Skip to content

Commit 2dbb350

Browse files
committed
Tests: updated commit references to git hashes.
1 parent d0ca7f7 commit 2dbb350

12 files changed

+22
-22
lines changed

geo.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -69,7 +69,7 @@ http {
6969
7070
# ranges with two /16 networks
7171
# the latter network has greater two least octets
72-
# (see 1301a58b5dac for details)
72+
# (see f927ab882 for details)
7373
10.10.3.0-10.11.2.255 foo;
7474
10.12.3.0-10.13.2.255 foo2;
7575
delete 10.10.3.0-10.11.2.255;

h2_request_body.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -449,7 +449,7 @@ is($frame->{headers}->{':status'}, 413,
449449
'request body without content-length many pad - limited');
450450

451451
# absent request body is not buffered with client_body_in_file_only off
452-
# see e02f1977846b for details
452+
# see 27c7ed683 for details
453453

454454
$s = Test::Nginx::HTTP2->new();
455455
$sid = $s->new_stream({ path => '/off/t.html' });

h3_request_body.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -315,7 +315,7 @@ is($frame->{headers}->{':status'}, 413,
315315
'request body without content-length many - limited');
316316

317317
# absent request body is not buffered with client_body_in_file_only off
318-
# see e02f1977846b for details
318+
# see 27c7ed683 for details
319319

320320
$s = Test::Nginx::HTTP3->new();
321321
$sid = $s->new_stream({ path => '/off/t.html' });

ignore_invalid_headers.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -99,7 +99,7 @@ like(get($us2, 8080), qr/x-bar/, 'off - underscore first');
9999
like(get($bad, 8080), qr/x-bar/, 'off - bad');
100100
like(get($bad2, 8080), qr/x-bar/, 'off - bad first');
101101

102-
# ignore_invalid_headers off; headers parsing post 8f55cb5c7e79
102+
# ignore_invalid_headers off; headers parsing post 3c84e4b70 (1.17.5)
103103

104104
unlike(http('GET /v HTTP/1.0' . CRLF
105105
. 'Host: localhost' . CRLF

image_filter_finalize.t

+3-3
Original file line numberDiff line numberDiff line change
@@ -54,7 +54,7 @@ http {
5454
listen 127.0.0.1:8080;
5555
server_name localhost;
5656
57-
# this used to cause a segmentation fault before 07f028df3879 (1.3.1)
57+
# this used to cause a segmentation fault before d2143f11c (1.3.1)
5858
# http://nginx.org/pipermail/nginx/2011-January/024703.html
5959
6060
location /t1 {
@@ -74,8 +74,8 @@ http {
7474
return 404;
7575
}
7676
77-
# another segfault, introduced in 204b780a89de (1.3.0),
78-
# fixed in 07f028df3879 (1.3.1)
77+
# another segfault, introduced in e302ed6fc (1.3.0),
78+
# fixed in d2143f11c (1.3.1)
7979
8080
location /t2 {
8181
proxy_pass http://127.0.0.1:8080/big;

proxy_cache.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -115,7 +115,7 @@ like(http_gzip_request('/empty.html'),
115115
'empty get stale');
116116

117117
# no client connection close with response on non-cacheable HEAD requests
118-
# see 545b5e4d83b2 in nginx for detailed explanation
118+
# see 573ec98d2 in nginx for detailed explanation
119119

120120
my $s = http(<<EOF, start => 1);
121121
HEAD /big.html?e=1 HTTP/1.1

proxy_cache_error.t

+2-2
Original file line numberDiff line numberDiff line change
@@ -78,9 +78,9 @@ like(http_head('/big.html'), qr/200 OK/, 'head request');
7878

7979
# once proxy_read_timeout expires, nginx will call
8080
# ngx_http_finalize_upstream_request() with u->pipe->downstream_error set
81-
# and rc = NGX_HTTP_BAD_GATEWAY; after revision ad3f342f14ba046c this
81+
# and rc = NGX_HTTP_BAD_GATEWAY; after revision 2aa6d7fd6 (1.9.13) this
8282
# will result in ngx_http_finalize_request(NGX_HTTP_BAD_GATEWAY),
8383
# leading to an attempt to return additional error response and
84-
# the "header already sent" alert; fixed in 93abb5a855d6
84+
# the "header already sent" alert; fixed in 3377c0011 (1.13.9)
8585

8686
###############################################################################

proxy_cache_revalidate.t

+7-7
Original file line numberDiff line numberDiff line change
@@ -140,9 +140,9 @@ like(http_get('/etag/t2'), qr/X-Cache-Status: HIT.*NEW/ms,
140140

141141
# check that conditional requests are only used for 200/206 responses
142142

143-
# d0ce06cb9be1 in 1.7.3 changed to ignore header filter's work to strip
143+
# 5d477a76f in 1.7.3 changed to ignore header filter's work to strip
144144
# the Last-Modified header when storing non-200/206 in cache;
145-
# 1573fc7875fa in 1.7.9 effectively turned it back.
145+
# 1ea64b3f8 in 1.7.9 effectively turned it back.
146146

147147
unlike(http_get('/201'), qr/X-If-Modified/, 'other status no revalidation');
148148

@@ -152,14 +152,14 @@ select undef, undef, undef, 3.5;
152152

153153
# check that conditional requests are not used to revalidate 404 response
154154

155-
# before fd283aa92e04 introduced in 1.7.7, this test passed by chance because
155+
# before 4a2fba2d4 introduced in 1.7.7, this test passed by chance because
156156
# of the If-Modified-Since header that was sent with Epoch in revalidation
157157
# of responses cached without the Last-Modified header;
158-
# fd283aa92e04 leaved (an legitimate) successful revalidation of 404 by ETag
159-
# (introduced by 44b9ab7752e3 in 1.7.3), which caused the test to fail;
160-
# 1573fc7875fa in 1.7.9 changed to not revalidate non-200/206 responses but
158+
# 4a2fba2d4 leaved (a legitimate) successful revalidation of 404 by ETag
159+
# (introduced by b81296167 in 1.7.3), which caused the test to fail;
160+
# 1ea64b3f8 in 1.7.9 changed to not revalidate non-200/206 responses but
161161
# leaked Last-Modified and ETag into 404 inherited from stale 200/206 response;
162-
# 174512857ccf in 1.7.11 fixed the leak and allowed the test to pass.
162+
# f0b5f8337 in 1.7.11 fixed the leak and allowed the test to pass.
163163

164164
rename("$d/t3_moved", "$d/t3");
165165

quic_retry.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -124,7 +124,7 @@ is($frame->{error}, 11, 'retry token decrypt error');
124124

125125
# resending client Initial packets after receiving a Retry packet
126126
# to simulate server Initial packet loss triggering its retransmit,
127-
# used to create extra nginx connections before 8f7e6d8c061e,
127+
# used to create extra nginx connections before 1bc204a3a (1.25.3),
128128
# caught by CRYPTO stream mismatch among server Initial packets
129129

130130
TODO: {

ssi_delayed.t

+2-2
Original file line numberDiff line numberDiff line change
@@ -4,7 +4,7 @@
44
# (C) Roman Arutyunyan
55
# (C) Nginx, Inc.
66

7-
# Test for subrequest bug with delay (see 903fb1ddc07f for details).
7+
# Test for subrequest bug with delay.
88

99
###############################################################################
1010

@@ -72,7 +72,7 @@ $t->run()->waitforsocket('127.0.0.1:' . port(8081));
7272
# ready to handle corresponding write event, wev->delayed won't be
7373
# cleared. This results in the subrequest response not being
7474
# sent to the client, and the whole request will hang if all proxy
75-
# buffers will be exhausted. Fixed in 1.11.13 (903fb1ddc07f).
75+
# buffers will be exhausted. Fixed in 5d5f0dcac (1.11.13).
7676

7777
like(http_get('/delayed.html'), qr/x{100}y{1024}SEE-THIS/, 'delayed');
7878

ssl_proxy_upgrade.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -151,7 +151,7 @@ undef $s;
151151
$s = upgrade_connect(noheader => 1);
152152
ok(!$s, "handshake noupgrade");
153153

154-
# bytes sent on upgraded connection, fixed in c2f309fb7ad2 (1.7.11)
154+
# bytes sent on upgraded connection, fixed in c2c9a1c03 (1.7.11)
155155
# verify with 1) data actually read by client, 2) expected data from backend
156156

157157
$t->stop();

stream_geo.t

+1-1
Original file line numberDiff line numberDiff line change
@@ -84,7 +84,7 @@ stream {
8484
8585
# ranges with two /16 networks
8686
# the latter network has greater two least octets
87-
# (see 1301a58b5dac for details)
87+
# (see f927ab882 for details)
8888
10.10.3.0-10.11.2.255 foo;
8989
10.12.3.0-10.13.2.255 foo2;
9090
delete 10.10.3.0-10.11.2.255;

0 commit comments

Comments
 (0)