Timothe Litt via curl-library <curl-library@lists.haxx.se> wrote on 2022-09-25 
at 10:29:51:

> Looks like to get anything useful from the telnet server log, you need 
> to specify --verbose there.
> 
> See curl/tests/negtelnetserver.py

As it turns out this can be enabled with runtest.pl's "-d" flag.

With it I get:

fk@t520 ~/git/curl/tests $./runtests.pl -v -d 1452
CMD (256): valgrind >/dev/null 2>&1
CMD (0): valgrind --help 2>&1 | grep -- --tool > /dev/null 2>&1
CMD (0): ../src/curl --version 1>log/curlverout.log 2>log/curlvererr.log
********* System characteristics ******** 
* curl 7.86.0-DEV (amd64-unknown-freebsd13.1) 
* libcurl/7.86.0-DEV OpenSSL/1.1.1q zlib/1.2.12 libidn2/2.3.2 libpsl/0.21.1 
(+libidn2/2.3.2) nghttp2/1.48.0
* Features: alt-svc AsynchDNS Debug HSTS HTTP2 HTTPS-proxy IDN IPv6 Largefile 
libz NTLM NTLM_WB PSL SSL threadsafe TLS-SRP TrackMemory UnixSockets
* Disabled: 
* Host: t520.local
* System: ElectroBSD t520.local 13.1-STABLE ElectroBSD 13.1-STABLE #28 
electrobsd-n252821-8ff5d83a0f97: Sat Sep 24 14:45:58 UTC 2022     
fk@t520.local:/usr/obj/usr/src/amd64.amd64/sys/ELECTRO_BEER amd64
* OS: freebsd
*
*** DISABLES memory tracking when using threaded resolver
*
* Servers: SSL HTTP-IPv6 HTTP-unix FTP-IPv6 
* Env: Valgrind 
* Seed: 257280
* Unix socket paths:
*   HTTP-Unix:http52019.sock
*   Socks-Unix:/home/fk/git/curl/tests/socks52019.sock
***************************************** 
DISABLED: test 323
DISABLED: test 594
DISABLED: test 836
DISABLED: test 882
DISABLED: test 938
DISABLED: test 1182
DISABLED: test 1184
DISABLED: test 1209
DISABLED: test 1211
DISABLED: test 1307
DISABLED: test 1316
DISABLED: test 1510
DISABLED: test 1512
DISABLED: test 1801
DISABLED: test 2086
DISABLED: test 2043
startnew: ./negtelnetserver.py --port 32151 --verbose 1 --pidfile 
".telnet_server.pid" --logfile "log/telnet_server.log" --srcdir "."
2022-09-29 09:33:14,320 INFO  [NTEL] Listening on ('localhost', 32151)
RUN: TELNET server PID 19262 port 32151
* pid neg TELNET => 19262 19262
test 1452...[Basic TELNET negotiation]
/usr/local/bin/valgrind --tool=memcheck --verbose --leak-check=yes 
--suppressions=./valgrind.supp --num-callers=16 --log-file=log/valgrind1452 
../src/curl --include --trace-ascii log/trace1452 --trace-time 
telnet://127.0.0.1:32151 --upload-file - <log/stdin-for-1452 >log/stdout1452 
2>log/stderr1452
2022-09-29 09:33:16,590 DEBUG [NTEL] Sending DO NEW_ENVIRON
2022-09-29 09:33:16,590 DEBUG [NTEL] Sending WILL NEW_ENVIRON
2022-09-29 09:33:16,591 DEBUG [NTEL] Sending DONT NAWS
2022-09-29 09:33:16,591 DEBUG [NTEL] Sending WONT NAWS
2022-09-29 09:33:16,628 DEBUG [NTEL] Starting negotiation (IAC)
2022-09-29 09:33:16,629 DEBUG [NTEL] In negotiation (WONT)
2022-09-29 09:33:16,629 DEBUG [NTEL] Client is unwilling
2022-09-29 09:33:16,629 DEBUG [NTEL] Option: NEW_ENVIRON
2022-09-29 09:33:16,632 DEBUG [NTEL] Starting negotiation (IAC)
2022-09-29 09:33:16,632 DEBUG [NTEL] In negotiation (WILL)
2022-09-29 09:33:16,632 DEBUG [NTEL] Client is willing
2022-09-29 09:33:16,632 DEBUG [NTEL] Option: BINARY
2022-09-29 09:33:16,633 DEBUG [NTEL] Starting negotiation (IAC)
2022-09-29 09:33:16,633 DEBUG [NTEL] In negotiation (DO)
2022-09-29 09:33:16,633 DEBUG [NTEL] Client can do
2022-09-29 09:33:16,634 DEBUG [NTEL] Option: BINARY
2022-09-29 09:33:16,634 DEBUG [NTEL] Starting negotiation (IAC)
2022-09-29 09:33:16,634 DEBUG [NTEL] In negotiation (WILL)
2022-09-29 09:33:16,634 DEBUG [NTEL] Client is willing
2022-09-29 09:33:16,634 DEBUG [NTEL] Option: SUPPRESS_GO_AHEAD
2022-09-29 09:33:16,635 DEBUG [NTEL] Starting negotiation (IAC)
2022-09-29 09:33:16,635 DEBUG [NTEL] In negotiation (DO)
2022-09-29 09:33:16,635 DEBUG [NTEL] Client can do
2022-09-29 09:33:16,635 DEBUG [NTEL] Option: SUPPRESS_GO_AHEAD
2022-09-29 09:33:16,638 DEBUG [NTEL] Incoming data: bytearray(b'test1452\n')
2022-09-29 09:33:16,638 DEBUG [NTEL] Received normal request - echoing back
2022-09-29 09:33:16,639 DEBUG [NTEL] Sending b'test1452'
CMD (14336): /usr/local/bin/valgrind --tool=memcheck --verbose --leak-check=yes 
--suppressions=./valgrind.supp --num-callers=16 --log-file=log/valgrind1452 
../src/curl --include --trace-ascii log/trace1452 --trace-time 
telnet://127.0.0.1:32151 --upload-file - <log/stdin-for-1452 >log/stdout1452 
2>log/stderr1452

curl returned 56, when expecting 0
 exit FAILED

 - abort tests
* kill pid for telnet => 19262
RUN: Process with pid 19262 signalled to die
RUN: Process with pid 19262 forced to die with SIGKILL
TESTDONE: 1 tests were considered during 3 seconds.
TESTDONE: 0 tests out of 1 reported OK: 0%

TESTFAIL: These test cases failed: 1452 

So it seems to me that the telnet server isn't at fault here.

> Beyond that, I'll let someone closer to the tests take over.

Thanks for your replies.

Fabian

Attachment: pgp6kxaBFNUKt.pgp
Description: OpenPGP digital signature

-- 
Unsubscribe: https://lists.haxx.se/listinfo/curl-library
Etiquette:   https://curl.se/mail/etiquette.html

Reply via email to