Skip to content
Open
Show file tree
Hide file tree
Changes from 13 commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
8 changes: 4 additions & 4 deletions include/ut_kvp.h
Original file line number Diff line number Diff line change
Expand Up @@ -71,16 +71,16 @@ void ut_kvp_destroyInstance(ut_kvp_instance_t *pInstance);
* This function opens the specified KVP file, reads its contents, and parses the key-value pairs into the given KVP instance.
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Also update about url here

*
* @param[in] pInstance - Handle to the KVP instance where the parsed data will be stored.
* @param[in] fileName - Null-terminated string containing the path to the KVP file.
* @param[in] fileNameOrUrl - Null-terminated string containing the path to the KVP file/URL.
*
* @returns Status of the operation (`ut_kvp_status_t`):
* @retval UT_KVP_STATUS_SUCCESS - The file was opened and parsed successfully.
* @retval UT_KVP_STATUS_FILE_OPEN_ERROR - The file could not be opened.
* @retval UT_KVP_STATUS_INVALID_PARAM - One or more parameters are invalid (e.g., null pointer).
* @retval UT_KVP_STATUS_NULL_PARAM - One or more parameters are NULL (e.g., null pointer).
* @retval UT_KVP_STATUS_PARSING_ERROR - An error occurred while parsing the file contents.
* @retval UT_KVP_STATUS_INVALID_INSTANCE - The provided `pInstance` is not a valid KVP instance.
*/
ut_kvp_status_t ut_kvp_open(ut_kvp_instance_t *pInstance, char *fileName);
ut_kvp_status_t ut_kvp_open(ut_kvp_instance_t *pInstance, const char *fileNameOrUrl);

/**
* @brief Parses a KVP payload from a caller-owned memory block into an instance.
Expand Down Expand Up @@ -269,4 +269,4 @@ unsigned char* ut_kvp_getDataBytes(ut_kvp_instance_t *pInstance, const char *psz
}
#endif

#endif /* __UT_KVP_H__ */
#endif /* __UT_KVP_H__ */
119 changes: 97 additions & 22 deletions src/ut_kvp.c
Original file line number Diff line number Diff line change
Expand Up @@ -37,6 +37,15 @@ ut_kvp_instance_t *gKVP_Instance = NULL;
#define UT_KVP_MAGIC (0xdeadbeef)
#define UT_KVP_MAX_INCLUDE_DEPTH 5

#define UT_KVP_HTTPS_PREFIX "https://"
#define UT_KVP_HTTP_PREFIX "http://"
#define UT_KVP_FILE_PREFIX "file://"

// Automatically calculate lengths by subtracting the '\0' null terminator
#define UT_KVP_HTTPS_PREFIX_LEN (sizeof(UT_KVP_HTTPS_PREFIX) - 1)
#define UT_KVP_HTTP_PREFIX_LEN (sizeof(UT_KVP_HTTP_PREFIX) - 1)
#define UT_KVP_FILE_PREFIX_LEN (sizeof(UT_KVP_FILE_PREFIX) - 1)

typedef struct
{
uint32_t magic;
Expand Down Expand Up @@ -95,51 +104,117 @@ void ut_kvp_destroyInstance(ut_kvp_instance_t *pInstance)
pInternal = NULL;
}

ut_kvp_status_t ut_kvp_open(ut_kvp_instance_t *pInstance, char *fileName)
static bool is_url(const char *input)
{
if (input == NULL)
{
return false;
}

// Check for http://
if (strncmp(input, UT_KVP_HTTP_PREFIX, UT_KVP_HTTP_PREFIX_LEN) == 0)
{
return true;
}

// Check for https://
if (strncmp(input, UT_KVP_HTTPS_PREFIX, UT_KVP_HTTPS_PREFIX_LEN) == 0)
{
return true;
}

// No matches found
return false;
}

ut_kvp_status_t ut_kvp_open(ut_kvp_instance_t *pInstance, const char *fileNameOrUrl)
{
struct fy_node *node;
if (pInstance == NULL)

ut_kvp_instance_internal_t *pInternal = validateInstance(pInstance);

// Validate KVP instance handle
if (pInternal == NULL)
{
return UT_KVP_STATUS_INVALID_INSTANCE;
}

ut_kvp_instance_internal_t *pInternal = validateInstance(pInstance);
if (fileName == NULL)
// Validate fileNameOrUrl parameter
if (fileNameOrUrl == NULL)
{
UT_LOG_ERROR( "Invalid Param [fileName]" );
return UT_KVP_STATUS_INVALID_PARAM;
UT_LOG_ERROR("NULL PARAM [fileNameOrUrl]");
return UT_KVP_STATUS_NULL_PARAM;
}

if (access(fileName, F_OK) != 0)
// Determine if input is a URL(e.g., http:// or https://)
bool bFilenameIsAUrl = is_url(fileNameOrUrl);

// Handle URL-based input
if(bFilenameIsAUrl == true)
{
UT_LOG_ERROR("[%s] cannot be accesed", fileName);
return UT_KVP_STATUS_FILE_OPEN_ERROR;
char *pYaml = NULL;

pYaml = malloc(UT_KVP_MAX_ELEMENT_SIZE);

if ( pYaml == NULL )
{
UT_LOG_ERROR("Malloc was not able to provide memory\n");
return UT_KVP_STATUS_PARSING_ERROR;
}

snprintf(pYaml, UT_KVP_MAX_ELEMENT_SIZE, "include: %s\n", fileNameOrUrl);

// Pass the dynamically allocated YAML string to openMemory() for parsing
ut_kvp_status_t status = ut_kvp_openMemory(pInstance, pYaml, strlen(pYaml));
free(pYaml);
return status;
}

struct fy_document *srcDoc = fy_document_build_from_file(NULL, fileName);
// Handle file-based input
if (strncmp(fileNameOrUrl, UT_KVP_FILE_PREFIX, UT_KVP_FILE_PREFIX_LEN) == 0)
{
// Skip "file://"
fileNameOrUrl = fileNameOrUrl + UT_KVP_FILE_PREFIX_LEN;
}

if(fy_document_resolve(srcDoc) != 0)
// Verify that the file is accessible
if (access(fileNameOrUrl, F_OK) != 0)
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

doesn't this fail if the filename is a URL? Since the URL hasn't been downloaded you can't call access on it?

Why don't you get the error UT_KVP_STATUS_FILE_OPEN_ERROR on URL? in your testing is there a gap in your testing?

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

The URL path does not reach the access() check.
The logic flow ensures that:

if(bFilenameIsAUrl == true)

1.If the input is a URL (is_url(...) == true), the function immediately enters the 'if' block, constructs an in-memory YAML string, calls ut_kvp_openMemory(), and returns.
So URLs never fall through to the access() path.

2.The access(fileNameOrUrl, F_OK) check is executed only for non-URL file-based inputs.

So the code does not attempt to call access() on a URL, and therefore we do not get UT_KVP_STATUS_FILE_OPEN_ERROR for URL cases.

{
UT_LOG_ERROR("Error resolving document for anchors, aliases and merge keys");
ut_kvp_close(pInstance);
return UT_KVP_STATUS_PARSING_ERROR;
UT_LOG_ERROR("[%s] cannot be accessed", fileNameOrUrl);
return UT_KVP_STATUS_FILE_OPEN_ERROR;
}

// If there’s already a handle, merge the new document into existing YAML
if(pInternal->fy_handle)
{
merge_nodes(fy_document_root(pInternal->fy_handle), fy_document_root(srcDoc));
merge_nodes(fy_document_root(pInternal->fy_handle), fy_document_root(fy_document_build_from_file(NULL, fileNameOrUrl)));
}
else
{
// Otherwise, create a new YAML document handle
pInternal->fy_handle = fy_document_create(NULL);
if (NULL == pInternal->fy_handle)
{
UT_LOG_ERROR("Unable to parse file/memory");
ut_kvp_close(pInstance);
return UT_KVP_STATUS_PARSING_ERROR;
}
}

// Ensure the handle is valid
if (NULL == pInternal->fy_handle)
{
UT_LOG_ERROR("Unable to parse file/memory");
ut_kvp_close( pInstance );
return UT_KVP_STATUS_PARSING_ERROR;
}

// Build a source YAML document from the file
struct fy_document *srcDoc = fy_document_build_from_file(NULL, fileNameOrUrl);

if(fy_document_resolve(srcDoc) != 0)
{
UT_LOG_ERROR("Error resolving document for anchors, aliases and merge keys");
ut_kvp_close(pInstance);
fy_document_destroy(srcDoc);
return UT_KVP_STATUS_PARSING_ERROR;
}

// Process and copy nodes from source document into internal handle
node = process_node_copy(fy_document_root(srcDoc), pInternal->fy_handle, 0);

if (node == NULL)
Expand Down Expand Up @@ -1218,4 +1293,4 @@ static const void *find_pattern_from_buffer(const void *buffer, size_t bufferLen
}

return NULL;
}
}
17 changes: 16 additions & 1 deletion tests/src/ut_control_test.sh
Original file line number Diff line number Diff line change
Expand Up @@ -27,4 +27,19 @@ cd "$(dirname "$0")"

export LD_LIBRARY_PATH=/usr/lib:/lib:/home/root:${MY_DIR}

LSAN_OPTIONS="suppressions=../../lsan.supp print_suppressions=1" ./ut_control_test $@
# Start HTTP server in background
python3 -m http.server 8000 &
HTTP_PID=$!

# Register cleanup trap to stop HTTP server on exit
trap '
kill $HTTP_PID 2>/dev/null || true
wait $HTTP_PID 2>/dev/null || true
' EXIT

# Run test
./ut_control_test "$@"
UT_STATUS=$?

# Exit with same status as UT test
exit $UT_STATUS
17 changes: 16 additions & 1 deletion tests/src/ut_test_kvp.c
Original file line number Diff line number Diff line change
Expand Up @@ -42,6 +42,9 @@
#define KVP_VALID_TEST_SEQUENCE_INCLUDE_YAML "assets/include/sequence-include.yaml"
#define KVP_VALID_TEST_RESOLVE_YAML_TAGS_YAML "assets/yaml_tags.yaml"
#define KVP_VALID_TEST_RESOLVE_YAML_TAGS_IN_SEQUENCE_YAML "assets/yaml_tags_in_sequence.yaml"
#define KVP_VALID_TEST_URL_HTTPS "https://raw.githubusercontent.com/rdkcentral/ut-control/main/tests/src/assets/include/2s.yaml"
#define KVP_VALID_TEST_URI_HTTP "http://localhost:8000/assets/yaml_tags.yaml"
#define KVP_VALID_TEST_URI_FILE "file://assets/yaml_tags.yaml"

static ut_kvp_instance_t *gpMainTestInstance = NULL;
static UT_test_suite_t *gpKVPSuite = NULL;
Expand Down Expand Up @@ -108,7 +111,7 @@ void test_ut_kvp_open( void )
/* Negative Read Test, NULL PARAM */
UT_LOG_STEP("ut_kvp_open( pInstance, NULL ) - Negative");
status = ut_kvp_open( pInstance, NULL);
UT_ASSERT( status == UT_KVP_STATUS_INVALID_PARAM );
UT_ASSERT( status == UT_KVP_STATUS_NULL_PARAM );

/* Filename doesn't exist */
UT_LOG_STEP("ut_kvp_open( pInstance, %s - filename doesn't exist ) - Negative", KVP_VALID_TEST_NO_FILE);
Expand All @@ -125,6 +128,18 @@ void test_ut_kvp_open( void )
status = ut_kvp_open( pInstance, KVP_VALID_TEST_YAML_FILE);
UT_ASSERT( status == UT_KVP_STATUS_SUCCESS );

UT_LOG_STEP("ut_kvp_open( pInstance, KVP_VALID_TEST_URL_HTTPS ) - Positive");
status = ut_kvp_open( pInstance, KVP_VALID_TEST_URL_HTTPS);
UT_ASSERT( status == UT_KVP_STATUS_SUCCESS );

UT_LOG_STEP("ut_kvp_open( pInstance, KVP_VALID_TEST_URI_HTTP ) - Positive");
status = ut_kvp_open( pInstance, KVP_VALID_TEST_URI_HTTP);
UT_ASSERT( status == UT_KVP_STATUS_SUCCESS );

UT_LOG_STEP("ut_kvp_open( pInstance, KVP_VALID_TEST_URI_FILE ) - Positive");
status = ut_kvp_open( pInstance, KVP_VALID_TEST_URI_FILE);
UT_ASSERT( status == UT_KVP_STATUS_SUCCESS );
Copy link
Contributor

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

You need to add comments on the purpose of each test and what your trying to achieve.

Both Positive & Negative testing are always required.

And add comments to be the goals of the tests specifically.

  1. Valid Filenames, for open file:// &
  2. Valid Filanemes for https:// & http://

Malformed URLS, and invalid filenames must also be checked..

CAPS HTTPS/HTTP/FILE should also be failing and tested.

Ensure that both params are validated.

Whilst you can test the ut_kvp_open() function, how do you know it's read the right data in?
You need to add another tests to ut_kvp_open() & read data to prove it's working then ut_kvp_close().

That's a L2 test, and also if not already existing will require a test, I would suggest having a test for points 1) & 2) above.

Copy link
Contributor Author

Choose a reason for hiding this comment

The reason will be displayed to describe this comment to others. Learn more.

Updated


UT_LOG_STEP("ut_kvp_open( pInstance, %s ) - Postive", KVP_VALID_TEST_NOT_VALID_YAML_FORMATTED_FILE);
status = ut_kvp_open( pInstance, KVP_VALID_TEST_NOT_VALID_YAML_FORMATTED_FILE);
UT_ASSERT( status == UT_KVP_STATUS_SUCCESS );
Expand Down