diff options
author | Bjorn Svensson <bjorn.a.svensson@est.tech> | 2022-10-14 17:11:40 +0200 |
---|---|---|
committer | GitHub <noreply@github.com> | 2022-10-14 08:11:40 -0700 |
commit | 3b15a04b5939fc85f5e134ed09eb5c9e1584bef1 (patch) | |
tree | 742c529f0cdb34615ce7dd2a1085fcc34f955b6d | |
parent | c245df9fb92fdb51b8255dc90a60eaf03b9846a0 (diff) |
Fixup of PR734: Coverage of hiredis.c (#1124)
Improve coverage (#734)
* Remove duplicate tests
- double covered by:
"Can parse RESP3 doubles"
- bool covered via:
"Can parse RESP3 bool"
* Make (connect) timeout in test config general
* Set error string in Unix connect with invalid timeout
Restructure testcase since redisConnectWithTimeout() and
redisConnectUnixWithTimeout() now behaves similar.
* Use quiet flag in lcov/genhtml instead of piping to /dev/null
* Fixup of redisCommandArgv test case
* Update test case to match what it covers
Use new test case info text since the previous one seemed copy&pasted.
The sought coverage was the handling of the parent-chaining
for a double object, which the test case now focuses on.
Co-authored-by: Ariel <ashtul@gmail.com>
-rw-r--r-- | Makefile | 3 | ||||
-rw-r--r-- | net.c | 2 | ||||
-rw-r--r-- | test.c | 60 |
3 files changed, 50 insertions, 15 deletions
@@ -338,7 +338,8 @@ coverage: gcov make check mkdir -p tmp/lcov lcov -d . -c --exclude '/usr*' -o tmp/lcov/hiredis.info - genhtml --legend -o tmp/lcov/report tmp/lcov/hiredis.info + lcov -q -l tmp/lcov/hiredis.info + genhtml --legend -q -o tmp/lcov/report tmp/lcov/hiredis.info noopt: $(MAKE) OPTIMIZATION="" @@ -238,6 +238,7 @@ static int redisContextTimeoutMsec(redisContext *c, long *result) /* Only use timeout when not NULL. */ if (timeout != NULL) { if (timeout->tv_usec > 1000000 || timeout->tv_sec > __MAX_MSEC) { + __redisSetError(c, REDIS_ERR_IO, "Invalid timeout specified"); *result = msec; return REDIS_ERR; } @@ -435,7 +436,6 @@ static int _redisContextConnectTcp(redisContext *c, const char *addr, int port, } if (redisContextTimeoutMsec(c, &timeout_msec) != REDIS_OK) { - __redisSetError(c, REDIS_ERR_IO, "Invalid timeout specified"); goto error; } @@ -35,11 +35,11 @@ enum connection_type { struct config { enum connection_type type; + struct timeval connect_timeout; struct { const char *host; int port; - struct timeval timeout; } tcp; struct { @@ -782,6 +782,20 @@ static void test_reply_reader(void) { !strcmp(((redisReply*)reply)->str,"3492890328409238509324850943850943825024385")); freeReplyObject(reply); redisReaderFree(reader); + + test("Can parse RESP3 doubles in an array: "); + reader = redisReaderCreate(); + redisReaderFeed(reader, "*1\r\n,3.14159265358979323846\r\n",31); + ret = redisReaderGetReply(reader,&reply); + test_cond(ret == REDIS_OK && + ((redisReply*)reply)->type == REDIS_REPLY_ARRAY && + ((redisReply*)reply)->elements == 1 && + ((redisReply*)reply)->element[0]->type == REDIS_REPLY_DOUBLE && + fabs(((redisReply*)reply)->element[0]->dval - 3.14159265358979323846) < 0.00000001 && + ((redisReply*)reply)->element[0]->len == 22 && + strcmp(((redisReply*)reply)->element[0]->str, "3.14159265358979323846") == 0); + freeReplyObject(reply); + redisReaderFree(reader); } static void test_free_null(void) { @@ -1141,6 +1155,13 @@ static void test_blocking_connection(struct config config) { strcasecmp(reply->element[1]->str,"pong") == 0); freeReplyObject(reply); + test("Send command by passing argc/argv: "); + const char *argv[3] = {"SET", "foo", "bar"}; + size_t argvlen[3] = {3, 3, 3}; + reply = redisCommandArgv(c,3,argv,argvlen); + test_cond(reply->type == REDIS_REPLY_STATUS); + freeReplyObject(reply); + /* Make sure passing NULL to redisGetReply is safe */ test("Can pass NULL to redisGetReply: "); assert(redisAppendCommand(c, "PING") == REDIS_OK); @@ -1287,22 +1308,34 @@ static void test_blocking_io_errors(struct config config) { static void test_invalid_timeout_errors(struct config config) { redisContext *c; - test("Set error when an invalid timeout usec value is given to redisConnectWithTimeout: "); + test("Set error when an invalid timeout usec value is used during connect: "); - config.tcp.timeout.tv_sec = 0; - config.tcp.timeout.tv_usec = 10000001; + config.connect_timeout.tv_sec = 0; + config.connect_timeout.tv_usec = 10000001; - c = redisConnectWithTimeout(config.tcp.host, config.tcp.port, config.tcp.timeout); + if (config.type == CONN_TCP || config.type == CONN_SSL) { + c = redisConnectWithTimeout(config.tcp.host, config.tcp.port, config.connect_timeout); + } else if(config.type == CONN_UNIX) { + c = redisConnectUnixWithTimeout(config.unix_sock.path, config.connect_timeout); + } else { + assert(NULL); + } test_cond(c->err == REDIS_ERR_IO && strcmp(c->errstr, "Invalid timeout specified") == 0); redisFree(c); - test("Set error when an invalid timeout sec value is given to redisConnectWithTimeout: "); + test("Set error when an invalid timeout sec value is used during connect: "); - config.tcp.timeout.tv_sec = (((LONG_MAX) - 999) / 1000) + 1; - config.tcp.timeout.tv_usec = 0; + config.connect_timeout.tv_sec = (((LONG_MAX) - 999) / 1000) + 1; + config.connect_timeout.tv_usec = 0; - c = redisConnectWithTimeout(config.tcp.host, config.tcp.port, config.tcp.timeout); + if (config.type == CONN_TCP || config.type == CONN_SSL) { + c = redisConnectWithTimeout(config.tcp.host, config.tcp.port, config.connect_timeout); + } else if(config.type == CONN_UNIX) { + c = redisConnectUnixWithTimeout(config.unix_sock.path, config.connect_timeout); + } else { + assert(NULL); + } test_cond(c->err == REDIS_ERR_IO && strcmp(c->errstr, "Invalid timeout specified") == 0); redisFree(c); @@ -2054,11 +2087,11 @@ static redisAsyncContext *do_aconnect(struct config config, astest_no testno) if (config.type == CONN_TCP) { options.type = REDIS_CONN_TCP; - options.connect_timeout = &config.tcp.timeout; + options.connect_timeout = &config.connect_timeout; REDIS_OPTIONS_SET_TCP(&options, config.tcp.host, config.tcp.port); } else if (config.type == CONN_SSL) { options.type = REDIS_CONN_TCP; - options.connect_timeout = &config.tcp.timeout; + options.connect_timeout = &config.connect_timeout; REDIS_OPTIONS_SET_TCP(&options, config.ssl.host, config.ssl.port); } else if (config.type == CONN_UNIX) { options.type = REDIS_CONN_UNIX; @@ -2120,7 +2153,7 @@ static void test_async_polling(struct config config) { /* timeout can only be simulated with network */ test("Async connect timeout: "); config.tcp.host = "192.168.254.254"; /* blackhole ip */ - config.tcp.timeout.tv_usec = 100000; + config.connect_timeout.tv_usec = 100000; c = do_aconnect(config, ASTEST_CONN_TIMEOUT); assert(c); assert(c->err == 0); @@ -2152,7 +2185,7 @@ static void test_async_polling(struct config config) { */ if (config.type == CONN_TCP || config.type == CONN_SSL) { test("Async PING/PONG after connect timeout: "); - config.tcp.timeout.tv_usec = 10000; /* 10ms */ + config.connect_timeout.tv_usec = 10000; /* 10ms */ c = do_aconnect(config, ASTEST_PINGPONG_TIMEOUT); while(astest.connected == 0) redisPollTick(c, 0.1); @@ -2284,6 +2317,7 @@ int main(int argc, char **argv) { test_blocking_connection(cfg); test_blocking_connection_timeouts(cfg); test_blocking_io_errors(cfg); + test_invalid_timeout_errors(cfg); if (throughput) test_throughput(cfg); } else { test_skipped(); |