check_utils.c 6.9 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171
  1. /* This Source Code Form is subject to the terms of the Mozilla Public
  2. * License, v. 2.0. If a copy of the MPL was not distributed with this
  3. * file, You can obtain one at http://mozilla.org/MPL/2.0/. */
  4. #include <stdlib.h>
  5. #include "ua_types.h"
  6. #include "ua_client.h"
  7. #include "ua_util.h"
  8. #include "check.h"
  9. START_TEST(EndpointUrl_split) {
  10. // check for null
  11. ck_assert_uint_eq(UA_EndpointUrl_split(NULL, NULL, NULL, NULL), UA_STATUSCODE_BADINVALIDARGUMENT);
  12. char hostname[256];
  13. UA_UInt16 port;
  14. const char* path;
  15. // check for max url length
  16. // this string has 256 chars
  17. char *overlength = "wEgfH2Sqe8AtFcUqX6VnyvZz6A4AZtbKRvGwQWvtPLrt7aaLb6wtqFzqQ2dLYLhTwJpAuVbsRTGfjvP2kvsVSYQLLeGuPjJyYnMt5e8TqtmYuPTb78uuAx7KyQB9ce95eacs3Jp32KMNtb7BTuKjQ236MnMX3mFWYAkALcj5axpQnFaGyU3HvpYrX24FTEztuZ3zpNnqBWQyHPVa6efGTzmUXMADxjw3AbG5sTGzDca7rucsfQRAZby8ZWKm66pV";
  18. ck_assert_uint_eq(UA_EndpointUrl_split(overlength, hostname, &port, &path), UA_STATUSCODE_BADOUTOFRANGE);
  19. // check for too short url
  20. ck_assert_uint_eq(UA_EndpointUrl_split("inv.ali:/", hostname, &port, &path), UA_STATUSCODE_BADOUTOFRANGE);
  21. // check for opc.tcp:// protocol
  22. ck_assert_uint_eq(UA_EndpointUrl_split("inv.ali://", hostname, &port, &path), UA_STATUSCODE_BADATTRIBUTEIDINVALID);
  23. // empty url
  24. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://", hostname, &port, &path), UA_STATUSCODE_GOOD);
  25. ck_assert_uint_eq(strlen(hostname), 0);
  26. ck_assert_uint_eq(port, 0);
  27. ck_assert_ptr_eq(path, NULL);
  28. // only hostname
  29. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname", hostname, &port, &path), UA_STATUSCODE_GOOD);
  30. ck_assert_str_eq(hostname,"hostname");
  31. ck_assert_uint_eq(port, 0);
  32. ck_assert_ptr_eq(path, NULL);
  33. // empty port
  34. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:", hostname, &port, &path), UA_STATUSCODE_GOOD);
  35. ck_assert_str_eq(hostname,"hostname");
  36. ck_assert_uint_eq(port, 0);
  37. ck_assert_ptr_eq(path, NULL);
  38. // specific port
  39. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:1234", hostname, &port, &path), UA_STATUSCODE_GOOD);
  40. ck_assert_str_eq(hostname,"hostname");
  41. ck_assert_uint_eq(port, 1234);
  42. ck_assert_ptr_eq(path, NULL);
  43. // IPv6
  44. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://[2001:0db8:85a3::8a2e:0370:7334]:1234/path", hostname, &port, &path), UA_STATUSCODE_GOOD);
  45. ck_assert_str_eq(hostname,"[2001:0db8:85a3::8a2e:0370:7334]");
  46. ck_assert_uint_eq(port, 1234);
  47. ck_assert_str_eq(path, "path");
  48. // empty hostname
  49. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://:", hostname, &port, &path), UA_STATUSCODE_GOOD);
  50. ck_assert_uint_eq(strlen(hostname),0);
  51. ck_assert_uint_eq(port, 0);
  52. ck_assert_ptr_eq(path, NULL);
  53. // empty hostname and no port
  54. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp:///", hostname, &port, &path), UA_STATUSCODE_GOOD);
  55. ck_assert_uint_eq(strlen(hostname),0);
  56. ck_assert_uint_eq(port, 0);
  57. ck_assert_ptr_eq(path,0);
  58. // overlength port
  59. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:12345678", hostname, &port, &path), UA_STATUSCODE_BADOUTOFRANGE);
  60. // too high port
  61. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:65536", hostname, &port, &path), UA_STATUSCODE_BADOUTOFRANGE);
  62. // port not a number
  63. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:6x6", hostname, &port, &path), UA_STATUSCODE_BADOUTOFRANGE);
  64. // no port but path
  65. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname/", hostname, &port, &path), UA_STATUSCODE_GOOD);
  66. ck_assert_str_eq(hostname,"hostname");
  67. ck_assert_uint_eq(port, 0);
  68. ck_assert_ptr_eq(path, 0);
  69. // port and path
  70. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:1234/path", hostname, &port, &path), UA_STATUSCODE_GOOD);
  71. ck_assert_str_eq(hostname,"hostname");
  72. ck_assert_uint_eq(port, 1234);
  73. ck_assert_str_eq(path, "path");
  74. // full url, but only hostname required
  75. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:1234/path", hostname, NULL, NULL), UA_STATUSCODE_GOOD);
  76. ck_assert_str_eq(hostname,"hostname");
  77. // full url, but only hostname and port required
  78. ck_assert_uint_eq(UA_EndpointUrl_split("opc.tcp://hostname:1234/path", hostname, &port, NULL), UA_STATUSCODE_GOOD);
  79. ck_assert_str_eq(hostname,"hostname");
  80. ck_assert_uint_eq(port, 1234);
  81. }
  82. END_TEST
  83. START_TEST(readNumber) {
  84. UA_UInt32 result;
  85. ck_assert_uint_eq(UA_readNumber((UA_Byte*)"x", 1, &result), 0);
  86. ck_assert_uint_eq(UA_readNumber((UA_Byte*)"1x", 2, &result), 1);
  87. ck_assert_uint_eq(result, 1);
  88. ck_assert_uint_eq(UA_readNumber((UA_Byte*)"123456789", 9, &result), 9);
  89. ck_assert_uint_eq(result, 123456789);
  90. }
  91. END_TEST
  92. START_TEST(StatusCode_msg) {
  93. #ifndef UA_ENABLE_STATUSCODE_DESCRIPTIONS
  94. ck_assert_str_eq(UA_StatusCode_msg(UA_STATUSCODE_GOOD), "StatusCode descriptions not available");
  95. return;
  96. #endif
  97. // first element in table
  98. ck_assert_str_eq(UA_StatusCode_explanation(UA_STATUSCODE_GOOD), "Success / No error");
  99. ck_assert_str_eq(UA_StatusCode_name(UA_STATUSCODE_GOOD), "Good");
  100. // just some randomly picked status codes
  101. ck_assert_str_eq(UA_StatusCode_explanation(UA_STATUSCODE_BADNOCOMMUNICATION),
  102. "Communication with the data source is defined");
  103. ck_assert_str_eq(UA_StatusCode_name(UA_STATUSCODE_BADNOCOMMUNICATION),
  104. "BadNoCommunication");
  105. ck_assert_str_eq(UA_StatusCode_explanation(UA_STATUSCODE_GOODNODATA),
  106. "No data exists for the requested time range or event filter.");
  107. ck_assert_str_eq(UA_StatusCode_name(UA_STATUSCODE_GOODNODATA), "GoodNoData");
  108. // last element in table
  109. ck_assert_str_eq(UA_StatusCode_explanation(UA_STATUSCODE_BADMAXCONNECTIONSREACHED),
  110. "The operation could not be finished because all available connections are in use.");
  111. ck_assert_str_eq(UA_StatusCode_name(UA_STATUSCODE_BADMAXCONNECTIONSREACHED),
  112. "BadMaxConnectionsReached");
  113. // an invalid status code
  114. ck_assert_str_eq(UA_StatusCode_explanation(0x80123456), "Unknown StatusCode");
  115. ck_assert_str_eq(UA_StatusCode_name(0x80123456), "Unknown");
  116. }
  117. END_TEST
  118. static Suite* testSuite_Utils(void) {
  119. Suite *s = suite_create("Utils");
  120. TCase *tc_endpointUrl_split = tcase_create("EndpointUrl_split");
  121. tcase_add_test(tc_endpointUrl_split, EndpointUrl_split);
  122. suite_add_tcase(s,tc_endpointUrl_split);
  123. TCase *tc_utils = tcase_create("Utils");
  124. tcase_add_test(tc_utils, readNumber);
  125. tcase_add_test(tc_utils, StatusCode_msg);
  126. suite_add_tcase(s,tc_utils);
  127. return s;
  128. }
  129. int main(void) {
  130. Suite *s = testSuite_Utils();
  131. SRunner *sr = srunner_create(s);
  132. srunner_set_fork_status(sr, CK_NOFORK);
  133. srunner_run_all(sr,CK_NORMAL);
  134. int number_failed = srunner_ntests_failed(sr);
  135. srunner_free(sr);
  136. return (number_failed == 0) ? EXIT_SUCCESS : EXIT_FAILURE;
  137. }