<feed xmlns='http://www.w3.org/2005/Atom'>
<title>curl/tests/data/test1652, branch gemini-meta</title>
<subtitle>cURL mirror with patches applied
</subtitle>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/'/>
<entry>
<title>tests: Automatically deduce the tool name from the test case for unit tests</title>
<updated>2020-02-27T00:51:49+00:00</updated>
<author>
<name>Steve Holme</name>
<email>steve_holme@hotmail.com</email>
</author>
<published>2020-02-23T08:20:32+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=0922f762407cc20c90f8f5cfa01c5eafbdfecde0'/>
<id>0922f762407cc20c90f8f5cfa01c5eafbdfecde0</id>
<content type='text'>
It is still possible to override the executable to run during the test,
using the &lt;tool&gt; tag, but this patch removes the requirement that the
tag must be present for unit tests.

It also removes the possibility of human error when existing test cases
are used as the basis for new tests, as recently witnessed in 81c37124.

Reviewed-by: Daniel Stenberg
Closes #4976
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
It is still possible to override the executable to run during the test,
using the &lt;tool&gt; tag, but this patch removes the requirement that the
tag must be present for unit tests.

It also removes the possibility of human error when existing test cases
are used as the basis for new tests, as recently witnessed in 81c37124.

Reviewed-by: Daniel Stenberg
Closes #4976
</pre>
</div>
</content>
</entry>
<entry>
<title>infof: clearly indicate truncation</title>
<updated>2018-11-03T19:54:18+00:00</updated>
<author>
<name>Daniel Gustafsson</name>
<email>daniel@yesql.se</email>
</author>
<published>2018-11-03T19:54:18+00:00</published>
<link rel='alternate' type='text/html' href='https://git.benburwell.com/mirrors/curl/commit/?id=c37b66aaaed0a36bcb1b19596e897d7ac6219611'/>
<id>c37b66aaaed0a36bcb1b19596e897d7ac6219611</id>
<content type='text'>
The internal buffer in infof() is limited to 2048 bytes of payload plus
an additional byte for NULL termination. Servers with very long error
messages can however cause truncation of the string, which currently
isn't very clear, and leads to badly formatted output.

This appends a "...\n" (or just "..." in case the format didn't with a
newline char) marker to the end of the string to clearly show
that it has been truncated.

Also include a unittest covering infof() to try and catch any bugs
introduced in this quite important function.

Closes #3216
Reviewed-by: Daniel Stenberg &lt;daniel@haxx.se&gt;
Reviewed-by: Marcel Raad &lt;Marcel.Raad@teamviewer.com&gt;
</content>
<content type='xhtml'>
<div xmlns='http://www.w3.org/1999/xhtml'>
<pre>
The internal buffer in infof() is limited to 2048 bytes of payload plus
an additional byte for NULL termination. Servers with very long error
messages can however cause truncation of the string, which currently
isn't very clear, and leads to badly formatted output.

This appends a "...\n" (or just "..." in case the format didn't with a
newline char) marker to the end of the string to clearly show
that it has been truncated.

Also include a unittest covering infof() to try and catch any bugs
introduced in this quite important function.

Closes #3216
Reviewed-by: Daniel Stenberg &lt;daniel@haxx.se&gt;
Reviewed-by: Marcel Raad &lt;Marcel.Raad@teamviewer.com&gt;
</pre>
</div>
</content>
</entry>
</feed>
