Blame SOURCES/0115-testsuite-add-unittests-for-uReport-API.patch

4b6aa8
From 0dbe0fdaf11ed8948fc947831c3c421b1d113f05 Mon Sep 17 00:00:00 2001
4b6aa8
From: Matej Habrnal <mhabrnal@redhat.com>
4b6aa8
Date: Wed, 22 Oct 2014 00:14:55 +0200
4b6aa8
Subject: [LIBREPORT PATCH 115/118] testsuite: add unittests for uReport API
4b6aa8
4b6aa8
Fixes #294
4b6aa8
Related #1140224
4b6aa8
4b6aa8
Signed-off-by: Matej Habrnal <mhabrnal@redhat.com>
4b6aa8
Signed-off-by: Jakub Filak <jfilak@redhat.com>
4b6aa8
---
4b6aa8
 tests/Makefile.am                                  |    3 +-
4b6aa8
 tests/testsuite.at                                 |    1 +
4b6aa8
 tests/ureport.at                                   | 1101 ++++++++++++++++++++
4b6aa8
 tests/ureport/certs/correct/cert-key.pem           |    5 +
4b6aa8
 tests/ureport/certs/correct/cert.pem               |   13 +
4b6aa8
 tests/ureport/certs/incorrect_content/cert-key.pem |    5 +
4b6aa8
 tests/ureport/certs/incorrect_content/cert.pem     |    0
4b6aa8
 tests/ureport/rhsm/__init__.py                     |    0
4b6aa8
 tests/ureport/rhsm/config.py                       |    8 +
4b6aa8
 9 files changed, 1135 insertions(+), 1 deletion(-)
4b6aa8
 create mode 100644 tests/ureport.at
4b6aa8
 create mode 100644 tests/ureport/certs/correct/cert-key.pem
4b6aa8
 create mode 100644 tests/ureport/certs/correct/cert.pem
4b6aa8
 create mode 100644 tests/ureport/certs/incorrect_content/cert-key.pem
4b6aa8
 create mode 100644 tests/ureport/certs/incorrect_content/cert.pem
4b6aa8
 create mode 100644 tests/ureport/rhsm/__init__.py
4b6aa8
 create mode 100644 tests/ureport/rhsm/config.py
4b6aa8
4b6aa8
diff --git a/tests/Makefile.am b/tests/Makefile.am
4b6aa8
index 4731bad..cda9375 100644
4b6aa8
--- a/tests/Makefile.am
4b6aa8
+++ b/tests/Makefile.am
4b6aa8
@@ -41,7 +41,8 @@ TESTSUITE_AT = \
4b6aa8
   xml_definition.at \
4b6aa8
   report_python.at \
4b6aa8
   xfuncs.at \
4b6aa8
-  string_list.at
4b6aa8
+  string_list.at \
4b6aa8
+  ureport.at
4b6aa8
 
4b6aa8
 EXTRA_DIST += $(TESTSUITE_AT)
4b6aa8
 TESTSUITE = $(srcdir)/testsuite
4b6aa8
diff --git a/tests/testsuite.at b/tests/testsuite.at
4b6aa8
index 60b2e94..abad32b 100644
4b6aa8
--- a/tests/testsuite.at
4b6aa8
+++ b/tests/testsuite.at
4b6aa8
@@ -16,3 +16,4 @@ m4_include([libreport_types.at])
4b6aa8
 m4_include([xml_definition.at])
4b6aa8
 m4_include([report_python.at])
4b6aa8
 m4_include([string_list.at])
4b6aa8
+m4_include([ureport.at])
4b6aa8
diff --git a/tests/ureport.at b/tests/ureport.at
4b6aa8
new file mode 100644
4b6aa8
index 0000000..22d34e9
4b6aa8
--- /dev/null
4b6aa8
+++ b/tests/ureport.at
4b6aa8
@@ -0,0 +1,1101 @@
4b6aa8
+# -*- Autotest -*-
4b6aa8
+
4b6aa8
+AT_BANNER([ureport])
4b6aa8
+
4b6aa8
+## ---------------------------- ##
4b6aa8
+##  ureport_server_config_init  ##
4b6aa8
+## ---------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_init],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+#define DESTROYED_POINTER (void *)0xdeadbeef
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    assert(config.ur_url == NULL);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+    assert(config.ur_client_cert == NULL);
4b6aa8
+    assert(config.ur_client_key == NULL);
4b6aa8
+    assert(config.ur_username == NULL);
4b6aa8
+    assert(config.ur_password == NULL);
4b6aa8
+    assert(config.ur_http_headers != NULL);
4b6aa8
+    assert(config.ur_prefs.urp_auth_items == NULL);
4b6aa8
+
4b6aa8
+    config.ur_url = (char *)"url";
4b6aa8
+    config.ur_ssl_verify = false;
4b6aa8
+    config.ur_client_cert = (char *)"cert";
4b6aa8
+    config.ur_client_key = (char *)"key";
4b6aa8
+    config.ur_username = (char *)"username";
4b6aa8
+    config.ur_password = (char *)"password";
4b6aa8
+    free_map_string(config.ur_http_headers);
4b6aa8
+    config.ur_prefs.urp_auth_items = DESTROYED_POINTER;
4b6aa8
+
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    assert(config.ur_url == NULL);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+    assert(config.ur_client_cert == NULL);
4b6aa8
+    assert(config.ur_client_key == NULL);
4b6aa8
+    assert(config.ur_username == NULL);
4b6aa8
+    assert(config.ur_password == NULL);
4b6aa8
+    assert(config.ur_http_headers != NULL);
4b6aa8
+    assert(config.ur_prefs.urp_auth_items == NULL);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ------------------------------- ##
4b6aa8
+##  ureport_server_config_destroy  ##
4b6aa8
+## ------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_destroy],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+#define DESTROYED_POINTER (void *)0xdeadbeef
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    config.ur_url = strdup("url");
4b6aa8
+    config.ur_client_cert = strdup("cert");
4b6aa8
+    config.ur_client_key = strdup("key");
4b6aa8
+    config.ur_username = strdup("username");
4b6aa8
+    config.ur_password = strdup("password");
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "url") == 0);
4b6aa8
+    assert(strcmp(config.ur_client_cert, "cert") == 0);
4b6aa8
+    assert(strcmp(config.ur_client_key, "key") == 0);
4b6aa8
+    assert(strcmp(config.ur_username, "username") == 0);
4b6aa8
+    assert(strcmp(config.ur_password , "password") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    assert(config.ur_url == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_client_cert == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_client_key == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_username == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_password == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_prefs.urp_auth_items == DESTROYED_POINTER);
4b6aa8
+    assert(config.ur_http_headers == DESTROYED_POINTER);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ---------------------------- ##
4b6aa8
+##  ureport_server_config_load  ##
4b6aa8
+## ---------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_load],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    /* value from env */
4b6aa8
+    /* IncludeAuthData set to 'no' */
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    setenv("uReport_URL", "env_url", 1);
4b6aa8
+    setenv("uReport_SSLVerify", "yes", 1);
4b6aa8
+    setenv("SSLClientAuth", "", 1);
4b6aa8
+    setenv("uReport_IncludeAuthData", "no", 1);
4b6aa8
+    setenv("uReport_AuthDataItems", "hostname", 1);
4b6aa8
+
4b6aa8
+    map_string_t *settings = new_map_string();
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "env_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+
4b6aa8
+    GList *l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(l == NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* value from env */
4b6aa8
+    /* IncludeAuthData set to 'yes' but AuthDataItems is empty. */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    setenv("uReport_URL", "env_url", 1);
4b6aa8
+    setenv("uReport_SSLVerify", "yes", 1);
4b6aa8
+    setenv("SSLClientAuth", "", 1);
4b6aa8
+    setenv("uReport_IncludeAuthData", "yes", 1);
4b6aa8
+    setenv("uReport_AuthDataItems", "", 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "env_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+
4b6aa8
+    l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(l == NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* value from env */
4b6aa8
+    /* IncludeAuthData set to 'yes' */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    setenv("uReport_URL", "env_url", 1);
4b6aa8
+    setenv("uReport_SSLVerify", "no", 1);
4b6aa8
+    setenv("SSLClientAuth", "", 1);
4b6aa8
+    setenv("uReport_IncludeAuthData", "yes", 1);
4b6aa8
+    setenv("uReport_AuthDataItems", "hostname, time", 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "env_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == false);
4b6aa8
+
4b6aa8
+    l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(strcmp(l->data, "hostname") == 0);
4b6aa8
+    assert(strcmp(l->next->data, "time") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* value from settings */
4b6aa8
+    /* IncludeAuthData set to 'no' */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    unsetenv("uReport_URL");
4b6aa8
+    unsetenv("uReport_SSLVerify");
4b6aa8
+    unsetenv("uReport_IncludeAuthData");
4b6aa8
+    unsetenv("uReport_AuthDataItems");
4b6aa8
+
4b6aa8
+    insert_map_string(settings, xstrdup("URL"), xstrdup("settings_url"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLVerify"), xstrdup("yes"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLClientAuth"), xstrdup(""));
4b6aa8
+    insert_map_string(settings, xstrdup("IncludeAuthData"), xstrdup("no"));
4b6aa8
+    insert_map_string(settings, xstrdup("AuthDataItems"), xstrdup("hostname"));
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "settings_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+
4b6aa8
+    l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(l == NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    free_map_string(settings);
4b6aa8
+
4b6aa8
+    /* value from settings */
4b6aa8
+    /* IncludeAuthData set to 'yes' but AuthDataItems is empty. */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    settings = new_map_string();
4b6aa8
+    insert_map_string(settings, xstrdup("URL"), xstrdup("settings_url"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLVerify"), xstrdup("yes"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLClientAuth"), xstrdup(""));
4b6aa8
+    insert_map_string(settings, xstrdup("IncludeAuthData"), xstrdup("yes"));
4b6aa8
+    insert_map_string(settings, xstrdup("AuthDataItems"), xstrdup(""));
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "settings_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == true);
4b6aa8
+
4b6aa8
+    l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(l == NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    free_map_string(settings);
4b6aa8
+
4b6aa8
+    /* value from settings */
4b6aa8
+    /* IncludeAuthData set to 'yes' */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    settings = new_map_string();
4b6aa8
+    insert_map_string(settings, xstrdup("URL"), xstrdup("settings_url"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLVerify"), xstrdup("no"));
4b6aa8
+    insert_map_string(settings, xstrdup("SSLClientAuth"), xstrdup(""));
4b6aa8
+    insert_map_string(settings, xstrdup("IncludeAuthData"), xstrdup("yes"));
4b6aa8
+    insert_map_string(settings, xstrdup("AuthDataItems"), xstrdup("hostname, type"));
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "settings_url") == 0);
4b6aa8
+    assert(config.ur_ssl_verify == false);
4b6aa8
+
4b6aa8
+    l = config.ur_prefs.urp_auth_items;
4b6aa8
+    assert(strcmp(l->data, "hostname") == 0);
4b6aa8
+    assert(strcmp(l->next->data, "type") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    free_map_string(settings);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+
4b6aa8
+## ------------------------------- ##
4b6aa8
+##  ureport_server_config_set_url  ##
4b6aa8
+## ------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_set_url],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+#define DESTROYED_POINTER (void *)0xdeadbeef
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_url(&config, strdup("url"));
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "url") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_url(&config, strdup("next.url"));
4b6aa8
+
4b6aa8
+    assert(strcmp(config.ur_url, "next.url") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## --------------------------------------- ##
4b6aa8
+##  ureport_server_config_set_client_auth  ##
4b6aa8
+## --------------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_set_client_auth],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+#define DESTROYED_POINTER (void *)0xdeadbeef
4b6aa8
+#define RHSM_WEB_SERVICE_URL "https://api.access.redhat.com/rs/telemetry/abrt"
4b6aa8
+
4b6aa8
+#define TESTING_CERTS_CORRECT_DIR_PATH "../../ureport/certs/correct"
4b6aa8
+#define TESTING_CERTS_INCORRECT_CONTENT_DIR_PATH "../../ureport/certs/incorrect_content"
4b6aa8
+#define TESTING_PYTHONPATH "../../ureport/"
4b6aa8
+#define WRONG_TESTING_PYTHONPATH "../../ureportxxxxxx/"
4b6aa8
+
4b6aa8
+#define RHSMENT_PEM_DIR_PATH "/etc/pki/entitlement"
4b6aa8
+
4b6aa8
+#define RHSMENT_ENT_DATA_BEGIN_TAG "-----BEGIN ENTITLEMENT DATA-----"
4b6aa8
+#define RHSMENT_ENT_DATA_END_TAG "-----END ENTITLEMENT DATA-----"
4b6aa8
+#define RHSMENT_SIG_DATA_BEGIN_TAG "-----BEGIN RSA SIGNATURE-----"
4b6aa8
+#define RHSMENT_SIG_DATA_END_TAG "-----END RSA SIGNATURE-----"
4b6aa8
+
4b6aa8
+char *my_strdup(const char *str)
4b6aa8
+{
4b6aa8
+    if (str == NULL)
4b6aa8
+        return NULL;
4b6aa8
+    else
4b6aa8
+        return strdup(str);
4b6aa8
+}
4b6aa8
+
4b6aa8
+void set_ureport_server_config(struct ureport_server_config *config,
4b6aa8
+                                const char *url,
4b6aa8
+                                bool ver,
4b6aa8
+                                const char *cert,
4b6aa8
+                                const char *key,
4b6aa8
+                                const char *uname,
4b6aa8
+                                const char *passwd)
4b6aa8
+{
4b6aa8
+    config->ur_url = my_strdup(url);
4b6aa8
+    config->ur_ssl_verify = ver;
4b6aa8
+    config->ur_client_cert = my_strdup(cert);
4b6aa8
+    config->ur_client_key = my_strdup(key);
4b6aa8
+    config->ur_username = my_strdup(uname);
4b6aa8
+    config->ur_password = my_strdup(passwd);
4b6aa8
+
4b6aa8
+    return;
4b6aa8
+}
4b6aa8
+
4b6aa8
+void my_assert(const char *str1, const char *str2)
4b6aa8
+{
4b6aa8
+    if (str1 == NULL || str2 == NULL)
4b6aa8
+        assert( str1 == NULL && str2 == NULL );
4b6aa8
+    else
4b6aa8
+        assert(strcmp(str1, str2) == 0);
4b6aa8
+
4b6aa8
+    return;
4b6aa8
+}
4b6aa8
+
4b6aa8
+void assert_ureport_server_config(struct ureport_server_config *config,
4b6aa8
+                                const char *url,
4b6aa8
+                                bool ver,
4b6aa8
+                                const char *cert,
4b6aa8
+                                const char *key,
4b6aa8
+                                const char *username,
4b6aa8
+                                const char *password)
4b6aa8
+{
4b6aa8
+    my_assert(config->ur_url, url);
4b6aa8
+    assert(config->ur_ssl_verify == ver);
4b6aa8
+    my_assert(config->ur_client_cert, cert);
4b6aa8
+    my_assert(config->ur_client_key, key);
4b6aa8
+    my_assert(config->ur_username, username);
4b6aa8
+    my_assert(config->ur_password , password);
4b6aa8
+
4b6aa8
+    return;
4b6aa8
+}
4b6aa8
+
4b6aa8
+int test_ureport_server_config_set_client_auth_exit_code(struct ureport_server_config *config,
4b6aa8
+                                                         const char *client_auth)
4b6aa8
+{
4b6aa8
+    ureport_server_config_init(config);
4b6aa8
+
4b6aa8
+    pid_t pid = fork();
4b6aa8
+    if (pid < 0)
4b6aa8
+    {
4b6aa8
+        perror_msg("fork");
4b6aa8
+        return -1;
4b6aa8
+    }
4b6aa8
+
4b6aa8
+    if (pid == 0)
4b6aa8
+    {
4b6aa8
+        ureport_server_config_set_client_auth(config, client_auth);
4b6aa8
+        exit(0);
4b6aa8
+    }
4b6aa8
+    int status;
4b6aa8
+    wait(&status);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(config);
4b6aa8
+
4b6aa8
+    return status;
4b6aa8
+}
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_client_auth(&config, NULL);
4b6aa8
+
4b6aa8
+    set_ureport_server_config(&config, "url", true, "cert", "key", "username", "passwd");
4b6aa8
+
4b6aa8
+    /* client_auth == NULL */
4b6aa8
+    ureport_server_config_set_client_auth(&config, NULL);
4b6aa8
+    assert_ureport_server_config(&config, "url", true, "cert", "key", "username", "passwd");
4b6aa8
+
4b6aa8
+    /* client_auth == "" */
4b6aa8
+    ureport_server_config_set_client_auth(&config, "");
4b6aa8
+    assert_ureport_server_config(&config, "url", true, NULL, NULL, "username", "passwd");
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* client_auth == rhsm */
4b6aa8
+    /* ur_url == NULL */
4b6aa8
+    /* no certs */
4b6aa8
+    char *empty_cert_dir = mkdtemp(strdup("/tmp/cert_XXXXXX"));
4b6aa8
+    assert(empty_cert_dir);
4b6aa8
+    setenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH", empty_cert_dir, 1);
4b6aa8
+
4b6aa8
+    int status = test_ureport_server_config_set_client_auth_exit_code(&config, "rhsm");
4b6aa8
+    assert(status != 0 && status != -1);
4b6aa8
+
4b6aa8
+    assert(rmdir(empty_cert_dir) == 0);
4b6aa8
+
4b6aa8
+    /* client_auth == rhsm */
4b6aa8
+    /* ur_url == NULL */
4b6aa8
+    /* certs exists (incorrect content) */
4b6aa8
+
4b6aa8
+    setenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH", TESTING_CERTS_INCORRECT_CONTENT_DIR_PATH, 1);
4b6aa8
+
4b6aa8
+    status = test_ureport_server_config_set_client_auth_exit_code(&config, "rhsm");
4b6aa8
+    assert(status != 0 && status != -1);
4b6aa8
+
4b6aa8
+    /* client_auth == rhsm */
4b6aa8
+    /* ur_url == NULL */
4b6aa8
+    /* certs exists (correct) */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    setenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH", TESTING_CERTS_CORRECT_DIR_PATH, 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_client_auth(&config, "rhsm");
4b6aa8
+
4b6aa8
+    assert_ureport_server_config(&config, RHSM_WEB_SERVICE_URL, true,
4b6aa8
+                                TESTING_CERTS_CORRECT_DIR_PATH"/cert.pem",
4b6aa8
+                                TESTING_CERTS_CORRECT_DIR_PATH"/cert-key.pem",
4b6aa8
+                                NULL, NULL);
4b6aa8
+
4b6aa8
+    char *ent = xasprintf(RHSMENT_ENT_DATA_BEGIN_TAG"%s"RHSMENT_ENT_DATA_END_TAG, "entitlementdata");
4b6aa8
+    assert(0 == strcmp(ent,
4b6aa8
+                        get_map_string_item_or_NULL(config.ur_http_headers, "X-RH-Entitlement-Data")));
4b6aa8
+
4b6aa8
+    char *sig= xasprintf(RHSMENT_SIG_DATA_BEGIN_TAG"%s"RHSMENT_SIG_DATA_END_TAG, "rsasignature");
4b6aa8
+    assert(0 == strcmp(sig,
4b6aa8
+                        get_map_string_item_or_NULL(config.ur_http_headers, "X-RH-Entitlement-Sig")));
4b6aa8
+
4b6aa8
+    free(ent);
4b6aa8
+    free(sig);
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* client_auth == cert:key */
4b6aa8
+    /* ur_url == NULL */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    set_ureport_server_config(&config, NULL, true, NULL, NULL, "username", "passwd");
4b6aa8
+    ureport_server_config_set_client_auth(&config, "cert:key");
4b6aa8
+    assert_ureport_server_config(&config, NULL, true, "cert", "key", NULL, NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* client_auth == cert:key */
4b6aa8
+    /* ur_url != NULL */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    set_ureport_server_config(&config, "url", true, NULL, NULL, "username", "passwd");
4b6aa8
+    ureport_server_config_set_client_auth(&config, "cert:key");
4b6aa8
+    assert_ureport_server_config(&config, "url", true, "cert", "key", NULL, NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* wrong client_auth */
4b6aa8
+    int ret_val = test_ureport_server_config_set_client_auth_exit_code(&config, "cert:");
4b6aa8
+    assert(ret_val != 0 && ret_val != -1);
4b6aa8
+    ret_val = test_ureport_server_config_set_client_auth_exit_code(&config, ":key");
4b6aa8
+    assert(ret_val != 0 && ret_val != -1);
4b6aa8
+    ret_val = test_ureport_server_config_set_client_auth_exit_code(&config, "cert");
4b6aa8
+    assert(ret_val != 0 && ret_val != -1);
4b6aa8
+
4b6aa8
+/* rhsm_config_get_entitlement_cert_dir */
4b6aa8
+/* certs exists (correct content) */
4b6aa8
+    unsetenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH");
4b6aa8
+    setenv("PYTHONPATH", TESTING_PYTHONPATH, 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    ureport_server_config_set_client_auth(&config, "rhsm");
4b6aa8
+
4b6aa8
+    char *abs_path_cert = realpath(TESTING_CERTS_CORRECT_DIR_PATH"/cert.pem", NULL);
4b6aa8
+    char *abs_path_key = realpath(TESTING_CERTS_CORRECT_DIR_PATH"/cert-key.pem", NULL);
4b6aa8
+
4b6aa8
+    assert_ureport_server_config(&config, RHSM_WEB_SERVICE_URL, true,
4b6aa8
+                                abs_path_cert,
4b6aa8
+                                abs_path_key,
4b6aa8
+                                NULL, NULL);
4b6aa8
+    free(abs_path_cert);
4b6aa8
+    free(abs_path_key);
4b6aa8
+
4b6aa8
+    ent = xasprintf(RHSMENT_ENT_DATA_BEGIN_TAG"%s"RHSMENT_ENT_DATA_END_TAG, "entitlementdata");
4b6aa8
+    assert(0 == strcmp(ent,
4b6aa8
+                        get_map_string_item_or_NULL(config.ur_http_headers, "X-RH-Entitlement-Data")));
4b6aa8
+
4b6aa8
+    sig= xasprintf(RHSMENT_SIG_DATA_BEGIN_TAG"%s"RHSMENT_SIG_DATA_END_TAG, "rsasignature");
4b6aa8
+    assert(0 == strcmp(sig,
4b6aa8
+                        get_map_string_item_or_NULL(config.ur_http_headers, "X-RH-Entitlement-Sig")));
4b6aa8
+
4b6aa8
+    free(ent);
4b6aa8
+    free(sig);
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    /* python script fails, '/etc/pki/entitlement' is returned  */
4b6aa8
+
4b6aa8
+    /* set cert dir path to '/etc/pki/entitlement' */
4b6aa8
+    /* store return value of ureport_server_config_set_client_auth */
4b6aa8
+    setenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH", RHSMENT_PEM_DIR_PATH, 1);
4b6aa8
+
4b6aa8
+    int exp_ret_val = test_ureport_server_config_set_client_auth_exit_code(&config, "rhsm");
4b6aa8
+
4b6aa8
+    /* Do the same with unset LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH and wrong PYTHONPATH */
4b6aa8
+    /* function rhsm_config_get_entitlement_cert_dir has to return RHSMENT_PEM_DIR_PATH */
4b6aa8
+    unsetenv("LIBREPORT_DEBUG_RHSMENT_PEM_DIR_PATH");
4b6aa8
+    setenv("PYTHONPATH", WRONG_TESTING_PYTHONPATH, 1);
4b6aa8
+
4b6aa8
+    int rec_ret_val = test_ureport_server_config_set_client_auth_exit_code(&config, "rhsm");
4b6aa8
+
4b6aa8
+    /* we expect the same return value */
4b6aa8
+//    assert(exp_ret_val == rec_ret_val);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## -------------------------------------- ##
4b6aa8
+##  ureport_server_config_set_basic_auth  ##
4b6aa8
+## -------------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_config_set_basic_auth],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+
4b6aa8
+void my_assert(const char *str1, const char *str2)
4b6aa8
+{
4b6aa8
+    if (str1 == NULL || str2 == NULL)
4b6aa8
+        assert( str1 == NULL && str2 == NULL );
4b6aa8
+    else
4b6aa8
+        assert(strcmp(str1, str2) == 0);
4b6aa8
+
4b6aa8
+    return;
4b6aa8
+}
4b6aa8
+
4b6aa8
+void assert_ureport_server_config(struct ureport_server_config *config,
4b6aa8
+                                const char *url,
4b6aa8
+                                bool ver,
4b6aa8
+                                const char *cert,
4b6aa8
+                                const char *key,
4b6aa8
+                                const char *username,
4b6aa8
+                                const char *password)
4b6aa8
+{
4b6aa8
+    my_assert(config->ur_url, url);
4b6aa8
+    assert(config->ur_ssl_verify == ver);
4b6aa8
+    my_assert(config->ur_client_cert, cert);
4b6aa8
+    my_assert(config->ur_client_key, key);
4b6aa8
+    my_assert(config->ur_username, username);
4b6aa8
+    my_assert(config->ur_password , password);
4b6aa8
+
4b6aa8
+    return;
4b6aa8
+}
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_basic_auth(&config, NULL, NULL);
4b6aa8
+    assert_ureport_server_config(&config, NULL, true, NULL, NULL, NULL, NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_basic_auth(&config, "usr", NULL);
4b6aa8
+    assert_ureport_server_config(&config, NULL, true, NULL, NULL, "usr", NULL);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_basic_auth(&config, NULL, "passwd");
4b6aa8
+    assert_ureport_server_config(&config, NULL, true, NULL, NULL, NULL, "passwd");
4b6aa8
+
4b6aa8
+    ureport_server_config_set_basic_auth(&config, "usr", "passwd");
4b6aa8
+    assert_ureport_server_config(&config, NULL, true, NULL, NULL, "usr", "passwd");
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ------------------------------------ ##
4b6aa8
+##  ureport_server_response_from_reply  ##
4b6aa8
+## ------------------------------------ ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_response_from_reply],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+
4b6aa8
+    /* curl_resul is not CURL_OK */
4b6aa8
+    struct post_state ps;
4b6aa8
+
4b6aa8
+    ps.curl_result = 1;
4b6aa8
+    strcpy(ps.errmsg, "err");
4b6aa8
+    ps.body = (char *)"body";
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    ureport_server_config_set_url(&config, strdup("url"));
4b6aa8
+
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    /* curl_resul is CURLE_OK */
4b6aa8
+    /* http_resp_code == 404 */
4b6aa8
+    ps.curl_result = CURLE_OK;
4b6aa8
+    ps.http_resp_code = 404;
4b6aa8
+
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    ps.http_resp_code = 500;
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    ps.http_resp_code = 503;
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    ps.http_resp_code = 404;
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    ps.http_resp_code = 201;
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    /* unable parse json */
4b6aa8
+    ps.http_resp_code = 202;
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    /* correct json && invalid format */
4b6aa8
+    ps.body = (char *)"{ \"resultxxxxxxxx\" : true }";
4b6aa8
+    assert(ureport_server_response_from_reply(&ps, &config) == NULL);
4b6aa8
+
4b6aa8
+    /* correct json && valid format */
4b6aa8
+    ps.body = (char *)"{ 'result' : true, \
4b6aa8
+                         'message': 'message', \
4b6aa8
+                         'bthash': '691cf824e3e07457156125636e86c50279e29496', \
4b6aa8
+                         'reported_to': [ { 'type': 'url', \
4b6aa8
+                         'value': 'value', \
4b6aa8
+                         'reporter': 'ABRT Server' } ] }";
4b6aa8
+
4b6aa8
+    struct ureport_server_response *response = ureport_server_response_from_reply(&ps, &config);
4b6aa8
+    assert(strcmp(response->urr_value, "true") == 0);
4b6aa8
+    assert(strcmp(response->urr_message, "message") == 0);
4b6aa8
+    assert(strcmp(response->urr_bthash, "691cf824e3e07457156125636e86c50279e29496") == 0);
4b6aa8
+
4b6aa8
+    GList *urr_reported_to_list = response->urr_reported_to_list;
4b6aa8
+    assert(strcmp(urr_reported_to_list->data, "ABRT Server: URL=value") == 0);
4b6aa8
+
4b6aa8
+    ureport_server_response_free(response);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ----------------------------------------- ##
4b6aa8
+##  ureport_server_response_save_in_dump_dir ##
4b6aa8
+## ----------------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_response_save_in_dump_dir],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "dump_dir.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    /* reported to*/
4b6aa8
+    struct post_state ps;
4b6aa8
+    ps.curl_result = CURLE_OK;
4b6aa8
+    ps.http_resp_code = 202;
4b6aa8
+    ps.body = (char *)"{ 'result' : true, \
4b6aa8
+                         'message': 'message', \
4b6aa8
+                         'bthash': '691cf824e3e07457156125636e86c50279e29496', \
4b6aa8
+                         'reported_to': [ { 'type': 'url', \
4b6aa8
+                         'value': 'value', \
4b6aa8
+                         'reporter': 'ABRT Server' } ] }";
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    ureport_server_config_set_url(&config, strdup("url"));
4b6aa8
+
4b6aa8
+    struct dump_dir *dd = dd_create("./test", (uid_t)-1L, DEFAULT_DUMP_DIR_MODE);
4b6aa8
+    assert(dd != NULL);
4b6aa8
+    dd_create_basic_files(dd, (uid_t)-1L, NULL);
4b6aa8
+    dd_save_text(dd, FILENAME_TYPE, "CCpp");
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    struct ureport_server_response *response = ureport_server_response_from_reply(&ps, &config);
4b6aa8
+    assert(ureport_server_response_save_in_dump_dir(response, "./test", &config));
4b6aa8
+
4b6aa8
+    /* dump dir do not exist */
4b6aa8
+    assert(false == ureport_server_response_save_in_dump_dir(response, "not_existing_dir", &config));
4b6aa8
+
4b6aa8
+    dd = dd_opendir("./test", 0);
4b6aa8
+    char *reported_to = dd_load_text_ext(dd, FILENAME_REPORTED_TO, DD_LOAD_TEXT_RETURN_NULL_ON_FAILURE);
4b6aa8
+
4b6aa8
+    assert(strstr(reported_to, "uReport: BTHASH=691cf824e3e07457156125636e86c50279e29496") != NULL);
4b6aa8
+    assert(strstr(reported_to, "url/reports/bthash/691cf824e3e07457156125636e86c50279e29496") != NULL);
4b6aa8
+    assert(strstr(reported_to, "ABRT Server: URL=value") != NULL);
4b6aa8
+    /* not-reportable must not exist */
4b6aa8
+    assert(!dd_exist(dd, FILENAME_NOT_REPORTABLE));
4b6aa8
+
4b6aa8
+    free(config.ur_url);
4b6aa8
+    ureport_server_response_free(response);
4b6aa8
+    free(reported_to);
4b6aa8
+    dd_close(dd);
4b6aa8
+    delete_dump_dir("./test");
4b6aa8
+
4b6aa8
+    /* not-reportable*/
4b6aa8
+    ps.curl_result = CURLE_OK;
4b6aa8
+    ps.http_resp_code = 202;
4b6aa8
+    ps.body = (char *)"{ 'result' : true, \
4b6aa8
+                         'message': 'message', \
4b6aa8
+                         'solutions': [ { 'cause': 'solution_cause', \
4b6aa8
+                         'url': 'solution_url', \
4b6aa8
+                         'note': 'solution_note' } ], \
4b6aa8
+                         'bthash': '691cf824e3e07457156125636e86c50279e29496', \
4b6aa8
+                         'reported_to': [ { 'type': 'url', \
4b6aa8
+                         'value': 'value', \
4b6aa8
+                         'reporter': 'ABRT Server' } ] }";
4b6aa8
+
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    ureport_server_config_set_url(&config, strdup("url"));
4b6aa8
+
4b6aa8
+    dd = dd_create("./test", (uid_t)-1L, DEFAULT_DUMP_DIR_MODE);
4b6aa8
+    assert(dd != NULL);
4b6aa8
+    dd_create_basic_files(dd, (uid_t)-1L, NULL);
4b6aa8
+    dd_save_text(dd, FILENAME_TYPE, "CCpp");
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    response = ureport_server_response_from_reply(&ps, &config);
4b6aa8
+    assert(ureport_server_response_save_in_dump_dir(response, "./test", &config));
4b6aa8
+
4b6aa8
+    dd = dd_opendir("./test", 0);
4b6aa8
+    reported_to = dd_load_text_ext(dd, FILENAME_REPORTED_TO, DD_LOAD_TEXT_RETURN_NULL_ON_FAILURE);
4b6aa8
+
4b6aa8
+    assert(strstr(reported_to, "uReport: BTHASH=691cf824e3e07457156125636e86c50279e29496") != NULL);
4b6aa8
+    assert(strstr(reported_to, "url/reports/bthash/691cf824e3e07457156125636e86c50279e29496") != NULL);
4b6aa8
+    assert(strstr(reported_to, "ABRT Server: URL=value") != NULL);
4b6aa8
+    /* not-reportable must exist */
4b6aa8
+    char *not_reportable = dd_load_text_ext(dd, FILENAME_NOT_REPORTABLE, DD_LOAD_TEXT_RETURN_NULL_ON_FAILURE);
4b6aa8
+
4b6aa8
+    assert(strstr(not_reportable, "Your problem seems to be caused by solution_cause") != NULL);
4b6aa8
+
4b6aa8
+
4b6aa8
+    free(config.ur_url);
4b6aa8
+    ureport_server_response_free(response);
4b6aa8
+    free(reported_to);
4b6aa8
+    free(not_reportable);
4b6aa8
+    dd_close(dd);
4b6aa8
+    delete_dump_dir("./test");
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+
4b6aa8
+## --------------------------------------- ##
4b6aa8
+##  ureport_server_response_get_report_url ##
4b6aa8
+## --------------------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_server_response_get_report_url],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+#define BTHASH_URL_SFX "reports/bthash/"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    /* reported to*/
4b6aa8
+    struct post_state ps;
4b6aa8
+    ps.curl_result = CURLE_OK;
4b6aa8
+    ps.http_resp_code = 202;
4b6aa8
+    ps.body = (char *)"{ 'result' : true, \
4b6aa8
+                         'message': 'message', \
4b6aa8
+                         'bthash': '691cf824e3e07457156125636e86c50279e29496', \
4b6aa8
+                         'reported_to': [ { 'type': 'url', \
4b6aa8
+                         'value': 'value', \
4b6aa8
+                         'reporter': 'ABRT Server' } ] }";
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    ureport_server_config_set_url(&config, strdup("url"));
4b6aa8
+
4b6aa8
+    struct ureport_server_response *response = ureport_server_response_from_reply(&ps, &config);
4b6aa8
+
4b6aa8
+    char *report_url = ureport_server_response_get_report_url(response, &config);
4b6aa8
+
4b6aa8
+    char *expect_bthash_url = concat_path_file(config.ur_url, BTHASH_URL_SFX);
4b6aa8
+    char *expect_report_url = concat_path_file(expect_bthash_url, response->urr_bthash);
4b6aa8
+    free(expect_bthash_url);
4b6aa8
+
4b6aa8
+    assert(strcmp(report_url, expect_report_url) == 0);
4b6aa8
+
4b6aa8
+    free(config.ur_url);
4b6aa8
+    free(expect_report_url);
4b6aa8
+    free(report_url);
4b6aa8
+    ureport_server_response_free(response);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ---------------- ##
4b6aa8
+##  ureport_do_post ##
4b6aa8
+## ---------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_do_post],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct dump_dir *dd = dd_create("./test", (uid_t)-1L, DEFAULT_DUMP_DIR_MODE);
4b6aa8
+    assert(dd != NULL);
4b6aa8
+    dd_create_basic_files(dd, (uid_t)-1L, NULL);
4b6aa8
+    dd_save_text(dd, FILENAME_TYPE, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_ANALYZER, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_EPOCH, "pkg_epoch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_ARCH, "pkg_arch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_RELEASE, "pkg_release");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_VERSION, "pkg_version");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_NAME, "pkg_name");
4b6aa8
+    const char *bt = "{ \"signal\": 6, \"executable\": \"/usr/bin/will_abort\" }";
4b6aa8
+    dd_save_text(dd, FILENAME_CORE_BACKTRACE, bt);
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    char *json = ureport_from_dump_dir_ext("./test", NULL);
4b6aa8
+
4b6aa8
+    /* wrong url */
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    struct post_state *post_state = ureport_do_post(json, &config, "not_exist");
4b6aa8
+    assert(post_state->curl_result == CURLE_COULDNT_RESOLVE_HOST);
4b6aa8
+
4b6aa8
+    free(post_state);
4b6aa8
+    free(json);
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    delete_dump_dir("./test");
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## --------------- ##
4b6aa8
+##  ureport_submit ##
4b6aa8
+## --------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_submit],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct dump_dir *dd = dd_create("./test", (uid_t)-1L, DEFAULT_DUMP_DIR_MODE);
4b6aa8
+    assert(dd != NULL);
4b6aa8
+    dd_create_basic_files(dd, (uid_t)-1L, NULL);
4b6aa8
+    dd_save_text(dd, FILENAME_TYPE, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_ANALYZER, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_EPOCH, "pkg_epoch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_ARCH, "pkg_arch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_RELEASE, "pkg_release");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_VERSION, "pkg_version");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_NAME, "pkg_name");
4b6aa8
+    const char *bt = "{ \"signal\": 6, \"executable\": \"/usr/bin/will_abort\" }";
4b6aa8
+    dd_save_text(dd, FILENAME_CORE_BACKTRACE, bt);
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    char *json = ureport_from_dump_dir_ext("./test", NULL);
4b6aa8
+
4b6aa8
+    /* wrong url */
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+    struct ureport_server_response *response = ureport_submit(json, &config);
4b6aa8
+
4b6aa8
+    assert(response == NULL);
4b6aa8
+
4b6aa8
+    ureport_server_response_free(response);
4b6aa8
+    free(json);
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    delete_dump_dir("./test");
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## --------------------------- ##
4b6aa8
+## ureport_json_attachment_new ##
4b6aa8
+## --------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_json_attachment_new],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    char *json = ureport_json_attachment_new("data_bthash", "data_type", "data_data");
4b6aa8
+    assert(strcmp(json, "{ \"bthash\": \"data_bthash\", \"type\": \"data_type\", \"data\": \"data_data\" }") == 0);
4b6aa8
+    free(json);
4b6aa8
+
4b6aa8
+    json = ureport_json_attachment_new("", "", "");
4b6aa8
+    assert(strcmp(json, "{ \"bthash\": \"\", \"type\": \"\", \"data\": \"\" }") == 0);
4b6aa8
+    free(json);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## --------------------- ##
4b6aa8
+## ureport_attach_string ##
4b6aa8
+## --------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_attach_string],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    /* wrong url */
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    bool res = ureport_attach_string("691cf824e3e07457156125636e86c50279e29496", "email", "abrt@email.com", &config);
4b6aa8
+    assert(res == true);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ------------------ ##
4b6aa8
+## ureport_attach_int ##
4b6aa8
+## ------------------ ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_attach_int],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    /* wrong url */
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    bool res = ureport_attach_int("691cf824e3e07457156125636e86c50279e29496", "count", 5, &config);
4b6aa8
+    assert(res == true);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
+## ------------------------- ##
4b6aa8
+## ureport_from_dump_dir_ext ##
4b6aa8
+## ------------------------- ##
4b6aa8
+
4b6aa8
+AT_TESTFUN([ureport_from_dump_dir_ext],
4b6aa8
+[[
4b6aa8
+#include "internal_libreport.h"
4b6aa8
+#include "ureport.h"
4b6aa8
+#include <assert.h>
4b6aa8
+#include "libreport_curl.h"
4b6aa8
+#include "problem_data.h"
4b6aa8
+
4b6aa8
+int main(void)
4b6aa8
+{
4b6aa8
+    g_verbose=3;
4b6aa8
+
4b6aa8
+    struct dump_dir *dd = dd_create("./test", (uid_t)-1L, DEFAULT_DUMP_DIR_MODE);
4b6aa8
+    assert(dd != NULL);
4b6aa8
+    dd_create_basic_files(dd, (uid_t)-1L, NULL);
4b6aa8
+    dd_save_text(dd, FILENAME_TYPE, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_ANALYZER, "CCpp");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_EPOCH, "pkg_epoch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_ARCH, "pkg_arch");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_RELEASE, "pkg_release");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_VERSION, "pkg_version");
4b6aa8
+    dd_save_text(dd, FILENAME_PKG_NAME, "pkg_name");
4b6aa8
+    const char *bt = "{ \"signal\": 6, \"executable\": \"/usr/bin/will_abort\" }";
4b6aa8
+    dd_save_text(dd, FILENAME_CORE_BACKTRACE, bt);
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    /* no auth */
4b6aa8
+    char *ureport = ureport_from_dump_dir_ext("./test", NULL);
4b6aa8
+    assert(strstr(ureport, "auth") == NULL);
4b6aa8
+    free(ureport);
4b6aa8
+
4b6aa8
+    /* auth */
4b6aa8
+    dd = dd_opendir("./test", 0);
4b6aa8
+    dd_save_text(dd, FILENAME_HOSTNAME, "env_hostname");
4b6aa8
+    dd_close(dd);
4b6aa8
+
4b6aa8
+    struct ureport_server_config config;
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    map_string_t *settings = new_map_string();
4b6aa8
+
4b6aa8
+    setenv("uReport_IncludeAuthData", "yes", 1);
4b6aa8
+    setenv("uReport_AuthDataItems", "hostname", 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    ureport = ureport_from_dump_dir_ext("./test", &config.ur_prefs);
4b6aa8
+    assert(strstr(ureport, "auth") != NULL);
4b6aa8
+    assert(strstr(ureport, "\"hostname\": \"env_hostname\"") != NULL);
4b6aa8
+    free(ureport);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    free_map_string(settings);
4b6aa8
+
4b6aa8
+    /* auth with unknown uReport_AuthDataItems */
4b6aa8
+    ureport_server_config_init(&config);
4b6aa8
+
4b6aa8
+    settings = new_map_string();
4b6aa8
+
4b6aa8
+    setenv("uReport_AuthDataItems", "hostname, unknown", 1);
4b6aa8
+
4b6aa8
+    ureport_server_config_load(&config, settings);
4b6aa8
+
4b6aa8
+    ureport = ureport_from_dump_dir_ext("./test", &config.ur_prefs);
4b6aa8
+    assert(strstr(ureport, "auth") != NULL);
4b6aa8
+    assert(strstr(ureport, "\"hostname\": \"env_hostname\"") != NULL);
4b6aa8
+    assert(strstr(ureport, "unknown") == NULL);
4b6aa8
+    free(ureport);
4b6aa8
+
4b6aa8
+    ureport_server_config_destroy(&config);
4b6aa8
+    free_map_string(settings);
4b6aa8
+    delete_dump_dir("./test");
4b6aa8
+
4b6aa8
+    return 0;
4b6aa8
+}
4b6aa8
+]])
4b6aa8
+
4b6aa8
diff --git a/tests/ureport/certs/correct/cert-key.pem b/tests/ureport/certs/correct/cert-key.pem
4b6aa8
new file mode 100644
4b6aa8
index 0000000..1516328
4b6aa8
--- /dev/null
4b6aa8
+++ b/tests/ureport/certs/correct/cert-key.pem
4b6aa8
@@ -0,0 +1,5 @@
4b6aa8
+-----BEGIN RSA PRIVATE KEY-----
4b6aa8
+rsa
4b6aa8
+private
4b6aa8
+key
4b6aa8
+-----END RSA PRIVATE KEY-----
4b6aa8
diff --git a/tests/ureport/certs/correct/cert.pem b/tests/ureport/certs/correct/cert.pem
4b6aa8
new file mode 100644
4b6aa8
index 0000000..ee54de3
4b6aa8
--- /dev/null
4b6aa8
+++ b/tests/ureport/certs/correct/cert.pem
4b6aa8
@@ -0,0 +1,13 @@
4b6aa8
+-----BEGIN CERTIFICATE-----
4b6aa8
+cer
4b6aa8
+tifica
4b6aa8
+te
4b6aa8
+-----END CERTIFICATE-----
4b6aa8
+-----BEGIN ENTITLEMENT DATA-----
4b6aa8
+entitlement
4b6aa8
+data
4b6aa8
+-----END ENTITLEMENT DATA-----
4b6aa8
+-----BEGIN RSA SIGNATURE-----
4b6aa8
+rsa
4b6aa8
+signature
4b6aa8
+-----END RSA SIGNATURE-----
4b6aa8
diff --git a/tests/ureport/certs/incorrect_content/cert-key.pem b/tests/ureport/certs/incorrect_content/cert-key.pem
4b6aa8
new file mode 100644
4b6aa8
index 0000000..1516328
4b6aa8
--- /dev/null
4b6aa8
+++ b/tests/ureport/certs/incorrect_content/cert-key.pem
4b6aa8
@@ -0,0 +1,5 @@
4b6aa8
+-----BEGIN RSA PRIVATE KEY-----
4b6aa8
+rsa
4b6aa8
+private
4b6aa8
+key
4b6aa8
+-----END RSA PRIVATE KEY-----
4b6aa8
diff --git a/tests/ureport/certs/incorrect_content/cert.pem b/tests/ureport/certs/incorrect_content/cert.pem
4b6aa8
new file mode 100644
4b6aa8
index 0000000..e69de29
4b6aa8
diff --git a/tests/ureport/rhsm/__init__.py b/tests/ureport/rhsm/__init__.py
4b6aa8
new file mode 100644
4b6aa8
index 0000000..e69de29
4b6aa8
diff --git a/tests/ureport/rhsm/config.py b/tests/ureport/rhsm/config.py
4b6aa8
new file mode 100644
4b6aa8
index 0000000..44483d8
4b6aa8
--- /dev/null
4b6aa8
+++ b/tests/ureport/rhsm/config.py
4b6aa8
@@ -0,0 +1,8 @@
4b6aa8
+import os
4b6aa8
+
4b6aa8
+def initConfig():
4b6aa8
+    return myConfig()
4b6aa8
+
4b6aa8
+class myConfig():
4b6aa8
+    def get(self, key, value):
4b6aa8
+        return os.path.abspath("../../ureport/certs/correct")
4b6aa8
-- 
4b6aa8
1.8.3.1
4b6aa8