mlua/src/tests.rs

622 lines
17 KiB
Rust
Raw Normal View History

2017-05-21 18:50:59 -05:00
use std::fmt;
use std::error;
use std::rc::Rc;
2017-05-21 18:50:59 -05:00
use std::panic::catch_unwind;
use {Error, ExternalError, Function, Lua, Nil, Result, Table, UserData, Value, Variadic};
2017-05-21 18:50:59 -05:00
#[test]
fn test_load() {
let lua = Lua::new();
let func = lua.load("return 1+2", None).unwrap();
let result: i32 = func.call(()).unwrap();
assert_eq!(result, 3);
assert!(lua.load("§$%§&$%&", None).is_err());
}
#[test]
fn test_debug() {
let lua = unsafe { Lua::new_with_debug() };
match lua.eval("debug", None).unwrap() {
2017-12-02 17:56:14 -06:00
Value::Table(_) => {}
val => panic!("Expected table for debug library, got {:#?}", val),
}
let traceback_output = lua.eval::<String>("debug.traceback()", None).unwrap();
2017-12-02 17:56:14 -06:00
assert_eq!(
traceback_output.split("\n").next(),
"stack traceback:".into()
);
}
2017-05-21 18:50:59 -05:00
#[test]
fn test_exec() {
2017-05-21 18:50:59 -05:00
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
res = 'foo'..'bar'
"#,
None,
).unwrap();
assert_eq!(globals.get::<_, String>("res").unwrap(), "foobar");
let module: Table = lua.exec(
r#"
local module = {}
function module.func()
return "hello"
end
return module
"#,
None,
).unwrap();
assert!(module.contains_key("func").unwrap());
2017-06-15 09:26:39 -05:00
assert_eq!(
module
.get::<_, Function>("func")
2017-06-15 09:26:39 -05:00
.unwrap()
.call::<_, String>(())
.unwrap(),
"hello"
);
2017-05-21 18:50:59 -05:00
}
#[test]
fn test_eval() {
let lua = Lua::new();
assert_eq!(lua.eval::<i32>("1 + 1", None).unwrap(), 2);
assert_eq!(lua.eval::<bool>("false == false", None).unwrap(), true);
assert_eq!(lua.eval::<i32>("return 1 + 2", None).unwrap(), 3);
match lua.eval::<()>("if true then", None) {
2017-10-23 15:42:20 -05:00
Err(Error::SyntaxError {
incomplete_input: true,
..
}) => {}
r => panic!(
"expected SyntaxError with incomplete_input=true, got {:?}",
r
),
2017-05-21 18:50:59 -05:00
}
}
#[test]
fn test_lua_multi() {
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
function concat(arg1, arg2)
return arg1 .. arg2
end
function mreturn()
return 1, 2, 3, 4, 5, 6
end
"#,
None,
).unwrap();
2017-05-21 18:50:59 -05:00
let concat = globals.get::<_, Function>("concat").unwrap();
let mreturn = globals.get::<_, Function>("mreturn").unwrap();
2017-05-21 18:50:59 -05:00
assert_eq!(concat.call::<_, String>(("foo", "bar")).unwrap(), "foobar");
let (a, b) = mreturn.call::<_, (u64, u64)>(()).unwrap();
2017-05-21 18:50:59 -05:00
assert_eq!((a, b), (1, 2));
let (a, b, v) = mreturn.call::<_, (u64, u64, Variadic<u64>)>(()).unwrap();
2017-05-21 18:50:59 -05:00
assert_eq!((a, b), (1, 2));
assert_eq!(v[..], [3, 4, 5, 6]);
2017-05-21 18:50:59 -05:00
}
#[test]
fn test_coercion() {
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
int = 123
str = "123"
num = 123.0
"#,
None,
).unwrap();
2017-05-21 18:50:59 -05:00
assert_eq!(globals.get::<_, String>("int").unwrap(), "123");
assert_eq!(globals.get::<_, i32>("str").unwrap(), 123);
assert_eq!(globals.get::<_, i32>("num").unwrap(), 123);
2017-05-21 18:50:59 -05:00
}
#[test]
fn test_error() {
#[derive(Debug)]
pub struct TestError;
impl fmt::Display for TestError {
fn fmt(&self, fmt: &mut fmt::Formatter) -> fmt::Result {
2017-05-21 18:50:59 -05:00
write!(fmt, "test error")
}
}
impl error::Error for TestError {
2017-05-21 18:50:59 -05:00
fn description(&self) -> &str {
"test error"
}
fn cause(&self) -> Option<&error::Error> {
2017-05-21 18:50:59 -05:00
None
}
}
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
function no_error()
end
function lua_error()
error("this is a lua error")
end
function rust_error()
rust_error_function()
end
function return_error()
local status, res = pcall(rust_error_function)
assert(not status)
return res
end
function return_string_error()
return "this should be converted to an error"
end
2017-05-21 18:50:59 -05:00
function test_pcall()
local testvar = 0
pcall(function(arg)
testvar = testvar + arg
error("should be ignored")
end, 3)
local function handler(err)
testvar = testvar + err
return "should be ignored"
end
local status, res = xpcall(function()
2017-05-21 18:50:59 -05:00
error(5)
end, handler)
assert(not status)
2017-05-21 18:50:59 -05:00
if testvar ~= 8 then
error("testvar had the wrong value, pcall / xpcall misbehaving "..testvar)
end
end
function understand_recursion()
understand_recursion()
end
"#,
None,
).unwrap();
2017-05-21 18:50:59 -05:00
let rust_error_function = lua.create_function(|_, ()| -> Result<()> {
Err(TestError.to_lua_err())
}).unwrap();
globals
.set("rust_error_function", rust_error_function)
.unwrap();
2017-05-21 18:50:59 -05:00
let no_error = globals.get::<_, Function>("no_error").unwrap();
let lua_error = globals.get::<_, Function>("lua_error").unwrap();
let rust_error = globals.get::<_, Function>("rust_error").unwrap();
let return_error = globals.get::<_, Function>("return_error").unwrap();
2017-07-24 09:40:00 -05:00
let return_string_error = globals.get::<_, Function>("return_string_error").unwrap();
let test_pcall = globals.get::<_, Function>("test_pcall").unwrap();
2017-07-24 09:40:00 -05:00
let understand_recursion = globals.get::<_, Function>("understand_recursion").unwrap();
2017-05-21 18:50:59 -05:00
assert!(no_error.call::<_, ()>(()).is_ok());
match lua_error.call::<_, ()>(()) {
Err(Error::RuntimeError(_)) => {}
Err(_) => panic!("error is not RuntimeError kind"),
2017-06-17 22:50:40 -05:00
_ => panic!("error not returned"),
2017-05-21 18:50:59 -05:00
}
match rust_error.call::<_, ()>(()) {
Err(Error::CallbackError { .. }) => {}
Err(_) => panic!("error is not CallbackError kind"),
2017-06-17 22:50:40 -05:00
_ => panic!("error not returned"),
2017-05-21 18:50:59 -05:00
}
match return_error.call::<_, Value>(()) {
Ok(Value::Error(_)) => {}
_ => panic!("Value::Error not returned"),
}
assert!(return_string_error.call::<_, Error>(()).is_ok());
match lua.eval::<()>("if youre happy and you know it syntax error", None) {
2017-10-23 15:42:20 -05:00
Err(Error::SyntaxError {
incomplete_input: false,
..
}) => {}
Err(_) => panic!("error is not LuaSyntaxError::Syntax kind"),
_ => panic!("error not returned"),
}
match lua.eval::<()>("function i_will_finish_what_i()", None) {
2017-10-23 15:42:20 -05:00
Err(Error::SyntaxError {
incomplete_input: true,
..
}) => {}
Err(_) => panic!("error is not LuaSyntaxError::IncompleteStatement kind"),
_ => panic!("error not returned"),
}
2017-05-21 18:50:59 -05:00
test_pcall.call::<_, ()>(()).unwrap();
assert!(understand_recursion.call::<_, ()>(()).is_err());
match catch_unwind(|| -> Result<()> {
2017-05-21 18:50:59 -05:00
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
function rust_panic()
pcall(function () rust_panic_function() end)
end
"#,
None,
)?;
2017-08-01 13:09:47 -05:00
let rust_panic_function = lua.create_function(|_, ()| -> Result<()> {
2017-05-21 18:50:59 -05:00
panic!("expected panic, this panic should be caught in rust")
}).unwrap();
globals.set("rust_panic_function", rust_panic_function)?;
2017-05-21 18:50:59 -05:00
let rust_panic = globals.get::<_, Function>("rust_panic")?;
2017-05-21 18:50:59 -05:00
rust_panic.call::<_, ()>(())
}) {
Ok(Ok(_)) => panic!("no panic was detected, pcall caught it!"),
Ok(Err(e)) => panic!("error during panic test {:?}", e),
Err(_) => {}
};
match catch_unwind(|| -> Result<()> {
2017-05-21 18:50:59 -05:00
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
lua.exec::<()>(
r#"
2017-05-21 18:50:59 -05:00
function rust_panic()
xpcall(function() rust_panic_function() end, function() end)
end
"#,
None,
)?;
2017-08-01 13:09:47 -05:00
let rust_panic_function = lua.create_function(|_, ()| -> Result<()> {
2017-05-21 18:50:59 -05:00
panic!("expected panic, this panic should be caught in rust")
}).unwrap();
globals.set("rust_panic_function", rust_panic_function)?;
2017-05-21 18:50:59 -05:00
let rust_panic = globals.get::<_, Function>("rust_panic")?;
2017-05-21 18:50:59 -05:00
rust_panic.call::<_, ()>(())
}) {
Ok(Ok(_)) => panic!("no panic was detected, xpcall caught it!"),
Ok(Err(e)) => panic!("error during panic test {:?}", e),
Err(_) => {}
};
}
#[test]
fn test_result_conversions() {
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
2017-08-01 13:09:47 -05:00
let err = lua.create_function(|_, ()| {
Ok(Err::<String, _>(
format_err!("only through failure can we succeed").to_lua_err(),
))
}).unwrap();
let ok = lua.create_function(|_, ()| Ok(Ok::<_, Error>("!".to_owned())))
.unwrap();
globals.set("err", err).unwrap();
globals.set("ok", ok).unwrap();
lua.exec::<()>(
r#"
local r, e = err()
assert(r == nil)
assert(tostring(e) == "only through failure can we succeed")
local r, e = ok()
assert(r == "!")
assert(e == nil)
"#,
None,
).unwrap();
}
2017-06-21 16:53:52 -05:00
#[test]
fn test_num_conversion() {
let lua = Lua::new();
Another major API change, out of stack space is not an Err It, ahem "should not" be possible to exhaust lua stack space in normal usage, and causing stack errors to be Err is slightly obnoxious. I have been wanting to make this change for a while, and removing the callback API from tables makes this sensible *I think*. I can think of a couple of ways that this is not technically true, but I think that they are acceptable, or should be handled differently. One, you can make arbitrarily sized LuaVariadic values. I think this is maybe a bug already, because there is an argument limit in Lua which is lower than the stack limit. I'm not sure what happens there, but if it is a stack based panic, (or any panic?) it is a bug. Two, I believe that if you recurse over and over between lua -> rust -> lua -> rust etc, and call rlua API functions, you might get a stack panic. I think for trusted lua code, this is morally equivalent to a regular stack overflow in plain rust, which is already.. well it's not a panic but it's some kind of safe crash I'm not sure, so I think this is acceptable. For *untrusted* lua code, this could theoretically be a problem if the API provided a callback that would call back into lua, then some lua script could force a stack based panic. There are so many concerns with untrusted lua code, and this library is NOT safe enough yet for untrusted code (it doesn't even provide an option to limit lua to the safe API subset yet!), so this is not currently an issue. When the library provides support for "safe lua", it should come with big warnings anyway, and being able to force a stack panic is pretty minor in comparison. I think if there are other ways to cause unbounded stack usage, that it is a bug, or there can be an error just for that situation, like argument count limits. This commit also fixes several stupid bugs with tests, stack checking, and panics.
2017-06-25 15:52:32 -05:00
let globals = lua.globals();
2017-06-21 16:53:52 -05:00
globals.set("n", "1.0").unwrap();
assert_eq!(globals.get::<_, i64>("n").unwrap(), 1);
assert_eq!(globals.get::<_, f64>("n").unwrap(), 1.0);
assert_eq!(globals.get::<_, String>("n").unwrap(), "1.0");
globals.set("n", "1.5").unwrap();
assert!(globals.get::<_, i64>("n").is_err());
assert_eq!(globals.get::<_, f64>("n").unwrap(), 1.5);
assert_eq!(globals.get::<_, String>("n").unwrap(), "1.5");
globals.set("n", 1.5).unwrap();
assert!(globals.get::<_, i64>("n").is_err());
assert_eq!(globals.get::<_, f64>("n").unwrap(), 1.5);
assert_eq!(globals.get::<_, String>("n").unwrap(), "1.5");
lua.exec::<()>("a = math.huge", None).unwrap();
assert!(globals.get::<_, i64>("n").is_err());
2017-06-21 16:53:52 -05:00
}
#[test]
fn test_pcall_xpcall() {
let lua = Lua::new();
let globals = lua.globals();
// make sure that we handle not enough arguments
assert!(lua.exec::<()>("pcall()", None).is_err());
assert!(lua.exec::<()>("xpcall()", None).is_err());
assert!(lua.exec::<()>("xpcall(function() end)", None).is_err());
// Make sure that the return values from are correct on success
2017-12-02 17:56:14 -06:00
assert_eq!(
lua.eval::<(bool, String)>("pcall(function(p) return p end, 'foo')", None)
.unwrap(),
(true, "foo".to_owned())
);
assert_eq!(
lua.eval::<(bool, String)>("xpcall(function(p) return p end, print, 'foo')", None)
.unwrap(),
(true, "foo".to_owned())
);
// Make sure that the return values are correct on errors, and that error handling works
lua.exec::<()>(
r#"
pcall_error = nil
pcall_status, pcall_error = pcall(error, "testerror")
xpcall_error = nil
xpcall_status, _ = xpcall(error, function(err) xpcall_error = err end, "testerror")
"#,
None,
).unwrap();
assert_eq!(globals.get::<_, bool>("pcall_status").unwrap(), false);
assert_eq!(
2017-08-02 14:56:16 -05:00
globals.get::<_, String>("pcall_error").unwrap(),
"testerror"
);
assert_eq!(globals.get::<_, bool>("xpcall_statusr").unwrap(), false);
assert_eq!(
2017-08-02 14:56:16 -05:00
globals.get::<_, String>("xpcall_error").unwrap(),
"testerror"
);
2017-08-02 14:56:16 -05:00
// Make sure that weird xpcall error recursion at least doesn't cause unsafety or panics.
lua.exec::<()>(
r#"
function xpcall_recursion()
xpcall(error, function(err) error(err) end, "testerror")
end
"#,
None,
).unwrap();
2017-08-02 14:56:16 -05:00
let _ = globals
.get::<_, Function>("xpcall_recursion")
.unwrap()
.call::<_, ()>(());
}
#[test]
fn test_recursive_callback_error() {
let lua = Lua::new();
let mut v = Some(Box::new(123));
let f = lua.create_function::<_, (), _>(move |lua, mutate: bool| {
if mutate {
v = None;
} else {
// Produce a mutable reference
let r = v.as_mut().unwrap();
// Whoops, this will recurse into the function and produce another mutable reference!
lua.globals().get::<_, Function>("f")?.call::<_, ()>(true)?;
println!("Should not get here, mutable aliasing has occurred!");
println!("value at {:p}", r as *mut _);
println!("value is {}", r);
}
Ok(())
}).unwrap();
lua.globals().set("f", f).unwrap();
match lua.globals()
.get::<_, Function>("f")
.unwrap()
.call::<_, ()>(false)
{
Err(Error::CallbackError { ref cause, .. }) => match *cause.as_ref() {
Error::CallbackError { ref cause, .. } => match *cause.as_ref() {
Error::RecursiveCallbackError { .. } => {}
ref other => panic!("incorrect result: {:?}", other),
},
ref other => panic!("incorrect result: {:?}", other),
},
other => panic!("incorrect result: {:?}", other),
};
}
2017-11-07 22:13:52 -06:00
#[test]
fn test_set_metatable_nil() {
let lua = Lua::new();
lua.exec::<()>(
2017-12-02 17:56:14 -06:00
r#"
2017-11-07 22:13:52 -06:00
a = {}
setmetatable(a, nil)
2017-12-02 17:56:14 -06:00
"#,
None,
).unwrap();
2017-11-07 22:13:52 -06:00
}
#[test]
fn test_gc_error() {
let lua = Lua::new();
match lua.exec::<()>(
r#"
val = nil
table = {}
setmetatable(table, {
__gc = function()
error("gcwascalled")
end
})
table = nil
collectgarbage("collect")
"#,
None,
) {
Err(Error::GarbageCollectorError(_)) => {}
Err(e) => panic!("__gc error did not result in correct error, instead: {}", e),
Ok(()) => panic!("__gc error did not result in error"),
}
}
#[test]
2017-12-16 17:05:53 -06:00
fn test_named_registry_value() {
let lua = Lua::new();
2017-12-16 17:05:53 -06:00
lua.set_named_registry_value::<i32>("test", 42).unwrap();
let f = lua.create_function(move |lua, ()| {
2017-12-16 17:05:53 -06:00
assert_eq!(lua.named_registry_value::<i32>("test")?, 42);
Ok(())
}).unwrap();
f.call::<_, ()>(()).unwrap();
2017-12-16 17:05:53 -06:00
lua.unset_named_registry_value("test").unwrap();
match lua.named_registry_value("test").unwrap() {
Nil => {}
val => panic!("registry value was not Nil, was {:?}", val),
};
}
#[test]
fn test_registry_value() {
let lua = Lua::new();
let mut r = Some(lua.create_registry_value::<i32>(42).unwrap());
let f = lua.create_function(move |lua, ()| {
if let Some(r) = r.take() {
assert_eq!(lua.registry_value::<i32>(&r)?, 42);
lua.remove_registry_value(r);
} else {
panic!();
}
Ok(())
}).unwrap();
f.call::<_, ()>(()).unwrap();
}
#[test]
fn test_drop_registry_value() {
struct MyUserdata(Rc<()>);
impl UserData for MyUserdata {}
let lua = Lua::new();
let rc = Rc::new(());
let r = lua.create_registry_value(MyUserdata(rc.clone())).unwrap();
assert_eq!(Rc::strong_count(&rc), 2);
drop(r);
lua.expire_registry_values();
lua.exec::<()>(r#"collectgarbage("collect")"#, None)
.unwrap();
assert_eq!(Rc::strong_count(&rc), 1);
}
#[test]
#[should_panic]
fn test_mismatched_lua_ref() {
let lua1 = Lua::new();
let lua2 = Lua::new();
let s = lua1.create_string("hello").unwrap();
let f = lua2.create_function(|_, _: String| Ok(())).unwrap();
f.call::<_, ()>(s).unwrap();
2018-02-05 23:54:04 -06:00
}
#[test]
fn test_lua_registry_ownership() {
let lua1 = Lua::new();
let lua2 = Lua::new();
let r1 = lua1.create_registry_value("hello").unwrap();
let r2 = lua2.create_registry_value("hello").unwrap();
assert!(lua1.owns_registry_value(&r1));
assert!(!lua2.owns_registry_value(&r1));
assert!(lua2.owns_registry_value(&r2));
assert!(!lua1.owns_registry_value(&r2));
}
#[test]
#[should_panic]
fn test_mismatched_registry_key() {
let lua1 = Lua::new();
let lua2 = Lua::new();
let r = lua1.create_registry_value("hello").unwrap();
lua2.remove_registry_value(r);
}
2017-09-30 00:13:58 -05:00
// TODO: Need to use compiletest-rs or similar to make sure these don't compile.
/*
#[test]
fn should_not_compile() {
let lua = Lua::new();
let globals = lua.globals();
// Should not allow userdata borrow to outlive lifetime of AnyUserData handle
struct MyUserData;
impl UserData for MyUserData {};
let userdata_ref;
{
let touter = globals.get::<_, Table>("touter").unwrap();
touter.set("userdata", lua.create_userdata(MyUserData)).unwrap();
let userdata = touter.get::<_, AnyUserData>("userdata").unwrap();
userdata_ref = userdata.borrow::<MyUserData>();
}
// Should not allow self borrow of lua, it can change addresses
globals.set("boom", lua.create_function(|_, _| {
lua.eval::<i32>("1 + 1", None)
})).unwrap();
}
*/