From mboxrd@z Thu Jan 1 00:00:00 1970 Return-Path: X-Spam-Checker-Version: SpamAssassin 3.4.2 (2018-09-13) on dcvr.yhbt.net X-Spam-Level: X-Spam-ASN: X-Spam-Status: No, score=-3.3 required=3.0 tests=ALL_TRUSTED,AWL,BAYES_00, FROM_FMBLA_NEWDOM shortcircuit=no autolearn=no autolearn_force=no version=3.4.2 Received: from localhost (dcvr.yhbt.net [127.0.0.1]) by dcvr.yhbt.net (Postfix) with ESMTP id 46A431F463 for ; Thu, 28 Nov 2019 07:08:54 +0000 (UTC) From: Eric Wong To: meta@public-inbox.org Subject: [PATCH] t/httpd-unix: FreeBSD expects to fail with EADDRINUSE Date: Thu, 28 Nov 2019 07:08:54 +0000 Message-Id: <20191128070854.1451-1-e@80x24.org> MIME-Version: 1.0 Content-Transfer-Encoding: 8bit List-Id: Tested FreeBSD 11.2. I'm starting to think I'm too conservative with this check and it could be safely expanded to cover any OS with UNIX sockets. --- t/httpd-unix.t | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/t/httpd-unix.t b/t/httpd-unix.t index f7881cfa..ceec127c 100644 --- a/t/httpd-unix.t +++ b/t/httpd-unix.t @@ -59,7 +59,7 @@ sub check_sock ($) { check_sock($unix); { # do not clobber existing socket - my %err = ( 'linux' => EADDRINUSE ); + my %err = ( 'linux' => EADDRINUSE, 'freebsd' => EADDRINUSE ); open my $out, '>>', "$tmpdir/1" or die "redirect failed: $!"; open my $err, '>>', "$tmpdir/2" or die "redirect failed: $!"; my $cmd = ['-httpd', '-l', $unix, '-W0', $psgi];