2011-03-10 18:48:02 +08:00
|
|
|
/***************************************************************************
|
|
|
|
* _ _ ____ _
|
|
|
|
* Project ___| | | | _ \| |
|
|
|
|
* / __| | | | |_) | |
|
|
|
|
* | (__| |_| | _ <| |___
|
|
|
|
* \___|\___/|_| \_\_____|
|
|
|
|
*
|
2023-01-02 20:51:48 +08:00
|
|
|
* Copyright (C) Daniel Stenberg, <daniel@haxx.se>, et al.
|
2011-03-10 18:48:02 +08:00
|
|
|
*
|
|
|
|
* This software is licensed as described in the file COPYING, which
|
|
|
|
* you should have received as part of this distribution. The terms
|
2020-11-04 21:02:01 +08:00
|
|
|
* are also available at https://curl.se/docs/copyright.html.
|
2011-03-10 18:48:02 +08:00
|
|
|
*
|
|
|
|
* You may opt to use, copy, modify, merge, publish, distribute and/or sell
|
|
|
|
* copies of the Software, and permit persons to whom the Software is
|
|
|
|
* furnished to do so, under the terms of the COPYING file.
|
|
|
|
*
|
|
|
|
* This software is distributed on an "AS IS" basis, WITHOUT WARRANTY OF ANY
|
|
|
|
* KIND, either express or implied.
|
|
|
|
*
|
|
|
|
* SPDX-License-Identifier: curl
|
2022-05-17 17:16:50 +08:00
|
|
|
*
|
2011-03-10 18:48:02 +08:00
|
|
|
***************************************************************************/
|
2011-05-21 19:22:11 +08:00
|
|
|
#include "curlcheck.h"
|
2013-01-04 09:50:28 +08:00
|
|
|
#include "netrc.h"
|
2013-08-29 18:50:15 +08:00
|
|
|
#include "memdebug.h" /* LAST include file */
|
2011-02-08 14:12:37 +08:00
|
|
|
|
2023-08-17 20:36:05 +08:00
|
|
|
#ifndef CURL_DISABLE_NETRC
|
|
|
|
|
2024-09-02 20:46:00 +08:00
|
|
|
static char *s_login;
|
|
|
|
static char *s_password;
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
static CURLcode unit_setup(void)
|
|
|
|
{
|
2024-09-02 20:46:00 +08:00
|
|
|
s_password = strdup("");
|
|
|
|
s_login = strdup("");
|
|
|
|
if(!s_password || !s_login) {
|
|
|
|
Curl_safefree(s_password);
|
|
|
|
Curl_safefree(s_login);
|
2016-04-03 22:21:10 +08:00
|
|
|
return CURLE_OUT_OF_MEMORY;
|
2014-01-29 06:47:20 +08:00
|
|
|
}
|
2011-02-08 14:12:37 +08:00
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
|
|
|
|
static void unit_stop(void)
|
|
|
|
{
|
2024-09-02 20:46:00 +08:00
|
|
|
Curl_safefree(s_password);
|
|
|
|
Curl_safefree(s_login);
|
2011-02-08 14:12:37 +08:00
|
|
|
}
|
|
|
|
|
|
|
|
UNITTEST_START
|
|
|
|
int result;
|
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a non existent host in our netrc file.
|
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
result = Curl_parsenetrc("test.example.com", &s_login, &s_password, arg);
|
2011-02-08 14:12:37 +08:00
|
|
|
fail_unless(result == 1, "Host not found should return 1");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_password[0] == 0, "password should not have been changed");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_login[0] == 0, "login should not have been changed");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a non existent login in our netrc file.
|
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("me");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("example.com", &s_login, &s_password, arg);
|
2018-11-03 23:58:18 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_password[0] == 0, "password should not have been changed");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "me", 2) == 0,
|
2016-04-03 22:21:10 +08:00
|
|
|
"login should not have been changed");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a non existent login and host in our netrc file.
|
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("me");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("test.example.com", &s_login, &s_password, arg);
|
2018-11-03 23:58:18 +08:00
|
|
|
fail_unless(result == 1, "Host not found should return 1");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_password[0] == 0, "password should not have been changed");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "me", 2) == 0,
|
2016-04-03 22:21:10 +08:00
|
|
|
"login should not have been changed");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a non existent login (substring of an existing one) in our
|
|
|
|
* netrc file.
|
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("admi");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("example.com", &s_login, &s_password, arg);
|
2018-11-03 23:58:18 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_password[0] == 0, "password should not have been changed");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "admi", 4) == 0,
|
2016-04-03 22:21:10 +08:00
|
|
|
"login should not have been changed");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test a non existent login (superstring of an existing one)
|
|
|
|
* in our netrc file.
|
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("adminn");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("example.com", &s_login, &s_password, arg);
|
2018-11-03 23:58:18 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(s_password[0] == 0, "password should not have been changed");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "adminn", 6) == 0,
|
2016-04-03 22:21:10 +08:00
|
|
|
"login should not have been changed");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test for the first existing host in our netrc file
|
2024-09-02 20:46:00 +08:00
|
|
|
* with s_login[0] = 0.
|
2011-02-08 14:12:37 +08:00
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("example.com", &s_login, &s_password, arg);
|
2011-02-08 14:12:37 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_password, "passwd", 6) == 0,
|
2011-02-08 14:12:37 +08:00
|
|
|
"password should be 'passwd'");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "admin", 5) == 0, "login should be 'admin'");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test for the first existing host in our netrc file
|
2024-09-02 20:46:00 +08:00
|
|
|
* with s_login[0] != 0.
|
2011-02-08 14:12:37 +08:00
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_password);
|
|
|
|
s_password = strdup("");
|
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("example.com", &s_login, &s_password, arg);
|
2011-02-08 14:12:37 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_password, "passwd", 6) == 0,
|
2011-02-08 14:12:37 +08:00
|
|
|
"password should be 'passwd'");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "admin", 5) == 0, "login should be 'admin'");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test for the second existing host in our netrc file
|
2024-09-02 20:46:00 +08:00
|
|
|
* with s_login[0] = 0.
|
2011-02-08 14:12:37 +08:00
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_password);
|
|
|
|
s_password = strdup("");
|
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
free(s_login);
|
|
|
|
s_login = strdup("");
|
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("curl.example.com", &s_login, &s_password, arg);
|
2011-02-08 14:12:37 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_password, "none", 4) == 0,
|
2011-02-08 14:12:37 +08:00
|
|
|
"password should be 'none'");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "none", 4) == 0, "login should be 'none'");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
/*
|
|
|
|
* Test for the second existing host in our netrc file
|
2024-09-02 20:46:00 +08:00
|
|
|
* with s_login[0] != 0.
|
2011-02-08 14:12:37 +08:00
|
|
|
*/
|
2024-09-02 20:46:00 +08:00
|
|
|
free(s_password);
|
|
|
|
s_password = strdup("");
|
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
result = Curl_parsenetrc("curl.example.com", &s_login, &s_password, arg);
|
2011-02-08 14:12:37 +08:00
|
|
|
fail_unless(result == 0, "Host should have been found");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_password != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_password, "none", 4) == 0,
|
2011-02-08 14:12:37 +08:00
|
|
|
"password should be 'none'");
|
2024-09-02 20:46:00 +08:00
|
|
|
abort_unless(s_login != NULL, "returned NULL!");
|
|
|
|
fail_unless(strncmp(s_login, "none", 4) == 0, "login should be 'none'");
|
2011-02-08 14:12:37 +08:00
|
|
|
|
|
|
|
UNITTEST_STOP
|
2023-08-17 20:36:05 +08:00
|
|
|
|
|
|
|
#else
|
|
|
|
static CURLcode unit_setup(void)
|
|
|
|
{
|
|
|
|
return CURLE_OK;
|
|
|
|
}
|
|
|
|
static void unit_stop(void)
|
|
|
|
{
|
|
|
|
}
|
|
|
|
UNITTEST_START
|
|
|
|
UNITTEST_STOP
|
|
|
|
|
|
|
|
#endif
|