view http_location_win32.t @ 572:ca54b445d982

Tests: masked nginx bug in proxy next upstream. When iterating through several next upstreams per a worker cycle, a previously reported event about upstream connection error may be improperly applied to the next upstream, thus leading to the invalid connection error. E.g., in kqueue, where the problem is visible, this is caused by "ev->instance" that does not tolerate more than one next upstream at once, and kevents placed on the kqueue separately for read and write events. The change is to limit test case to the only one next upstream.
author Sergey Kandaurov <pluknet@nginx.com>
date Thu, 14 May 2015 11:54:24 +0300
parents 9b1df914171f
children e9064d691790
line wrap: on
line source

#!/usr/bin/env perl

# (C) Maxim Dounin

# Tests for location selection on win32.

###############################################################################

use warnings;
use strict;

use Test::More;

BEGIN { use FindBin; chdir($FindBin::Bin); }

use lib 'lib';
use Test::Nginx;

###############################################################################

select STDERR; $| = 1;
select STDOUT; $| = 1;

plan(skip_all => 'not win32')
	if $^O ne 'MSWin32' && $^O ne 'msys';

my $t = Test::Nginx->new()->has(qw/http rewrite/)->plan(19)
	->write_file_expand('nginx.conf', <<'EOF');

%%TEST_GLOBALS%%

daemon         off;

events {
}

http {
    %%TEST_GLOBALS_HTTP%%

    server {
        listen       127.0.0.1:8080;
        server_name  localhost;

        location / {
            add_header X-Location root;
            return 204;
        }

        location /directory/ {
            add_header X-Location directory;
            return 204;
        }

        location /direct~1 {
        }

        location = /file {
            add_header X-Location file;
            return 204;
        }
    }
}

EOF

$t->run();

my $d = $t->testdir();
mkdir("$d/directory");

$t->write_file('directory/file', 'SEE-THIS');

###############################################################################

like(http_get('/x'), qr/X-Location: root/, 'root');

# these all are mapped to "/directory/"

like(http_get('/directory/'), qr/X-Location: directory/, 'directory');
like(http_get('/Directory/'), qr/X-Location: directory/, 'directory caseless');
like(http_get('/directory./'), qr/X-Location: directory/, 'directory dot');
like(http_get('/directory.%2ffile'), qr/X-Location: directory/,
	'directory dot encoded slash');
like(http_get('/directory::$index_allocation/'),
	qr/X-Location: directory|400 Bad/,
	'directory stream');
like(http_get('/directory::$index_allocation./'),
	qr/X-Location: directory|400 Bad/,
	'directory stream dot');
like(http_get('/directory:$i30:$index_allocation./'),
	qr/X-Location: directory|400 Bad/,
	'directory i30 stream dot');

# these looks similar, but shouldn't be mapped to "/directory/"

like(http_get('/directory../'), qr/X-Location: root/, 'directory dot dot');
like(http_get('/directory.::$index_allocation/'), qr/X-Location: root|400 Bad/,
	'directory dot stream');

# short name, should be rejected

unlike(http_get('/direct~1/file'), qr/SEE-THIS/, 'short name');
unlike(http_get('/direct~1./file'), qr/SEE-THIS/, 'short name dot');
unlike(http_get('/direct~1::$index_allocation./file'), qr/SEE-THIS/,
	'short name stream dot');
unlike(http_get('/direct~1.::$index_allocation/file'), qr/SEE-THIS/,
	'short name dot stream');

# these should be mapped to /file

like(http_get('/file'), qr/X-Location: file/, 'file');
like(http_get('/file.'), qr/X-Location: file/, 'file dot');
like(http_get('/file..'), qr/X-Location: file/, 'file dot dot');
like(http_get('/file%20.%20.'), qr/X-Location: file/, 'file dots and spaces');
like(http_get('/file::$data..'), qr/X-Location: file|400 Bad/,
	'file stream dot dot');

###############################################################################