summaryrefslogtreecommitdiff
path: root/tests/data/test1559
diff options
context:
space:
mode:
authorDaniel Stenberg <daniel@haxx.se>2021-11-23 17:07:31 +0100
committerDaniel Stenberg <daniel@haxx.se>2021-11-25 08:36:04 +0100
commit4183b8fe9a8558b8f62c9dbf8271deed75bff28b (patch)
treeff0f2afe3911c290897b7f37c8def931ae3f2c2d /tests/data/test1559
parenta5f5687368a5f95415d58d37e8dfb10c6b6d44c5 (diff)
downloadcurl-4183b8fe9a8558b8f62c9dbf8271deed75bff28b.tar.gz
urlapi: provide more detailed return codesbagder/urlapi-returncodes
Previously, the return code CURLUE_MALFORMED_INPUT was used for almost 30 different URL format violations. This made it hard for users to understand why a particular URL was not acceptable. Since the API cannot point out a specific position within the URL for the problem, this now instead introduces a number of additional and more fine-grained error codes to allow the API to return more exactly in what "part" or section of the URL a problem was detected. Also bug-fixes curl_url_get() with CURLUPART_ZONEID, which previously returned CURLUE_OK even if no zoneid existed. Test cases in 1560 have been adjusted and extended. Tests 1538 and 1559 have been updated. Updated libcurl-errors.3 and curl_url_strerror() accordingly. Closes #8049
Diffstat (limited to 'tests/data/test1559')
-rw-r--r--tests/data/test15596
1 files changed, 3 insertions, 3 deletions
diff --git a/tests/data/test1559 b/tests/data/test1559
index 6366afb51..e62b073f4 100644
--- a/tests/data/test1559
+++ b/tests/data/test1559
@@ -35,9 +35,9 @@ Set excessive URL lengths
<stdout>
CURLOPT_URL 10000000 bytes URL == 43
CURLOPT_POSTFIELDS 10000000 bytes data == 0
-CURLUPART_URL 10000000 bytes URL == 3 (A malformed input was passed to a URL API function)
-CURLUPART_SCHEME 10000000 bytes scheme == 3 (A malformed input was passed to a URL API function)
-CURLUPART_USER 10000000 bytes user == 3 (A malformed input was passed to a URL API function)
+CURLUPART_URL 10000000 bytes URL == 3 (Malformed input to a URL function)
+CURLUPART_SCHEME 10000000 bytes scheme == 27 (Bad scheme)
+CURLUPART_USER 10000000 bytes user == 3 (Malformed input to a URL function)
</stdout>
</verify>