1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 29 30 31 32 33 34 35 36 37 38 39 40 41 42 43 44 45 46 47 48 49 50 51 52 53 54 55 56 57 58 59 60 61 62 63 64 65 66 67 68 69 70 71 72 73 74 75 76 77 78 79 80 81 82 83 84 85 86 87 88
|
# vim:set ft= ts=4 sw=4 et fdm=marker:
our $SkipReason;
BEGIN {
if ($ENV{TEST_NGINX_CHECK_LEAK}) {
$SkipReason = "unavailable for the hup tests";
} else {
$ENV{TEST_NGINX_USE_HUP} = 1;
undef $ENV{TEST_NGINX_USE_STAP};
}
}
use lib '.';
use t::TestCore $SkipReason ? (skip_all => $SkipReason) : ();
use Cwd qw(cwd);
#worker_connections(1014);
master_process_enabled(1);
log_level('warn');
repeat_each(2);
plan tests => repeat_each() * (blocks() * 4);
my $pwd = cwd();
our $HttpConfig = <<_EOC_;
lua_package_path '$t::TestCore::lua_package_path';
init_by_lua_block {
$t::TestCore::init_by_lua_block
local process = require "ngx.process"
local ok, err = process.enable_privileged_agent()
if not ok then
ngx.log(ngx.ERR, "enable_privileged_agent failed: ", err)
end
}
init_worker_by_lua_block {
local base = require "resty.core.base"
local typ = require "ngx.process".type
if typ() == "privileged agent" then
ngx.log(ngx.WARN, "process type: ", typ())
end
}
_EOC_
#no_diff();
no_long_string();
check_accum_error_log();
run_tests();
__DATA__
=== TEST 1: sanity
--- http_config eval: $::HttpConfig
--- config
location = /t {
content_by_lua_block {
local typ = require "ngx.process".type
local f, err = io.open(ngx.config.prefix() .. "/logs/nginx.pid", "r")
if not f then
ngx.say("failed to open nginx.pid: ", err)
return
end
local pid = f:read()
-- ngx.say("master pid: [", pid, "]")
f:close()
ngx.say("type: ", typ())
os.execute("kill -HUP " .. pid)
}
}
--- request
GET /t
--- response_body
type: worker
--- error_log
init_worker_by_lua(nginx.conf:48):6: process type: privileged
--- no_error_log
[error]
--- skip_nginx: 4: < 1.11.2
|