diff options
author | Daniel Stenberg <daniel@haxx.se> | 2021-11-23 17:07:31 +0100 |
---|---|---|
committer | Daniel Stenberg <daniel@haxx.se> | 2021-11-25 08:36:04 +0100 |
commit | 4183b8fe9a8558b8f62c9dbf8271deed75bff28b (patch) | |
tree | ff0f2afe3911c290897b7f37c8def931ae3f2c2d /tests/data/test1559 | |
parent | a5f5687368a5f95415d58d37e8dfb10c6b6d44c5 (diff) | |
download | curl-4183b8fe9a8558b8f62c9dbf8271deed75bff28b.tar.gz |
urlapi: provide more detailed return codesbagder/urlapi-returncodes
Previously, the return code CURLUE_MALFORMED_INPUT was used for almost
30 different URL format violations. This made it hard for users to
understand why a particular URL was not acceptable. Since the API cannot
point out a specific position within the URL for the problem, this now
instead introduces a number of additional and more fine-grained error
codes to allow the API to return more exactly in what "part" or section
of the URL a problem was detected.
Also bug-fixes curl_url_get() with CURLUPART_ZONEID, which previously
returned CURLUE_OK even if no zoneid existed.
Test cases in 1560 have been adjusted and extended. Tests 1538 and 1559
have been updated.
Updated libcurl-errors.3 and curl_url_strerror() accordingly.
Closes #8049
Diffstat (limited to 'tests/data/test1559')
-rw-r--r-- | tests/data/test1559 | 6 |
1 files changed, 3 insertions, 3 deletions
diff --git a/tests/data/test1559 b/tests/data/test1559 index 6366afb51..e62b073f4 100644 --- a/tests/data/test1559 +++ b/tests/data/test1559 @@ -35,9 +35,9 @@ Set excessive URL lengths <stdout> CURLOPT_URL 10000000 bytes URL == 43 CURLOPT_POSTFIELDS 10000000 bytes data == 0 -CURLUPART_URL 10000000 bytes URL == 3 (A malformed input was passed to a URL API function) -CURLUPART_SCHEME 10000000 bytes scheme == 3 (A malformed input was passed to a URL API function) -CURLUPART_USER 10000000 bytes user == 3 (A malformed input was passed to a URL API function) +CURLUPART_URL 10000000 bytes URL == 3 (Malformed input to a URL function) +CURLUPART_SCHEME 10000000 bytes scheme == 27 (Bad scheme) +CURLUPART_USER 10000000 bytes user == 3 (Malformed input to a URL function) </stdout> </verify> |