This commit is contained in:
@@ -213,12 +213,12 @@ int restd_rest_handler(short event, restd_conn_t *conn)
|
||||
restd_hook_t *hook = (restd_hook_t *)obj.data;
|
||||
if (hook->cb)
|
||||
{
|
||||
// printf("==== ZOB call_hooks: method: %s - %s \n", hook->method, conn->method);
|
||||
// printf("==== call_hooks: path: %s - %s\n", hook->path, http->request.path);
|
||||
// printf("==== HOOK FOUND !!!!\n");
|
||||
printf("==== call_hooks: method: %s - %s \n", hook->method, conn->method);
|
||||
printf("==== call_hooks: path: %s - %s\n", hook->path, http->request.path);
|
||||
printf("==== HOOK FOUND !!!!\n");
|
||||
if ((hook->method == NULL) || (conn->method == NULL) || (strcmp(hook->method, conn->method) != 0))
|
||||
{
|
||||
// printf("==== Hook found but method failed -> next.\n");
|
||||
printf("==== Hook found but method failed -> next.\n");
|
||||
reason = RESTD_ERROR_METHOD_NOT_ALLOWED;
|
||||
continue;
|
||||
}
|
||||
|
||||
580
lib/tests/http-server.c
Normal file
580
lib/tests/http-server.c
Normal file
@@ -0,0 +1,580 @@
|
||||
/*
|
||||
A trivial static http webserver using Libevent's evhttp.
|
||||
This is not the best code in the world, and it does some fairly stupid stuff
|
||||
that you would never want to do in a production webserver. Caveat hackor!
|
||||
*/
|
||||
|
||||
/* Compatibility for possible missing IPv6 declarations */
|
||||
#include "../util-internal.h"
|
||||
|
||||
#include <stdio.h>
|
||||
#include <stdlib.h>
|
||||
#include <string.h>
|
||||
|
||||
#include <sys/types.h>
|
||||
#include <sys/stat.h>
|
||||
|
||||
#ifdef _WIN32
|
||||
#include <winsock2.h>
|
||||
#include <ws2tcpip.h>
|
||||
#include <windows.h>
|
||||
#include <getopt.h>
|
||||
#include <io.h>
|
||||
#include <fcntl.h>
|
||||
#ifndef S_ISDIR
|
||||
#define S_ISDIR(x) (((x) & S_IFMT) == S_IFDIR)
|
||||
#endif
|
||||
#else /* !_WIN32 */
|
||||
#include <sys/stat.h>
|
||||
#include <sys/socket.h>
|
||||
#include <fcntl.h>
|
||||
#include <unistd.h>
|
||||
#include <dirent.h>
|
||||
#endif /* _WIN32 */
|
||||
#include <signal.h>
|
||||
|
||||
#ifdef EVENT__HAVE_SYS_UN_H
|
||||
#include <sys/un.h>
|
||||
#endif
|
||||
#ifdef EVENT__HAVE_AFUNIX_H
|
||||
#include <afunix.h>
|
||||
#endif
|
||||
|
||||
#include <event2/event.h>
|
||||
#include <event2/http.h>
|
||||
#include <event2/listener.h>
|
||||
#include <event2/buffer.h>
|
||||
#include <event2/util.h>
|
||||
#include <event2/keyvalq_struct.h>
|
||||
|
||||
#ifdef _WIN32
|
||||
#include <event2/thread.h>
|
||||
#endif /* _WIN32 */
|
||||
|
||||
#ifdef EVENT__HAVE_NETINET_IN_H
|
||||
#include <netinet/in.h>
|
||||
# ifdef _XOPEN_SOURCE_EXTENDED
|
||||
# include <arpa/inet.h>
|
||||
# endif
|
||||
#endif
|
||||
|
||||
#ifdef _WIN32
|
||||
#ifndef stat
|
||||
#define stat _stat
|
||||
#endif
|
||||
#ifndef fstat
|
||||
#define fstat _fstat
|
||||
#endif
|
||||
#ifndef open
|
||||
#define open _open
|
||||
#endif
|
||||
#ifndef close
|
||||
#define close _close
|
||||
#endif
|
||||
#ifndef O_RDONLY
|
||||
#define O_RDONLY _O_RDONLY
|
||||
#endif
|
||||
#endif /* _WIN32 */
|
||||
|
||||
char uri_root[512];
|
||||
|
||||
static const struct table_entry {
|
||||
const char *extension;
|
||||
const char *content_type;
|
||||
} content_type_table[] = {
|
||||
{ "txt", "text/plain" },
|
||||
{ "c", "text/plain" },
|
||||
{ "h", "text/plain" },
|
||||
{ "html", "text/html" },
|
||||
{ "htm", "text/htm" },
|
||||
{ "css", "text/css" },
|
||||
{ "gif", "image/gif" },
|
||||
{ "jpg", "image/jpeg" },
|
||||
{ "jpeg", "image/jpeg" },
|
||||
{ "png", "image/png" },
|
||||
{ "pdf", "application/pdf" },
|
||||
{ "ps", "application/postscript" },
|
||||
{ NULL, NULL },
|
||||
};
|
||||
|
||||
struct options {
|
||||
int port;
|
||||
int iocp;
|
||||
int verbose;
|
||||
|
||||
int unlink;
|
||||
const char *unixsock;
|
||||
const char *docroot;
|
||||
};
|
||||
|
||||
/* Try to guess a good content-type for 'path' */
|
||||
static const char *
|
||||
guess_content_type(const char *path)
|
||||
{
|
||||
const char *last_period, *extension;
|
||||
const struct table_entry *ent;
|
||||
last_period = strrchr(path, '.');
|
||||
if (!last_period || strchr(last_period, '/'))
|
||||
goto not_found; /* no exension */
|
||||
extension = last_period + 1;
|
||||
for (ent = &content_type_table[0]; ent->extension; ++ent) {
|
||||
if (!evutil_ascii_strcasecmp(ent->extension, extension))
|
||||
return ent->content_type;
|
||||
}
|
||||
|
||||
not_found:
|
||||
return "application/misc";
|
||||
}
|
||||
|
||||
/* Callback used for the /dump URI, and for every non-GET request:
|
||||
* dumps all information to stdout and gives back a trivial 200 ok */
|
||||
static void
|
||||
dump_request_cb(struct evhttp_request *req, void *arg)
|
||||
{
|
||||
const char *cmdtype;
|
||||
struct evkeyvalq *headers;
|
||||
struct evkeyval *header;
|
||||
struct evbuffer *buf;
|
||||
|
||||
switch (evhttp_request_get_command(req)) {
|
||||
case EVHTTP_REQ_GET: cmdtype = "GET"; break;
|
||||
case EVHTTP_REQ_POST: cmdtype = "POST"; break;
|
||||
case EVHTTP_REQ_HEAD: cmdtype = "HEAD"; break;
|
||||
case EVHTTP_REQ_PUT: cmdtype = "PUT"; break;
|
||||
case EVHTTP_REQ_DELETE: cmdtype = "DELETE"; break;
|
||||
case EVHTTP_REQ_OPTIONS: cmdtype = "OPTIONS"; break;
|
||||
case EVHTTP_REQ_TRACE: cmdtype = "TRACE"; break;
|
||||
case EVHTTP_REQ_CONNECT: cmdtype = "CONNECT"; break;
|
||||
case EVHTTP_REQ_PATCH: cmdtype = "PATCH"; break;
|
||||
default: cmdtype = "unknown"; break;
|
||||
}
|
||||
|
||||
printf("Received a %s request for %s\nHeaders:\n",
|
||||
cmdtype, evhttp_request_get_uri(req));
|
||||
|
||||
headers = evhttp_request_get_input_headers(req);
|
||||
for (header = headers->tqh_first; header;
|
||||
header = header->next.tqe_next) {
|
||||
printf(" %s: %s\n", header->key, header->value);
|
||||
}
|
||||
|
||||
buf = evhttp_request_get_input_buffer(req);
|
||||
puts("Input data: <<<");
|
||||
while (evbuffer_get_length(buf)) {
|
||||
int n;
|
||||
char cbuf[128];
|
||||
n = evbuffer_remove(buf, cbuf, sizeof(cbuf));
|
||||
if (n > 0)
|
||||
(void) fwrite(cbuf, 1, n, stdout);
|
||||
}
|
||||
puts(">>>");
|
||||
|
||||
evhttp_send_reply(req, 200, "OK", NULL);
|
||||
}
|
||||
|
||||
/* This callback gets invoked when we get any http request that doesn't match
|
||||
* any other callback. Like any evhttp server callback, it has a simple job:
|
||||
* it must eventually call evhttp_send_error() or evhttp_send_reply().
|
||||
*/
|
||||
static void
|
||||
send_document_cb(struct evhttp_request *req, void *arg)
|
||||
{
|
||||
struct evbuffer *evb = NULL;
|
||||
struct options *o = arg;
|
||||
const char *uri = evhttp_request_get_uri(req);
|
||||
struct evhttp_uri *decoded = NULL;
|
||||
const char *path;
|
||||
char *decoded_path;
|
||||
char *whole_path = NULL;
|
||||
size_t len;
|
||||
int fd = -1;
|
||||
struct stat st;
|
||||
|
||||
if (evhttp_request_get_command(req) != EVHTTP_REQ_GET) {
|
||||
dump_request_cb(req, arg);
|
||||
return;
|
||||
}
|
||||
|
||||
printf("Got a GET request for <%s>\n", uri);
|
||||
|
||||
/* Decode the URI */
|
||||
decoded = evhttp_uri_parse(uri);
|
||||
if (!decoded) {
|
||||
printf("It's not a good URI. Sending BADREQUEST\n");
|
||||
evhttp_send_error(req, HTTP_BADREQUEST, 0);
|
||||
return;
|
||||
}
|
||||
|
||||
/* Let's see what path the user asked for. */
|
||||
path = evhttp_uri_get_path(decoded);
|
||||
if (!path) path = "/";
|
||||
|
||||
/* We need to decode it, to see what path the user really wanted. */
|
||||
decoded_path = evhttp_uridecode(path, 0, NULL);
|
||||
if (decoded_path == NULL)
|
||||
goto err;
|
||||
/* Don't allow any ".."s in the path, to avoid exposing stuff outside
|
||||
* of the docroot. This test is both overzealous and underzealous:
|
||||
* it forbids aceptable paths like "/this/one..here", but it doesn't
|
||||
* do anything to prevent symlink following." */
|
||||
if (strstr(decoded_path, ".."))
|
||||
goto err;
|
||||
|
||||
len = strlen(decoded_path)+strlen(o->docroot)+2;
|
||||
if (!(whole_path = malloc(len))) {
|
||||
perror("malloc");
|
||||
goto err;
|
||||
}
|
||||
evutil_snprintf(whole_path, len, "%s/%s", o->docroot, decoded_path);
|
||||
|
||||
if (stat(whole_path, &st)<0) {
|
||||
goto err;
|
||||
}
|
||||
|
||||
/* This holds the content we're sending. */
|
||||
evb = evbuffer_new();
|
||||
|
||||
if (S_ISDIR(st.st_mode)) {
|
||||
/* If it's a directory, read the comments and make a little
|
||||
* index page */
|
||||
#ifdef _WIN32
|
||||
HANDLE d;
|
||||
WIN32_FIND_DATAA ent;
|
||||
char *pattern;
|
||||
size_t dirlen;
|
||||
#else
|
||||
DIR *d;
|
||||
struct dirent *ent;
|
||||
#endif
|
||||
const char *trailing_slash = "";
|
||||
|
||||
if (!strlen(path) || path[strlen(path)-1] != '/')
|
||||
trailing_slash = "/";
|
||||
|
||||
#ifdef _WIN32
|
||||
dirlen = strlen(whole_path);
|
||||
pattern = malloc(dirlen+3);
|
||||
memcpy(pattern, whole_path, dirlen);
|
||||
pattern[dirlen] = '\\';
|
||||
pattern[dirlen+1] = '*';
|
||||
pattern[dirlen+2] = '\0';
|
||||
d = FindFirstFileA(pattern, &ent);
|
||||
free(pattern);
|
||||
if (d == INVALID_HANDLE_VALUE)
|
||||
goto err;
|
||||
#else
|
||||
if (!(d = opendir(whole_path)))
|
||||
goto err;
|
||||
#endif
|
||||
|
||||
evbuffer_add_printf(evb,
|
||||
"<!DOCTYPE html>\n"
|
||||
"<html>\n <head>\n"
|
||||
" <meta charset='utf-8'>\n"
|
||||
" <title>%s</title>\n"
|
||||
" <base href='%s%s'>\n"
|
||||
" </head>\n"
|
||||
" <body>\n"
|
||||
" <h1>%s</h1>\n"
|
||||
" <ul>\n",
|
||||
decoded_path, /* XXX html-escape this. */
|
||||
path, /* XXX html-escape this? */
|
||||
trailing_slash,
|
||||
decoded_path /* XXX html-escape this */);
|
||||
#ifdef _WIN32
|
||||
do {
|
||||
const char *name = ent.cFileName;
|
||||
#else
|
||||
while ((ent = readdir(d))) {
|
||||
const char *name = ent->d_name;
|
||||
#endif
|
||||
evbuffer_add_printf(evb,
|
||||
" <li><a href=\"%s\">%s</a>\n",
|
||||
name, name);/* XXX escape this */
|
||||
#ifdef _WIN32
|
||||
} while (FindNextFileA(d, &ent));
|
||||
#else
|
||||
}
|
||||
#endif
|
||||
evbuffer_add_printf(evb, "</ul></body></html>\n");
|
||||
#ifdef _WIN32
|
||||
FindClose(d);
|
||||
#else
|
||||
closedir(d);
|
||||
#endif
|
||||
evhttp_add_header(evhttp_request_get_output_headers(req),
|
||||
"Content-Type", "text/html");
|
||||
} else {
|
||||
/* Otherwise it's a file; add it to the buffer to get
|
||||
* sent via sendfile */
|
||||
const char *type = guess_content_type(decoded_path);
|
||||
if ((fd = open(whole_path, O_RDONLY)) < 0) {
|
||||
perror("open");
|
||||
goto err;
|
||||
}
|
||||
|
||||
if (fstat(fd, &st)<0) {
|
||||
/* Make sure the length still matches, now that we
|
||||
* opened the file :/ */
|
||||
perror("fstat");
|
||||
goto err;
|
||||
}
|
||||
evhttp_add_header(evhttp_request_get_output_headers(req),
|
||||
"Content-Type", type);
|
||||
evbuffer_add_file(evb, fd, 0, st.st_size);
|
||||
}
|
||||
|
||||
evhttp_send_reply(req, 200, "OK", evb);
|
||||
goto done;
|
||||
err:
|
||||
evhttp_send_error(req, HTTP_NOTFOUND, NULL);
|
||||
if (fd>=0)
|
||||
close(fd);
|
||||
done:
|
||||
if (decoded)
|
||||
evhttp_uri_free(decoded);
|
||||
if (decoded_path)
|
||||
free(decoded_path);
|
||||
if (whole_path)
|
||||
free(whole_path);
|
||||
if (evb)
|
||||
evbuffer_free(evb);
|
||||
}
|
||||
|
||||
static void
|
||||
print_usage(FILE *out, const char *prog, int exit_code)
|
||||
{
|
||||
fprintf(out,
|
||||
"Syntax: %s [ OPTS ] <docroot>\n"
|
||||
" -p - port\n"
|
||||
" -U - bind to unix socket\n"
|
||||
" -u - unlink unix socket before bind\n"
|
||||
" -I - IOCP\n"
|
||||
" -v - verbosity, enables libevent debug logging too\n", prog);
|
||||
exit(exit_code);
|
||||
}
|
||||
static struct options
|
||||
parse_opts(int argc, char **argv)
|
||||
{
|
||||
struct options o;
|
||||
int opt;
|
||||
|
||||
memset(&o, 0, sizeof(o));
|
||||
|
||||
while ((opt = getopt(argc, argv, "hp:U:uIv")) != -1) {
|
||||
switch (opt) {
|
||||
case 'p': o.port = atoi(optarg); break;
|
||||
case 'U': o.unixsock = optarg; break;
|
||||
case 'u': o.unlink = 1; break;
|
||||
case 'I': o.iocp = 1; break;
|
||||
case 'v': ++o.verbose; break;
|
||||
case 'h': print_usage(stdout, argv[0], 0); break;
|
||||
default : fprintf(stderr, "Unknown option %c\n", opt); break;
|
||||
}
|
||||
}
|
||||
|
||||
if (optind >= argc || (argc - optind) > 1) {
|
||||
print_usage(stdout, argv[0], 1);
|
||||
}
|
||||
o.docroot = argv[optind];
|
||||
|
||||
return o;
|
||||
}
|
||||
|
||||
static void
|
||||
do_term(int sig, short events, void *arg)
|
||||
{
|
||||
struct event_base *base = arg;
|
||||
event_base_loopbreak(base);
|
||||
fprintf(stderr, "Got %i, Terminating\n", sig);
|
||||
}
|
||||
|
||||
static int
|
||||
display_listen_sock(struct evhttp_bound_socket *handle)
|
||||
{
|
||||
struct sockaddr_storage ss;
|
||||
evutil_socket_t fd;
|
||||
ev_socklen_t socklen = sizeof(ss);
|
||||
char addrbuf[128];
|
||||
void *inaddr;
|
||||
const char *addr;
|
||||
int got_port = -1;
|
||||
|
||||
fd = evhttp_bound_socket_get_fd(handle);
|
||||
memset(&ss, 0, sizeof(ss));
|
||||
if (getsockname(fd, (struct sockaddr *)&ss, &socklen)) {
|
||||
perror("getsockname() failed");
|
||||
return 1;
|
||||
}
|
||||
|
||||
if (ss.ss_family == AF_INET) {
|
||||
got_port = ntohs(((struct sockaddr_in*)&ss)->sin_port);
|
||||
inaddr = &((struct sockaddr_in*)&ss)->sin_addr;
|
||||
} else if (ss.ss_family == AF_INET6) {
|
||||
got_port = ntohs(((struct sockaddr_in6*)&ss)->sin6_port);
|
||||
inaddr = &((struct sockaddr_in6*)&ss)->sin6_addr;
|
||||
}
|
||||
#ifdef EVENT__HAVE_STRUCT_SOCKADDR_UN
|
||||
else if (ss.ss_family == AF_UNIX) {
|
||||
printf("Listening on <%s>\n", ((struct sockaddr_un*)&ss)->sun_path);
|
||||
return 0;
|
||||
}
|
||||
#endif
|
||||
else {
|
||||
fprintf(stderr, "Weird address family %d\n",
|
||||
ss.ss_family);
|
||||
return 1;
|
||||
}
|
||||
|
||||
addr = evutil_inet_ntop(ss.ss_family, inaddr, addrbuf,
|
||||
sizeof(addrbuf));
|
||||
if (addr) {
|
||||
printf("Listening on %s:%d\n", addr, got_port);
|
||||
evutil_snprintf(uri_root, sizeof(uri_root),
|
||||
"http://%s:%d",addr,got_port);
|
||||
} else {
|
||||
fprintf(stderr, "evutil_inet_ntop failed\n");
|
||||
return 1;
|
||||
}
|
||||
|
||||
return 0;
|
||||
}
|
||||
|
||||
int
|
||||
main(int argc, char **argv)
|
||||
{
|
||||
struct event_config *cfg = NULL;
|
||||
struct event_base *base = NULL;
|
||||
struct evhttp *http = NULL;
|
||||
struct evhttp_bound_socket *handle = NULL;
|
||||
struct evconnlistener *lev = NULL;
|
||||
struct event *term = NULL;
|
||||
struct options o = parse_opts(argc, argv);
|
||||
int ret = 0;
|
||||
|
||||
#ifdef _WIN32
|
||||
{
|
||||
WORD wVersionRequested;
|
||||
WSADATA wsaData;
|
||||
wVersionRequested = MAKEWORD(2, 2);
|
||||
WSAStartup(wVersionRequested, &wsaData);
|
||||
}
|
||||
#else
|
||||
if (signal(SIGPIPE, SIG_IGN) == SIG_ERR) {
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
#endif
|
||||
|
||||
setbuf(stdout, NULL);
|
||||
setbuf(stderr, NULL);
|
||||
|
||||
/** Read env like in regress */
|
||||
if (o.verbose || getenv("EVENT_DEBUG_LOGGING_ALL"))
|
||||
event_enable_debug_logging(EVENT_DBG_ALL);
|
||||
|
||||
cfg = event_config_new();
|
||||
#ifdef _WIN32
|
||||
if (o.iocp) {
|
||||
#ifdef EVTHREAD_USE_WINDOWS_THREADS_IMPLEMENTED
|
||||
evthread_use_windows_threads();
|
||||
event_config_set_num_cpus_hint(cfg, 8);
|
||||
#endif
|
||||
event_config_set_flag(cfg, EVENT_BASE_FLAG_STARTUP_IOCP);
|
||||
}
|
||||
#endif
|
||||
|
||||
base = event_base_new_with_config(cfg);
|
||||
if (!base) {
|
||||
fprintf(stderr, "Couldn't create an event_base: exiting\n");
|
||||
ret = 1;
|
||||
}
|
||||
event_config_free(cfg);
|
||||
cfg = NULL;
|
||||
|
||||
/* Create a new evhttp object to handle requests. */
|
||||
http = evhttp_new(base);
|
||||
if (!http) {
|
||||
fprintf(stderr, "couldn't create evhttp. Exiting.\n");
|
||||
ret = 1;
|
||||
}
|
||||
|
||||
/* The /dump URI will dump all requests to stdout and say 200 ok. */
|
||||
evhttp_set_cb(http, "/dump", dump_request_cb, NULL);
|
||||
|
||||
/* We want to accept arbitrary requests, so we need to set a "generic"
|
||||
* cb. We can also add callbacks for specific paths. */
|
||||
evhttp_set_gencb(http, send_document_cb, &o);
|
||||
|
||||
if (o.unixsock) {
|
||||
#ifdef EVENT__HAVE_STRUCT_SOCKADDR_UN
|
||||
struct sockaddr_un addr;
|
||||
|
||||
if (o.unlink && (unlink(o.unixsock) && errno != ENOENT)) {
|
||||
perror(o.unixsock);
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
|
||||
addr.sun_family = AF_UNIX;
|
||||
strcpy(addr.sun_path, o.unixsock);
|
||||
|
||||
lev = evconnlistener_new_bind(base, NULL, NULL,
|
||||
LEV_OPT_CLOSE_ON_FREE, -1,
|
||||
(struct sockaddr *)&addr, sizeof(addr));
|
||||
if (!lev) {
|
||||
perror("Cannot create listener");
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
|
||||
handle = evhttp_bind_listener(http, lev);
|
||||
if (!handle) {
|
||||
fprintf(stderr, "couldn't bind to %s. Exiting.\n", o.unixsock);
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
#else /* !EVENT__HAVE_STRUCT_SOCKADDR_UN */
|
||||
fprintf(stderr, "-U is not supported on this platform. Exiting.\n");
|
||||
ret = 1;
|
||||
goto err;
|
||||
#endif /* EVENT__HAVE_STRUCT_SOCKADDR_UN */
|
||||
}
|
||||
else {
|
||||
handle = evhttp_bind_socket_with_handle(http, "0.0.0.0", o.port);
|
||||
if (!handle) {
|
||||
fprintf(stderr, "couldn't bind to port %d. Exiting.\n", o.port);
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
}
|
||||
|
||||
if (display_listen_sock(handle)) {
|
||||
ret = 1;
|
||||
goto err;
|
||||
}
|
||||
|
||||
term = evsignal_new(base, SIGINT, do_term, base);
|
||||
if (!term)
|
||||
goto err;
|
||||
if (event_add(term, NULL))
|
||||
goto err;
|
||||
|
||||
event_base_dispatch(base);
|
||||
|
||||
#ifdef _WIN32
|
||||
WSACleanup();
|
||||
#endif
|
||||
|
||||
err:
|
||||
if (cfg)
|
||||
event_config_free(cfg);
|
||||
if (http)
|
||||
evhttp_free(http);
|
||||
if (term)
|
||||
event_free(term);
|
||||
if (base)
|
||||
event_base_free(base);
|
||||
|
||||
return ret;
|
||||
}
|
||||
@@ -77,6 +77,7 @@ int my_success_rest_delete_handler(short event, restd_conn_t *conn, void *userda
|
||||
|
||||
int my_success_rest_put_handler(short event, restd_conn_t *conn, void *userdata)
|
||||
{
|
||||
printf("put event: %d\n", event);
|
||||
restd_http_response(conn, 200, "application/json", ksuccess_put_body, strlen(ksuccess_put_body));
|
||||
return RESTD_CLOSE; // Close connection.
|
||||
}
|
||||
@@ -115,7 +116,7 @@ size_t write_callback(void *ptr, size_t size, size_t nmemb, void *stream)
|
||||
|
||||
int exec_request(const char *request, const char *path, int expected_code, const char *expected_body)
|
||||
{
|
||||
int ret;
|
||||
int ret = 0;
|
||||
CURL *curl_handle;
|
||||
CURLcode res;
|
||||
char *body = NULL;
|
||||
@@ -150,7 +151,7 @@ int exec_request(const char *request, const char *path, int expected_code, const
|
||||
}
|
||||
|
||||
// Debug Only
|
||||
curl_easy_setopt(curl_handle, CURLOPT_VERBOSE, 1);
|
||||
//curl_easy_setopt(curl_handle, CURLOPT_VERBOSE, 1);
|
||||
|
||||
/* send all data to this function */
|
||||
curl_easy_setopt(curl_handle, CURLOPT_WRITEFUNCTION, write_callback);
|
||||
@@ -159,15 +160,25 @@ int exec_request(const char *request, const char *path, int expected_code, const
|
||||
|
||||
/* get it! */
|
||||
res = curl_easy_perform(curl_handle);
|
||||
if (res != CURLE_OK)
|
||||
{
|
||||
printf("Error: %d\n", res);
|
||||
}
|
||||
ASSERT_EQUAL_INT(res, CURLE_OK);
|
||||
|
||||
|
||||
curl_easy_getinfo(curl_handle, CURLINFO_RESPONSE_CODE, &http_result_code);
|
||||
ASSERT_EQUAL_INT(http_result_code, expected_code);
|
||||
|
||||
res = strcmp(expected_body, body);
|
||||
//printf ("body: %s != expected_body: %s\n", body, expected_body);
|
||||
if (res != 0)
|
||||
{
|
||||
ret = 2;
|
||||
goto exit;
|
||||
}
|
||||
ASSERT_EQUAL_INT(res, 0);
|
||||
|
||||
exit:
|
||||
free(body);
|
||||
|
||||
/* cleanup curl stuff */
|
||||
@@ -176,7 +187,7 @@ int exec_request(const char *request, const char *path, int expected_code, const
|
||||
/* we're done with libcurl, so clean it up */
|
||||
curl_global_cleanup();
|
||||
|
||||
return 0;
|
||||
return ret;
|
||||
}
|
||||
|
||||
/*--------------------------------------------------------------------------*/
|
||||
@@ -406,14 +417,17 @@ TEST("Rest - create start access rest hook free\t")
|
||||
|
||||
sleep(1);
|
||||
|
||||
PRINTLN("\n - GET");
|
||||
ret = exec_request(kget_method, "http://localhost:"kserver_port kapi_test_get, 200, ksuccess_get_body);
|
||||
ASSERT_EQUAL_INT(ret, 0);
|
||||
|
||||
PRINTLN("\n - DELETE");
|
||||
ret = exec_request(kdelete_method, "http://localhost:"kserver_port kapi_test_get, 200, ksuccess_delete_body);
|
||||
ASSERT_EQUAL_INT(ret, 0);
|
||||
|
||||
//ret = exec_request(kput_method, "http://localhost:"kserver_port kapi_test_get, 200, ksuccess_put_body);
|
||||
//ASSERT_EQUAL_INT(ret, 0);
|
||||
PRINTLN("\n - PUT");
|
||||
ret = exec_request(kput_method, "http://localhost:"kserver_port kapi_test_get, 200, ksuccess_put_body);
|
||||
ASSERT_EQUAL_INT(ret, 0);
|
||||
|
||||
// TODO POST
|
||||
|
||||
|
||||
Reference in New Issue
Block a user