2
0

test_httpsrv.c 29 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770771772773774775776777778779780781782783784785786787788789790791792793794795796797798799800801802803804805806807808809810811812813814815816817818819820
  1. /* _
  2. * ___ __ _ __ _ _ _(_)
  3. * / __|/ _` |/ _` | | | | |
  4. * \__ \ (_| | (_| | |_| | |
  5. * |___/\__,_|\__, |\__,_|_|
  6. * |___/
  7. *
  8. * Cross-platform library which helps to develop web servers or frameworks.
  9. *
  10. * Copyright (C) 2016-2021 Silvio Clecio <[email protected]>
  11. *
  12. * Sagui library is free software; you can redistribute it and/or
  13. * modify it under the terms of the GNU Lesser General Public
  14. * License as published by the Free Software Foundation; either
  15. * version 2.1 of the License, or (at your option) any later version.
  16. *
  17. * Sagui library is distributed in the hope that it will be useful,
  18. * but WITHOUT ANY WARRANTY; without even the implied warranty of
  19. * MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the GNU
  20. * Lesser General Public License for more details.
  21. *
  22. * You should have received a copy of the GNU Lesser General Public
  23. * License along with Sagui library; if not, write to the Free Software
  24. * Foundation, Inc., 51 Franklin Street, Fifth Floor, Boston, MA 02110-1301 USA
  25. */
  26. #define SG_EXTERN
  27. #ifndef TEST_HTTPSRV_PORT
  28. #define TEST_HTTPSRV_PORT 8080
  29. #endif /* TEST_HTTPSRV_PORT */
  30. #include "sg_assert.h"
  31. #include <sagui.h>
  32. #include "sg_httpuplds.h"
  33. #include "sg_httpsrv.c"
  34. const char private_key[] =
  35. "-----BEGIN PRIVATE KEY-----\n"
  36. "MIIJRAIBADANBgkqhkiG9w0BAQEFAASCCS4wggkqAgEAAoICAQDGWTyCaPu8zxLJ\n"
  37. "prHIGGbuxC+1egVbwhxUj+78ik1CwmBKOaPou8/GiQJor7CII+ChWnsKBk1k/gkZ\n"
  38. "FRTa6uUBK5k5TpuIKFXJIu9r2WNgc//Pb4dsrx6530PrI8tZGuc1hj1l0XxOq86w\n"
  39. "W2Zm+K5nc9OmZzLLsybO3HlhCPzpPR3VnZ0SAtiC+o8OiatQF1UXBrDaRk0OTNgG\n"
  40. "xH0C1V1h5YQ+LwwjDpa5mqXMvDWIQnQL468OUt02vTagmP46BppN3Bnb2zZqYbbF\n"
  41. "K35pgkHYd3QpyglTkppJv24e9rNQn1I+mNSA/UhvOCGoE8oZTxfRAcFeEKVFiEfi\n"
  42. "8KlC6Soremmtkkual56h50ZmFGkWUgmzaF7BBPSpnO/mH3AMy50JBcYKs1FqdGF1\n"
  43. "XWyW30C1v8cJVyXfjY5tNbjXHm54KSt99me5x9MRubuRnpAZXISZc2SFfZHu+Ox0\n"
  44. "p2gAw9ihP4BROqAN9cinDqqk+ApwzL47A7N0lqqHg10PbxV+hNlPSQXYualj8Utn\n"
  45. "wb+QhE7xjHTFnSfB2Ho1+zeuS73y8VjEF1PONFVgYG44Y8d6L86J+CYl0m4ehOql\n"
  46. "TBCB4AZnxTlOLY4f+hCTbj16nkoF6yaJr7vphPTsL0DIj2IkHqhn8To7cmSfn0Xd\n"
  47. "M8O3GgRUwmODmefk8Kh9HMx/1uIsnQIDAQABAoICAQCwaAc/+P0DhKux+vac/s71\n"
  48. "RjkkTxza6f3mW4jyxFJIsLWQ7kjQIdF+QraIwtDflAEhoGZTmR1WV/VhgHVm6oi4\n"
  49. "DL2e0UHUzALX+6Eyq0oOK7z1Eb1BNVK/f0lZpSEi46GE4hpTJwhGs9kE0pV1uXDr\n"
  50. "g4FWuuvbbT9ztXSij6rYCcoyBZb/wNYtT4jSJjDd75J3AzVhPCsmL8Pl6PVCAt+l\n"
  51. "xMpjv9Ysi7oT4u3Y8/8sa+Xn+RzlQV+LYqdmGAvrMZok6z94YTO5U6SJIdCxJ+9G\n"
  52. "BZ+j1xOKZ5WfR4k6MrFyX/B2ydgdzKaSfDq60Lbq4YROGCCRd352I+nDdcUkRFmC\n"
  53. "dXgJ7SDZDoqsuv0WWpA9PpzzVfZVi6+CY0tAypp510Su2xOsrpLLk3IvvTuYJeP0\n"
  54. "8p3Qp+eGRgZasbb816ex2VnNOAmhbmY2KqKpDW7GjThzqeRHf8TezOR9c3ngulRz\n"
  55. "rvAkhUZgNWSSUC9IWuLgK9LP+aR7fLsYXdvGT8e0tnSJ6mqFd4VMC5f4AUkzFuLq\n"
  56. "5ej+IhgKQv23aCLU5tAhybIk/BUaTNm0wK+ObIDvBmHQbrILsvQCZ4gG6TYfHYGd\n"
  57. "ZMn8jZayk+UNNmpvm3S5Zhsxy+UYGcdZgOzBzC8TH9+D75nu4OwGX1SsizKcuNTn\n"
  58. "HKERJo7RLHXgC4dnKfRcwQKCAQEA9Wzta7Zf76wsuR+ddGiE1vW9wVN5kOSLpW/O\n"
  59. "nUcO60W92QYjisTLUa1U1g4OoIcDQL698jeiHnSZPAlwNb0h0kUqUph0OIv7UrLT\n"
  60. "WBUlwe2Aw5665KXMPmxm2MNj0RuENIAVv72AUCN2s2EcypmSfCYaeN2YGWqdu4xc\n"
  61. "NgIm0tm/zX+n6sPA2ip+g+zMIA4VxtZs8iVr5EWc7yaGCsdc3hun6X87Q3q7t7Qa\n"
  62. "LB9uhWkum8qCyJoqoVLzWVpJelRszdffths0nbiVbg7ytjWhRByD4p4+iHkU12Te\n"
  63. "2n3q3QvcZz3wTngbCos6iHsKryDQDuT/a93xVn93SEo+qNEycQKCAQEAzuULfurC\n"
  64. "YLWFZtGTg2ukpfuvVOV7s4PKWOQ3nXJirfvVNaMGttmWYZF20DgJ3IJ6AeY1/1QM\n"
  65. "Ebfyo/C8XwjPzBp2XT0bNhgV6Ubta1W2HFPHo2+B9hStH5UKxb5GZbjZRHMnKReT\n"
  66. "lyylTPdspbdott9JxMKgvR3O9VsbOFith1QMhTBuivUQW0M0wMjsQynd83+cS+uW\n"
  67. "dKEft5Wu3zjgmbKRfo05KbayKJd6NXaVkg0rZbGBGde5UYu/K+nxtEv2RhoqGOZh\n"
  68. "qsLdHGS80pQ+Bms9yDOftCCBzn8H5dvwWkvk/vf3GVFHfGEXNWQ6yeHB5LTZ+dpB\n"
  69. "Rkjsqo3LPQca7QKCAQEAq8iCplIQ9IFfDHTEkSZXVN7M4vS6smBGHpYT2KJUHvnB\n"
  70. "2JYjao40ggcAypMsSdA2xqq76T5ni0mxuAQjNnobokInTYjIUIwqbcgdhhnHQ+Yp\n"
  71. "qsL/rese+tKFalPZGhRYhSbiEkNh/LXV79iZfnXfwmYpQVBZlfC6Vvv3zxXSduNT\n"
  72. "DVO9BOXfptT3mP+2IPm65GJR/2uSCUVwgzRDvmes6QoSja0wnhraKcs2Rov5oAfv\n"
  73. "R7yHrkG6dRDKpFA9/hH51lqzi5OfUIZSkaaE3GTNbA9JgOWif4PAwsMn+WcJbY9P\n"
  74. "xjPkcAhBZS/u2HjHEa2187b10VqYAiNWKpNNKHzFAQKCAQBPAuG1AmphDHF5pqez\n"
  75. "FLS4PrnirhDjqXzpHZ6vnjNZRkdSSIQT6FypvieltQDvGVUGzKfqbmp9icY8HX+S\n"
  76. "u4a/54s0aFWv/tq/T7rztrPpdYVUQQ1csOC8ouqOQfAYgNNYdLGL29kdbotiLUts\n"
  77. "rfJrhDJj1gAUuQGEadqnVhZPDCYL50cQAi7Q64WF6jVwINkGWMGTrNC0kaPPNHao\n"
  78. "AMylZbByp/QgngjDv7WIHVVZhXYBTByFhgDbx4amep03wZq3gt54y+KYl/phEYea\n"
  79. "08osIWBiyHRBEfkApzqY6bmMglddl8zh+kxWj62RUkmxN2oYsYhdBqDO+qKHL8dh\n"
  80. "8wixAoIBAQDUa2h9DVBe4TPg+/+UBCH8rGX6A7j07ufHuqWO7kv+A7rW03X+mbaX\n"
  81. "XYnvlWOTa9veZXKCbeC+eHFlahYSsa3/i94wLUhqtAZt2AwXoPYQgEXZn71Ntjs7\n"
  82. "KjNZ7FC9go72DmgB/j/lkWBCMRVVKXUJg8ZjsRmNkDzfrkwXJ7iBk4PFJn5EUPoq\n"
  83. "vHXgEbJLW+SGs3OUkV8x9OcdDey1p7ek7Xyuzh3EoloSxIwiyZzbUapDZ16iHDVK\n"
  84. "t67jHRtLrU8CFzMaYIOVHc3E0JsZ4wOlzdfgaoJff2muH9hgag0bfZdLyKtVPcw0\n"
  85. "ZXLHRNJloH4aoqAMpMIldWST/VRLB+Pn\n"
  86. "-----END PRIVATE KEY-----";
  87. const char certificate[] =
  88. "-----BEGIN CERTIFICATE-----\n"
  89. "MIIE/jCCAuagAwIBAgIJAKktAyUaaqdMMA0GCSqGSIb3DQEBCwUAMBQxEjAQBgNV\n"
  90. "BAMMCWxvY2FsaG9zdDAeFw0xODA3MjkwNTIyMzhaFw0yODA3MjYwNTIyMzhaMBQx\n"
  91. "EjAQBgNVBAMMCWxvY2FsaG9zdDCCAiIwDQYJKoZIhvcNAQEBBQADggIPADCCAgoC\n"
  92. "ggIBAMZZPIJo+7zPEsmmscgYZu7EL7V6BVvCHFSP7vyKTULCYEo5o+i7z8aJAmiv\n"
  93. "sIgj4KFaewoGTWT+CRkVFNrq5QErmTlOm4goVcki72vZY2Bz/89vh2yvHrnfQ+sj\n"
  94. "y1ka5zWGPWXRfE6rzrBbZmb4rmdz06ZnMsuzJs7ceWEI/Ok9HdWdnRIC2IL6jw6J\n"
  95. "q1AXVRcGsNpGTQ5M2AbEfQLVXWHlhD4vDCMOlrmapcy8NYhCdAvjrw5S3Ta9NqCY\n"
  96. "/joGmk3cGdvbNmphtsUrfmmCQdh3dCnKCVOSmkm/bh72s1CfUj6Y1ID9SG84IagT\n"
  97. "yhlPF9EBwV4QpUWIR+LwqULpKit6aa2SS5qXnqHnRmYUaRZSCbNoXsEE9Kmc7+Yf\n"
  98. "cAzLnQkFxgqzUWp0YXVdbJbfQLW/xwlXJd+Njm01uNcebngpK332Z7nH0xG5u5Ge\n"
  99. "kBlchJlzZIV9ke747HSnaADD2KE/gFE6oA31yKcOqqT4CnDMvjsDs3SWqoeDXQ9v\n"
  100. "FX6E2U9JBdi5qWPxS2fBv5CETvGMdMWdJ8HYejX7N65LvfLxWMQXU840VWBgbjhj\n"
  101. "x3ovzon4JiXSbh6E6qVMEIHgBmfFOU4tjh/6EJNuPXqeSgXrJomvu+mE9OwvQMiP\n"
  102. "YiQeqGfxOjtyZJ+fRd0zw7caBFTCY4OZ5+TwqH0czH/W4iydAgMBAAGjUzBRMB0G\n"
  103. "A1UdDgQWBBSPovbCDHE3rtOPd4V8x5dFWsvj9jAfBgNVHSMEGDAWgBSPovbCDHE3\n"
  104. "rtOPd4V8x5dFWsvj9jAPBgNVHRMBAf8EBTADAQH/MA0GCSqGSIb3DQEBCwUAA4IC\n"
  105. "AQAe3WAiEueLt3nNUBHQBlnQF8DRgtdXWuy/0wNWiXXqk59pzHyWo/RGaeFLU055\n"
  106. "l5WPkF2t/7cdVP4sPqYYBfWRLcVWBGLG6X+t7svqawq9z8rAv9Ok8LNnFLEdYYK7\n"
  107. "bqqbIQSneyJq7s31+FEyDWJMUMcWR2GFhNe1NVWUvSwvnkDrr7oFlcf9UA8yxxPL\n"
  108. "lydnOsLQxL9sgpbzvuWomFXORSXfQAkx6NWzVnlBzKG+ikZXWOt98M2Ufc58KHUP\n"
  109. "KfOebuPktoi2e7DKlRw5sl3zSNqqHDd3hMTRnW3foHG/dAki50P/lv2iCrrldUY8\n"
  110. "qAzV8Cvy4EyHOOi9GwDrGqqKeItAv0BWPk707rnqUq9bfB/w9gms/DUIL7Xk6C18\n"
  111. "7oR12ypWJvrgFlTH+x9fkN+S0sPw7BW3ycK3dBpzCn8lhpOs8ScALBcmPpjZLEXK\n"
  112. "4+Q+g01hzFZUT6NJvIq4V4xxkiklrNXmbTNhxuzju5iKJE7C+Vq4pVMGEAfVZjdK\n"
  113. "xC7EUyKBXrM9oJQIC5pmRKxauXE1iuQ1YxqtD3LmETH8X7z/UT+1oPawHVWuLL39\n"
  114. "rS6424vBDc2LPk3EM2m8pXSU7wm2X9/QS1ba7DeGTS5Z3X90e78nbWgsT6WSFXPc\n"
  115. "0TVbmdKpoMAfw8u+1NAmY6DrpHRTUOzJ6bsjwi9pUbP79A==\n"
  116. "-----END CERTIFICATE-----";
  117. static void dummy_err_cb(void *cls, const char *err) {
  118. strcpy(cls, err);
  119. }
  120. static void dummy_httpreq_cb(void *cls, struct sg_httpreq *req,
  121. struct sg_httpres *res) {
  122. (void) cls;
  123. (void) req;
  124. (void) res;
  125. }
  126. static void dummy_httpreq_err_cb(void *cls, const char *err) {
  127. (void) cls;
  128. (void) err;
  129. }
  130. static void dummy_httpreq_err_cpy_cb(void *cls, const char *err) {
  131. strcpy(cls, err);
  132. }
  133. static bool dummy_httpreq_httpauth_cb(void *cls, struct sg_httpauth *auth,
  134. struct sg_httpreq *req,
  135. struct sg_httpres *res) {
  136. (void) cls;
  137. (void) auth;
  138. (void) req;
  139. (void) res;
  140. return true;
  141. }
  142. static void dummy_httpsrv_cli_cb(void *cls, const void *client, bool *closed) {
  143. (void) cls;
  144. (void) client;
  145. (void) closed;
  146. }
  147. static int dummy_httpupld_cb(void *cls, void **handle, const char *dir,
  148. const char *field, const char *name,
  149. const char *mime, const char *encoding) {
  150. (void) cls;
  151. (void) handle;
  152. (void) dir;
  153. (void) field;
  154. (void) name;
  155. (void) mime;
  156. (void) encoding;
  157. return 0;
  158. }
  159. static ssize_t dummy_httpupld_write_cb(void *handle, uint64_t offset,
  160. const char *buf, size_t size) {
  161. (void) handle;
  162. (void) offset;
  163. (void) buf;
  164. (void) size;
  165. return 0;
  166. }
  167. static void dummy_httpupld_free_cb(void *handle) {
  168. (void) handle;
  169. }
  170. static int dummy_httpupld_save_cb(void *handle, bool overwritten) {
  171. (void) handle;
  172. (void) overwritten;
  173. return 0;
  174. }
  175. static int dummy_httpupld_save_as_cb(void *handle, const char *path,
  176. bool overwritten) {
  177. (void) handle;
  178. (void) path;
  179. (void) overwritten;
  180. return 0;
  181. }
  182. static void test__httpsrv_oel(const char *fmt, ...) {
  183. struct sg_httpsrv *srv;
  184. char err[256];
  185. va_list ap;
  186. srv = sg_httpsrv_new2(dummy_httpreq_httpauth_cb, dummy_httpreq_cb,
  187. dummy_httpreq_err_cpy_cb, err);
  188. ASSERT(srv);
  189. va_start(ap, fmt);
  190. memset(err, 0, sizeof(err));
  191. sg__httpsrv_oel(srv, fmt, ap);
  192. va_end(ap);
  193. ASSERT(strcmp(err, "abc123") == 0);
  194. sg_httpsrv_free(srv);
  195. }
  196. static void test__httpsrv_ahc(struct sg_httpsrv *srv) {
  197. struct sg_httpreq *req = NULL;
  198. size_t size = 0;
  199. ASSERT(sg__httpsrv_ahc(srv, NULL, "abc", "def", "ghi", NULL, &size,
  200. (void **) &req) == MHD_YES);
  201. ASSERT(sg__httpsrv_ahc(srv, NULL, "abc", "def", "ghi", NULL, &size,
  202. (void **) &req) == MHD_NO);
  203. ASSERT(req);
  204. sg__httpreq_free(req);
  205. }
  206. static void test__httpsrv_rcc(void) {
  207. struct sg_httpsrv *srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  208. struct sg_httpreq *req = sg__httpreq_new(srv, NULL, NULL, NULL, NULL);
  209. sg_httpsrv_free(srv);
  210. sg__httpsrv_rcc(NULL, NULL, (void **) &req,
  211. MHD_REQUEST_TERMINATED_COMPLETED_OK);
  212. ASSERT(!req);
  213. }
  214. static void test__httpsrv_addopt(void) {
  215. struct MHD_OptionItem ops[8];
  216. unsigned char pos = 0;
  217. int dummy = 123;
  218. memset(ops, 0, sizeof(ops));
  219. sg__httpsrv_addopt(ops, &pos, MHD_OPTION_EXTERNAL_LOGGER, 456, &dummy);
  220. ASSERT(ops[0].option == MHD_OPTION_EXTERNAL_LOGGER);
  221. ASSERT(ops[0].value == 456);
  222. ASSERT(*((int *) ops[0].ptr_value) == 123);
  223. ASSERT(pos == 1);
  224. dummy = 321;
  225. sg__httpsrv_addopt(ops, &pos, MHD_OPTION_NOTIFY_COMPLETED, 789, &dummy);
  226. ASSERT(ops[1].option == MHD_OPTION_NOTIFY_COMPLETED);
  227. ASSERT(ops[1].value == 789);
  228. ASSERT(*((int *) ops[1].ptr_value) == 321);
  229. ASSERT(pos == 2);
  230. sg__httpsrv_addopt(ops, &pos, MHD_OPTION_END, 0, NULL);
  231. ASSERT(ops[2].option == MHD_OPTION_END);
  232. ASSERT(ops[2].value == 0);
  233. ASSERT(!ops[2].ptr_value);
  234. }
  235. static void test__httpsrv_eprintf(void) {
  236. char err[256], str[256];
  237. struct sg_httpsrv *srv =
  238. sg_httpsrv_new2(NULL, dummy_httpreq_cb, dummy_err_cb, err);
  239. memset(err, 0, sizeof(err));
  240. sg__httpsrv_eprintf(srv, "%s%d", "abc", 123);
  241. memset(str, 0, sizeof(str));
  242. snprintf(str, sizeof(str), "abc123");
  243. ASSERT(strcmp(err, str) == 0);
  244. sg_httpsrv_free(srv);
  245. }
  246. static void test_httpsrv_new2(void) {
  247. struct sg_httpsrv *srv;
  248. int dummy = 0;
  249. char *tmp;
  250. errno = 0;
  251. ASSERT(!sg_httpsrv_new2(dummy_httpreq_httpauth_cb, NULL, dummy_httpreq_err_cb,
  252. &dummy));
  253. ASSERT(errno == EINVAL);
  254. errno = 0;
  255. ASSERT(!sg_httpsrv_new2(dummy_httpreq_httpauth_cb, dummy_httpreq_cb, NULL,
  256. &dummy));
  257. ASSERT(errno == EINVAL);
  258. srv = sg_httpsrv_new2(dummy_httpreq_httpauth_cb, dummy_httpreq_cb,
  259. dummy_httpreq_err_cb, &dummy);
  260. ASSERT(srv);
  261. ASSERT(srv->auth_cb == dummy_httpreq_httpauth_cb);
  262. ASSERT(srv->req_cb == dummy_httpreq_cb);
  263. ASSERT(srv->err_cb == dummy_httpreq_err_cb);
  264. ASSERT(srv->cls == &dummy);
  265. ASSERT(srv->upld_cb == sg__httpupld_cb);
  266. ASSERT(srv->upld_cls == srv);
  267. ASSERT(srv->upld_write_cb == sg__httpupld_write_cb);
  268. ASSERT(srv->upld_free_cb == sg__httpupld_free_cb);
  269. ASSERT(srv->upld_save_cb == sg__httpupld_save_cb);
  270. ASSERT(srv->upld_save_as_cb == sg__httpupld_save_as_cb);
  271. tmp = sg_tmpdir();
  272. ASSERT(strcmp(srv->uplds_dir, tmp) == 0);
  273. sg_free(tmp);
  274. #ifdef __arm__
  275. ASSERT(srv->post_buf_size == 1024);
  276. ASSERT(srv->payld_limit == 1048576);
  277. ASSERT(srv->uplds_limit == 16777216);
  278. #else /* __arm__ */
  279. ASSERT(srv->post_buf_size == 4096);
  280. ASSERT(srv->payld_limit == 4194304);
  281. ASSERT(srv->uplds_limit == 67108864);
  282. #endif /* __arm__ */
  283. sg_httpsrv_free(srv);
  284. }
  285. static void test_httpsrv_new(void) {
  286. struct sg_httpsrv *srv;
  287. int dummy = 0;
  288. errno = 0;
  289. ASSERT(!sg_httpsrv_new(NULL, &dummy));
  290. ASSERT(errno == EINVAL);
  291. errno = 0;
  292. srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  293. ASSERT(srv);
  294. ASSERT(errno == 0);
  295. sg_httpsrv_free(srv);
  296. errno = 0;
  297. srv = sg_httpsrv_new(dummy_httpreq_cb, &dummy);
  298. ASSERT(srv);
  299. ASSERT(errno == 0);
  300. sg_httpsrv_free(srv);
  301. }
  302. static void test_httpsrv_free(void) {
  303. sg_httpsrv_free(NULL);
  304. }
  305. static void test_httpsrv_listen(struct sg_httpsrv *srv) {
  306. struct sg_httpsrv *dummy_srv;
  307. errno = 0;
  308. ASSERT(!sg_httpsrv_listen(NULL, TEST_HTTPSRV_PORT, true));
  309. ASSERT(errno == EINVAL);
  310. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  311. dummy_srv->upld_cb = NULL;
  312. errno = 0;
  313. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  314. ASSERT(errno == EINVAL);
  315. sg_httpsrv_free(dummy_srv);
  316. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  317. dummy_srv->upld_write_cb = NULL;
  318. errno = 0;
  319. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  320. ASSERT(errno == EINVAL);
  321. sg_httpsrv_free(dummy_srv);
  322. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  323. dummy_srv->upld_save_cb = NULL;
  324. errno = 0;
  325. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  326. ASSERT(errno == EINVAL);
  327. sg_httpsrv_free(dummy_srv);
  328. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  329. dummy_srv->upld_save_as_cb = NULL;
  330. errno = 0;
  331. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  332. ASSERT(errno == EINVAL);
  333. sg_httpsrv_free(dummy_srv);
  334. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  335. sg_free(dummy_srv->uplds_dir);
  336. dummy_srv->uplds_dir = NULL;
  337. errno = 0;
  338. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  339. ASSERT(errno == EINVAL);
  340. sg_httpsrv_free(dummy_srv);
  341. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  342. dummy_srv->post_buf_size = 255;
  343. errno = 0;
  344. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  345. ASSERT(errno == EINVAL);
  346. sg_httpsrv_free(dummy_srv);
  347. ASSERT(sg_httpsrv_listen(srv, 0, true));
  348. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  349. ASSERT(sg_httpsrv_listen(srv, TEST_HTTPSRV_PORT, false));
  350. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  351. MHD_USE_DUAL_STACK);
  352. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  353. MHD_USE_ERROR_LOG);
  354. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  355. MHD_USE_AUTO_INTERNAL_THREAD);
  356. ASSERT(!(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  357. MHD_USE_THREAD_PER_CONNECTION));
  358. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  359. ASSERT(sg_httpsrv_listen(srv, TEST_HTTPSRV_PORT, true));
  360. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  361. MHD_USE_DUAL_STACK);
  362. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  363. MHD_USE_ERROR_LOG);
  364. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  365. MHD_USE_AUTO_INTERNAL_THREAD);
  366. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  367. MHD_USE_THREAD_PER_CONNECTION);
  368. #ifdef __linux__
  369. dummy_srv =
  370. sg_httpsrv_new2(NULL, dummy_httpreq_cb, dummy_httpreq_err_cb, NULL);
  371. errno = 0;
  372. ASSERT(!sg_httpsrv_listen(dummy_srv, TEST_HTTPSRV_PORT, true));
  373. ASSERT(errno == EADDRINUSE);
  374. sg_httpsrv_free(dummy_srv);
  375. #endif /* __linux__ */
  376. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  377. }
  378. #ifdef SG_HTTPS_SUPPORT
  379. static void test_httpsrv_tls_listen(struct sg_httpsrv *srv) {
  380. struct sg_httpsrv *dummy_srv;
  381. errno = 0;
  382. ASSERT(!sg_httpsrv_tls_listen(NULL, private_key, certificate,
  383. TEST_HTTPSRV_PORT, true));
  384. ASSERT(errno == EINVAL);
  385. errno = 0;
  386. ASSERT(
  387. !sg_httpsrv_tls_listen(srv, NULL, certificate, TEST_HTTPSRV_PORT, true));
  388. ASSERT(errno == EINVAL);
  389. errno = 0;
  390. ASSERT(
  391. !sg_httpsrv_tls_listen(srv, private_key, NULL, TEST_HTTPSRV_PORT, true));
  392. ASSERT(errno == EINVAL);
  393. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  394. dummy_srv->upld_cb = NULL;
  395. errno = 0;
  396. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  397. TEST_HTTPSRV_PORT, true));
  398. ASSERT(errno == EINVAL);
  399. sg_httpsrv_free(dummy_srv);
  400. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  401. dummy_srv->upld_write_cb = NULL;
  402. errno = 0;
  403. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  404. TEST_HTTPSRV_PORT, true));
  405. ASSERT(errno == EINVAL);
  406. sg_httpsrv_free(dummy_srv);
  407. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  408. dummy_srv->upld_save_cb = NULL;
  409. errno = 0;
  410. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  411. TEST_HTTPSRV_PORT, true));
  412. ASSERT(errno == EINVAL);
  413. sg_httpsrv_free(dummy_srv);
  414. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  415. dummy_srv->upld_save_as_cb = NULL;
  416. errno = 0;
  417. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  418. TEST_HTTPSRV_PORT, true));
  419. ASSERT(errno == EINVAL);
  420. sg_httpsrv_free(dummy_srv);
  421. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  422. sg_free(dummy_srv->uplds_dir);
  423. dummy_srv->uplds_dir = NULL;
  424. errno = 0;
  425. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  426. TEST_HTTPSRV_PORT, true));
  427. ASSERT(errno == EINVAL);
  428. sg_httpsrv_free(dummy_srv);
  429. dummy_srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  430. dummy_srv->post_buf_size = 255;
  431. errno = 0;
  432. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  433. TEST_HTTPSRV_PORT, true));
  434. ASSERT(errno == EINVAL);
  435. sg_httpsrv_free(dummy_srv);
  436. ASSERT(sg_httpsrv_tls_listen(srv, private_key, certificate, 0, true));
  437. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  438. ASSERT(sg_httpsrv_tls_listen(srv, private_key, certificate, TEST_HTTPSRV_PORT,
  439. false));
  440. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  441. MHD_USE_DUAL_STACK);
  442. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  443. MHD_USE_ERROR_LOG);
  444. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  445. MHD_USE_AUTO_INTERNAL_THREAD);
  446. ASSERT(!(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  447. MHD_USE_THREAD_PER_CONNECTION));
  448. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  449. MHD_USE_TLS);
  450. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  451. ASSERT(sg_httpsrv_tls_listen(srv, private_key, certificate, TEST_HTTPSRV_PORT,
  452. true));
  453. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  454. MHD_USE_DUAL_STACK);
  455. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  456. MHD_USE_ERROR_LOG);
  457. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  458. MHD_USE_AUTO_INTERNAL_THREAD);
  459. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  460. MHD_USE_THREAD_PER_CONNECTION);
  461. ASSERT(MHD_get_daemon_info(srv->handle, MHD_DAEMON_INFO_FLAGS)->flags &
  462. MHD_USE_TLS);
  463. #ifdef __linux__
  464. dummy_srv =
  465. sg_httpsrv_new2(NULL, dummy_httpreq_cb, dummy_httpreq_err_cb, NULL);
  466. errno = 0;
  467. ASSERT(!sg_httpsrv_tls_listen(dummy_srv, private_key, certificate,
  468. TEST_HTTPSRV_PORT, true));
  469. ASSERT(errno == EADDRINUSE);
  470. sg_httpsrv_free(dummy_srv);
  471. #endif /* __linux__ */
  472. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  473. ASSERT(sg_httpsrv_listen(srv, 0, false));
  474. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  475. }
  476. static void test_httpsrv_tls_listen2(struct sg_httpsrv *srv) {
  477. errno = 0;
  478. ASSERT(!sg_httpsrv_tls_listen2(srv, NULL, "", "", "", "", TEST_HTTPSRV_PORT,
  479. false));
  480. ASSERT(errno == EINVAL);
  481. errno = 0;
  482. ASSERT(!sg_httpsrv_tls_listen2(srv, "", "", NULL, "", "", TEST_HTTPSRV_PORT,
  483. false));
  484. ASSERT(errno == EINVAL);
  485. }
  486. static void test_httpsrv_tls_listen3(struct sg_httpsrv *srv) {
  487. errno = 0;
  488. ASSERT(!sg_httpsrv_tls_listen3(srv, NULL, "", "", "", "", "",
  489. TEST_HTTPSRV_PORT, false));
  490. ASSERT(errno == EINVAL);
  491. errno = 0;
  492. ASSERT(!sg_httpsrv_tls_listen3(srv, "", "", NULL, "", "", "",
  493. TEST_HTTPSRV_PORT, false));
  494. ASSERT(errno == EINVAL);
  495. }
  496. #endif /* SG_HTTPS_SUPPORT */
  497. static void test_httpsrv_shutdown(struct sg_httpsrv *srv) {
  498. ASSERT(sg_httpsrv_shutdown(NULL) == EINVAL);
  499. ASSERT(sg_httpsrv_listen(srv, 0, false));
  500. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  501. ASSERT(!srv->handle);
  502. ASSERT(sg_httpsrv_shutdown(srv) == EALREADY);
  503. ASSERT(sg_httpsrv_listen(srv, TEST_HTTPSRV_PORT, true));
  504. }
  505. static void test_httpsrv_port(struct sg_httpsrv *srv) {
  506. void *saved_handle;
  507. errno = 0;
  508. ASSERT(sg_httpsrv_port(NULL) == 0);
  509. ASSERT(errno == EINVAL);
  510. saved_handle = srv->handle;
  511. srv->handle = NULL;
  512. errno = 0;
  513. ASSERT(sg_httpsrv_port(srv) == 0);
  514. ASSERT(errno == 0);
  515. srv->handle = saved_handle;
  516. errno = 0;
  517. ASSERT(sg_httpsrv_port(srv) == TEST_HTTPSRV_PORT);
  518. ASSERT(errno == 0);
  519. }
  520. static void test_httpsrv_is_threaded(struct sg_httpsrv *srv) {
  521. void *saved_handle;
  522. errno = 0;
  523. ASSERT(!sg_httpsrv_is_threaded(NULL));
  524. ASSERT(errno == EINVAL);
  525. errno = 0;
  526. saved_handle = srv->handle;
  527. srv->handle = NULL;
  528. errno = 0;
  529. ASSERT(!sg_httpsrv_is_threaded(srv));
  530. ASSERT(errno == 0);
  531. srv->handle = saved_handle;
  532. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  533. ASSERT(sg_httpsrv_listen(srv, TEST_HTTPSRV_PORT, false));
  534. errno = 0;
  535. ASSERT(!sg_httpsrv_is_threaded(srv));
  536. ASSERT(errno == 0);
  537. ASSERT(sg_httpsrv_shutdown(srv) == 0);
  538. ASSERT(sg_httpsrv_listen(srv, TEST_HTTPSRV_PORT, true));
  539. errno = 0;
  540. ASSERT(sg_httpsrv_is_threaded(srv));
  541. ASSERT(errno == 0);
  542. }
  543. static void test__httpsrv_set_cli_cb(struct sg_httpsrv *srv) {
  544. int dummy = 123;
  545. ASSERT(sg_httpsrv_set_cli_cb(NULL, dummy_httpsrv_cli_cb, &dummy) == EINVAL);
  546. ASSERT(sg_httpsrv_set_cli_cb(srv, NULL, &dummy) == EINVAL);
  547. ASSERT(sg_httpsrv_set_cli_cb(srv, dummy_httpsrv_cli_cb, &dummy) == 0);
  548. ASSERT(srv->cli_cb == dummy_httpsrv_cli_cb);
  549. ASSERT(*((int *) srv->cli_cls) == 123);
  550. }
  551. static void test__httpsrv_set_upld_cbs(struct sg_httpsrv *srv) {
  552. int dummy = 123;
  553. ASSERT(sg_httpsrv_set_upld_cbs(NULL, dummy_httpupld_cb, &dummy,
  554. dummy_httpupld_write_cb,
  555. dummy_httpupld_free_cb, dummy_httpupld_save_cb,
  556. dummy_httpupld_save_as_cb) == EINVAL);
  557. ASSERT(sg_httpsrv_set_upld_cbs(srv, NULL, &dummy, dummy_httpupld_write_cb,
  558. dummy_httpupld_free_cb, dummy_httpupld_save_cb,
  559. dummy_httpupld_save_as_cb) == EINVAL);
  560. ASSERT(sg_httpsrv_set_upld_cbs(srv, dummy_httpupld_cb, &dummy, NULL,
  561. dummy_httpupld_free_cb, dummy_httpupld_save_cb,
  562. dummy_httpupld_save_as_cb) == EINVAL);
  563. ASSERT(sg_httpsrv_set_upld_cbs(
  564. srv, dummy_httpupld_cb, &dummy, dummy_httpupld_write_cb,
  565. dummy_httpupld_free_cb, NULL, dummy_httpupld_save_as_cb) == EINVAL);
  566. ASSERT(sg_httpsrv_set_upld_cbs(
  567. srv, dummy_httpupld_cb, &dummy, dummy_httpupld_write_cb,
  568. dummy_httpupld_free_cb, dummy_httpupld_save_cb, NULL) == EINVAL);
  569. ASSERT(sg_httpsrv_set_upld_cbs(srv, dummy_httpupld_cb, &dummy,
  570. dummy_httpupld_write_cb,
  571. dummy_httpupld_free_cb, dummy_httpupld_save_cb,
  572. dummy_httpupld_save_as_cb) == 0);
  573. ASSERT(srv->upld_cb == dummy_httpupld_cb);
  574. ASSERT(srv->upld_write_cb == dummy_httpupld_write_cb);
  575. ASSERT(srv->upld_write_cb == dummy_httpupld_write_cb);
  576. ASSERT(srv->upld_free_cb == dummy_httpupld_free_cb);
  577. ASSERT(srv->upld_save_cb == dummy_httpupld_save_cb);
  578. ASSERT(srv->upld_save_as_cb == dummy_httpupld_save_as_cb);
  579. ASSERT(*((int *) srv->upld_cls) == 123);
  580. }
  581. static void test_httpsrv_set_upld_dir(struct sg_httpsrv *srv) {
  582. ASSERT(sg_httpsrv_set_upld_dir(NULL, "foo") == EINVAL);
  583. ASSERT(sg_httpsrv_set_upld_dir(srv, NULL) == EINVAL);
  584. ASSERT(sg_httpsrv_set_upld_dir(srv, "foo") == 0);
  585. }
  586. static void test_httpsrv_upld_dir(struct sg_httpsrv *srv) {
  587. errno = 0;
  588. ASSERT(!sg_httpsrv_upld_dir(NULL));
  589. ASSERT(errno == EINVAL);
  590. ASSERT(sg_httpsrv_set_upld_dir(srv, "foo") == 0);
  591. errno = 0;
  592. ASSERT(strcmp(sg_httpsrv_upld_dir(srv), "foo") == 0);
  593. ASSERT(errno == 0);
  594. }
  595. static void test_httpsrv_set_post_buf_size(struct sg_httpsrv *srv) {
  596. ASSERT(sg_httpsrv_set_post_buf_size(NULL, 256) == EINVAL);
  597. ASSERT(sg_httpsrv_set_post_buf_size(srv, 255) == EINVAL);
  598. ASSERT(sg_httpsrv_set_post_buf_size(srv, 256) == 0);
  599. }
  600. static void test_httpsrv_post_buf_size(struct sg_httpsrv *srv) {
  601. errno = 0;
  602. ASSERT(sg_httpsrv_post_buf_size(NULL) == 0);
  603. ASSERT(errno == EINVAL);
  604. ASSERT(sg_httpsrv_set_post_buf_size(srv, 256) == 0);
  605. errno = 0;
  606. ASSERT(sg_httpsrv_post_buf_size(srv) == 256);
  607. ASSERT(errno == 0);
  608. }
  609. static void test_httpsrv_set_payld_limit(struct sg_httpsrv *srv) {
  610. ASSERT(sg_httpsrv_set_payld_limit(NULL, 123) == EINVAL);
  611. ASSERT(sg_httpsrv_set_payld_limit(srv, 0) == 0);
  612. ASSERT(sg_httpsrv_set_payld_limit(srv, 123) == 0);
  613. }
  614. static void test_httpsrv_payld_limit(struct sg_httpsrv *srv) {
  615. errno = 0;
  616. ASSERT(sg_httpsrv_payld_limit(NULL) == 0);
  617. ASSERT(errno == EINVAL);
  618. ASSERT(sg_httpsrv_set_payld_limit(srv, 123) == 0);
  619. errno = 0;
  620. ASSERT(sg_httpsrv_payld_limit(srv) == 123);
  621. ASSERT(errno == 0);
  622. }
  623. static void test_httpsrv_set_uplds_limit(struct sg_httpsrv *srv) {
  624. ASSERT(sg_httpsrv_set_uplds_limit(NULL, 123) == EINVAL);
  625. ASSERT(sg_httpsrv_set_uplds_limit(srv, 0) == 0);
  626. ASSERT(sg_httpsrv_set_uplds_limit(srv, 123) == 0);
  627. }
  628. static void test_httpsrv_uplds_limit(struct sg_httpsrv *srv) {
  629. errno = 0;
  630. ASSERT(sg_httpsrv_uplds_limit(NULL) == 0);
  631. ASSERT(errno == EINVAL);
  632. ASSERT(sg_httpsrv_set_uplds_limit(srv, 123) == 0);
  633. errno = 0;
  634. ASSERT(sg_httpsrv_uplds_limit(srv) == 123);
  635. ASSERT(errno == 0);
  636. }
  637. static void test_httpsrv_set_thr_pool_size(struct sg_httpsrv *srv) {
  638. ASSERT(sg_httpsrv_set_thr_pool_size(NULL, 123) == EINVAL);
  639. ASSERT(sg_httpsrv_set_thr_pool_size(srv, 0) == 0);
  640. ASSERT(sg_httpsrv_set_thr_pool_size(srv, 123) == 0);
  641. }
  642. static void test_httpsrv_thr_pool_size(struct sg_httpsrv *srv) {
  643. errno = 0;
  644. ASSERT(sg_httpsrv_thr_pool_size(NULL) == 0);
  645. ASSERT(errno == EINVAL);
  646. ASSERT(sg_httpsrv_set_thr_pool_size(srv, 123) == 0);
  647. errno = 0;
  648. ASSERT(sg_httpsrv_thr_pool_size(srv) == 123);
  649. ASSERT(errno == 0);
  650. }
  651. static void test_httpsrv_set_con_timeout(struct sg_httpsrv *srv) {
  652. ASSERT(sg_httpsrv_set_con_timeout(NULL, 123) == EINVAL);
  653. ASSERT(sg_httpsrv_set_con_timeout(srv, 0) == 0);
  654. ASSERT(sg_httpsrv_set_con_timeout(srv, 123) == 0);
  655. }
  656. static void test_httpsrv_con_timeout(struct sg_httpsrv *srv) {
  657. errno = 0;
  658. ASSERT(sg_httpsrv_con_timeout(NULL) == 0);
  659. ASSERT(errno == EINVAL);
  660. ASSERT(sg_httpsrv_set_con_timeout(srv, 123) == 0);
  661. errno = 0;
  662. ASSERT(sg_httpsrv_con_timeout(srv) == 123);
  663. ASSERT(errno == 0);
  664. }
  665. static void test_httpsrv_set_con_limit(struct sg_httpsrv *srv) {
  666. ASSERT(sg_httpsrv_set_con_limit(NULL, 123) == EINVAL);
  667. ASSERT(sg_httpsrv_set_con_limit(srv, 0) == 0);
  668. ASSERT(sg_httpsrv_set_con_limit(srv, 123) == 0);
  669. }
  670. static void test_httpsrv_con_limit(struct sg_httpsrv *srv) {
  671. errno = 0;
  672. ASSERT(sg_httpsrv_con_limit(NULL) == 0);
  673. ASSERT(errno == EINVAL);
  674. ASSERT(sg_httpsrv_set_con_limit(srv, 123) == 0);
  675. errno = 0;
  676. ASSERT(sg_httpsrv_con_limit(srv) == 123);
  677. ASSERT(errno == 0);
  678. }
  679. static void test_httpsrv_handle(struct sg_httpsrv *srv) {
  680. void *fake_handle = (void *) 123;
  681. void *old_handle;
  682. errno = 0;
  683. ASSERT(sg_httpsrv_handle(NULL) == 0);
  684. ASSERT(errno == EINVAL);
  685. errno = 0;
  686. old_handle = srv->handle;
  687. srv->handle = fake_handle;
  688. ASSERT(sg_httpsrv_handle(srv) == fake_handle);
  689. ASSERT(errno == 0);
  690. srv->handle = old_handle;
  691. }
  692. int main(void) {
  693. struct sg_httpsrv *srv = sg_httpsrv_new(dummy_httpreq_cb, NULL);
  694. /* test__httperr_cb() */
  695. test__httpsrv_oel("%s%d", "abc", 123);
  696. test__httpsrv_ahc(srv);
  697. test__httpsrv_rcc();
  698. test__httpsrv_addopt();
  699. test__httpsrv_eprintf();
  700. test_httpsrv_new2();
  701. test_httpsrv_new();
  702. test_httpsrv_free();
  703. test_httpsrv_listen(srv);
  704. #ifdef SG_HTTPS_SUPPORT
  705. test_httpsrv_tls_listen(srv);
  706. test_httpsrv_tls_listen2(srv);
  707. test_httpsrv_tls_listen3(srv);
  708. #endif /* SG_HTTPS_SUPPORT */
  709. test_httpsrv_shutdown(srv);
  710. test_httpsrv_port(srv);
  711. test_httpsrv_is_threaded(srv);
  712. test__httpsrv_set_cli_cb(srv);
  713. test__httpsrv_set_upld_cbs(srv);
  714. test_httpsrv_set_upld_dir(srv);
  715. test_httpsrv_upld_dir(srv);
  716. test_httpsrv_set_post_buf_size(srv);
  717. test_httpsrv_post_buf_size(srv);
  718. test_httpsrv_set_payld_limit(srv);
  719. test_httpsrv_payld_limit(srv);
  720. test_httpsrv_set_uplds_limit(srv);
  721. test_httpsrv_uplds_limit(srv);
  722. test_httpsrv_set_thr_pool_size(srv);
  723. test_httpsrv_thr_pool_size(srv);
  724. test_httpsrv_set_con_timeout(srv);
  725. test_httpsrv_con_timeout(srv);
  726. test_httpsrv_set_con_limit(srv);
  727. test_httpsrv_con_limit(srv);
  728. test_httpsrv_handle(srv);
  729. sg_httpsrv_free(srv);
  730. return EXIT_SUCCESS;
  731. }