not Found/, 'inet allow all'); like(http_get('/inet/allow_unix'), qr/404 Not Found/, 'inet allow unix'); like(http_get('/inet/deny_all'), qr/403 Forbidden/, 'inet deny all'); like(http_get('/inet/deny_unix'), qr/404 Not Found/, 'inet deny unix'); # tests with inet6 socket like(http_get('/inet6/allow_all'), qr/404 Not Found/, 'inet6 allow all'); like(http_get('/inet6/allow_unix'), qr/404 Not Found/, 'inet6 allow unix'); like(http_get('/inet6/deny_all'), qr/403 Forbidden/, 'inet6 deny all'); like(http_get('/inet6/deny_unix'), qr/404 Not Found/, 'inet6 deny unix'); # tests with unix socket like(http_get('/unix/allow_all'), qr/404 Not Found/, 'unix allow all'); like(http_get('/unix/allow_unix'), qr/404 Not Found/, 'unix allow unix'); like(http_get('/unix/deny_all'), qr/403 Forbidden/, 'unix deny all'); like(http_get('/unix/deny_unix'), qr/403 Forbidden/, 'unix deny unix'); ###############################################################################