support for Rack hijack in request and response
[unicorn.git] / t / t0001-reload-bad-config.sh
blob55bb355583388c838b190ec4f086290b82d315af
1 #!/bin/sh
2 . ./test-lib.sh
3 t_plan 7 "reload config.ru error with preload_app true"
5 t_begin "setup and start" && {
6 unicorn_setup
7 rtmpfiles ru
9 cat > $ru <<\EOF
10 use Rack::ContentLength
11 use Rack::ContentType, "text/plain"
12 x = { "hello" => "world" }
13 run lambda { |env| [ 200, {}, [ x.inspect << "\n" ] ] }
14 EOF
15 echo 'preload_app true' >> $unicorn_config
16 unicorn -D -c $unicorn_config $ru
17 unicorn_wait_start
20 t_begin "hit with curl" && {
21 out=$(curl -sSf http://$listen/)
22 test x"$out" = x'{"hello"=>"world"}'
25 t_begin "introduce syntax error in rackup file" && {
26 echo '...' >> $ru
29 t_begin "reload signal succeeds" && {
30 kill -HUP $unicorn_pid
31 while ! egrep '(done|error) reloading' $r_err >/dev/null
33 sleep 1
34 done
36 grep 'error reloading' $r_err >/dev/null
37 > $r_err
40 t_begin "hit with curl" && {
41 out=$(curl -sSf http://$listen/)
42 test x"$out" = x'{"hello"=>"world"}'
45 t_begin "killing succeeds" && {
46 kill $unicorn_pid
49 t_begin "check stderr" && {
50 check_stderr
53 t_done