|
@@ -0,0 +1,130 @@
|
|
1
|
+#include <stdlib.h>
|
|
2
|
+#include <check.h>
|
|
3
|
+#include <stdio.h>
|
|
4
|
+
|
|
5
|
+#include "monitor.h"
|
|
6
|
+
|
|
7
|
+static const char *valids[] = {
|
|
8
|
+ "tcp://localhost:8181",
|
|
9
|
+ "tcp://127.0.0.1:81",
|
|
10
|
+ "udp://localhost:8000",
|
|
11
|
+ "udp://192.168.13.37:1234",
|
|
12
|
+ //"tcp://::1:8000",
|
|
13
|
+ "unix:///tmp/test/test.sock",
|
|
14
|
+ "unix://foo.sock",
|
|
15
|
+ NULL};
|
|
16
|
+
|
|
17
|
+static const char *invalids[] = {
|
|
18
|
+ "localhost:8000",
|
|
19
|
+ "ttt://127.0.0.1:81",
|
|
20
|
+ "tcp://","udp://", "unix://",
|
|
21
|
+ "tcp://localhost",
|
|
22
|
+ };
|
|
23
|
+
|
|
24
|
+START_TEST(test_check_sock_valid)
|
|
25
|
+{
|
|
26
|
+ int ret;
|
|
27
|
+ const char **urls;
|
|
28
|
+ char err_msg[256];
|
|
29
|
+
|
|
30
|
+ for(urls=valids; *urls != NULL; urls++)
|
|
31
|
+ {
|
|
32
|
+ ret = pyfcgi_monitor_check_sock(*urls);
|
|
33
|
+ snprintf(err_msg, 256,
|
|
34
|
+ "returns %d != 0 but '%s' given",
|
|
35
|
+ ret, *urls);
|
|
36
|
+ ck_assert_msg(ret == 0, err_msg);
|
|
37
|
+ }
|
|
38
|
+}
|
|
39
|
+END_TEST
|
|
40
|
+
|
|
41
|
+START_TEST(test_check_sock_invalid)
|
|
42
|
+{
|
|
43
|
+ int ret;
|
|
44
|
+ const char **urls;
|
|
45
|
+ char err_msg[256];
|
|
46
|
+
|
|
47
|
+ for(urls=invalids; *urls != NULL; urls++)
|
|
48
|
+ {
|
|
49
|
+ ret = pyfcgi_monitor_check_sock(*urls);
|
|
50
|
+ snprintf(err_msg, 256,
|
|
51
|
+ "returns %d != -1 but '%s' given",
|
|
52
|
+ ret, *urls);
|
|
53
|
+ ck_assert_msg(ret == -1, err_msg);
|
|
54
|
+ }
|
|
55
|
+}
|
|
56
|
+END_TEST
|
|
57
|
+
|
|
58
|
+START_TEST(test_parse_sock_valid_v4)
|
|
59
|
+{
|
|
60
|
+ pyfcgi_monitor_addr_t addr;
|
|
61
|
+ int domain, type, protocol, args[3], ret, i;
|
|
62
|
+ const char **urls;
|
|
63
|
+ char err_msg[256];
|
|
64
|
+
|
|
65
|
+ const int expt_ret[] = {
|
|
66
|
+ AF_INET, SOCK_STREAM, 0,
|
|
67
|
+ AF_INET, SOCK_STREAM, 0,
|
|
68
|
+ AF_INET, SOCK_DGRAM, 0,
|
|
69
|
+ AF_INET, SOCK_DGRAM, 0,
|
|
70
|
+ AF_UNIX, SOCK_STREAM, 0,
|
|
71
|
+ AF_UNIX, SOCK_STREAM, 0,};
|
|
72
|
+ const int *expts = expt_ret;
|
|
73
|
+
|
|
74
|
+ PyFCGI_conf.ipv4 = 1;
|
|
75
|
+ i=0;
|
|
76
|
+
|
|
77
|
+ for(urls=valids; *urls != NULL; urls++)
|
|
78
|
+ {
|
|
79
|
+ ret = pyfcgi_monitor_parse_sock(*urls, args, &addr);
|
|
80
|
+ snprintf(err_msg, 256,
|
|
81
|
+ "returns %d != 0 but '%s' given",
|
|
82
|
+ ret, *urls);
|
|
83
|
+ ck_assert_msg(ret == 0, err_msg);
|
|
84
|
+
|
|
85
|
+ domain = args[0];
|
|
86
|
+ type = args[1];
|
|
87
|
+ protocol = args[2];
|
|
88
|
+
|
|
89
|
+ ck_assert_int_eq(expts[0], domain);
|
|
90
|
+ ck_assert_int_eq(expts[1], type);
|
|
91
|
+ ck_assert_int_eq(expts[2], protocol);
|
|
92
|
+
|
|
93
|
+ /**@todo check returned address */
|
|
94
|
+ expts+=3;
|
|
95
|
+ i+=1;
|
|
96
|
+ }
|
|
97
|
+}
|
|
98
|
+END_TEST
|
|
99
|
+
|
|
100
|
+Suite * logger_suite(void)
|
|
101
|
+{
|
|
102
|
+ Suite *s;
|
|
103
|
+ TCase *tc_sockurl;
|
|
104
|
+
|
|
105
|
+ s = suite_create("Monitoring server");
|
|
106
|
+ tc_sockurl = tcase_create("Socket URL handling functions");
|
|
107
|
+ tcase_add_test(tc_sockurl, test_check_sock_valid);
|
|
108
|
+ tcase_add_test(tc_sockurl, test_check_sock_invalid);
|
|
109
|
+ tcase_add_test(tc_sockurl, test_parse_sock_valid_v4);
|
|
110
|
+
|
|
111
|
+ suite_add_tcase(s, tc_sockurl);
|
|
112
|
+ return s;
|
|
113
|
+}
|
|
114
|
+
|
|
115
|
+int main(void)
|
|
116
|
+{
|
|
117
|
+ int nfailed;
|
|
118
|
+ Suite *s;
|
|
119
|
+ SRunner *sr;
|
|
120
|
+
|
|
121
|
+ s = logger_suite();
|
|
122
|
+ sr = srunner_create(s);
|
|
123
|
+
|
|
124
|
+ srunner_run_all(sr, CK_VERBOSE);
|
|
125
|
+ nfailed = srunner_ntests_failed(sr);
|
|
126
|
+ srunner_free(sr);
|
|
127
|
+
|
|
128
|
+ return (!nfailed)?EXIT_SUCCESS:EXIT_FAILURE;
|
|
129
|
+}
|
|
130
|
+
|