xref: /aosp_15_r20/external/libxml2/python/tests/xpathext.py (revision 7c5688314b92172186c154356a6374bf7684c3ca)
1*7c568831SAndroid Build Coastguard Worker#!/usr/bin/env python3
2*7c568831SAndroid Build Coastguard Workerimport sys
3*7c568831SAndroid Build Coastguard Workerimport setup_test
4*7c568831SAndroid Build Coastguard Workerimport libxml2
5*7c568831SAndroid Build Coastguard Worker
6*7c568831SAndroid Build Coastguard Worker# Memory debug specific
7*7c568831SAndroid Build Coastguard Workerlibxml2.debugMemory(1)
8*7c568831SAndroid Build Coastguard Worker
9*7c568831SAndroid Build Coastguard Workerdef foo(ctx, x):
10*7c568831SAndroid Build Coastguard Worker    return x + 1
11*7c568831SAndroid Build Coastguard Worker
12*7c568831SAndroid Build Coastguard Workerdef bar(ctx, x):
13*7c568831SAndroid Build Coastguard Worker    return "%d" % (x + 2)
14*7c568831SAndroid Build Coastguard Worker
15*7c568831SAndroid Build Coastguard Workerdoc = libxml2.parseFile("tst.xml")
16*7c568831SAndroid Build Coastguard Workerctxt = doc.xpathNewContext()
17*7c568831SAndroid Build Coastguard Workerres = ctxt.xpathEval("//*")
18*7c568831SAndroid Build Coastguard Workerif len(res) != 2:
19*7c568831SAndroid Build Coastguard Worker    print("xpath query: wrong node set size")
20*7c568831SAndroid Build Coastguard Worker    sys.exit(1)
21*7c568831SAndroid Build Coastguard Workerif res[0].name != "doc" or res[1].name != "foo":
22*7c568831SAndroid Build Coastguard Worker    print("xpath query: wrong node set value")
23*7c568831SAndroid Build Coastguard Worker    sys.exit(1)
24*7c568831SAndroid Build Coastguard Worker
25*7c568831SAndroid Build Coastguard Workerlibxml2.registerXPathFunction(ctxt._o, "foo", None, foo)
26*7c568831SAndroid Build Coastguard Workerlibxml2.registerXPathFunction(ctxt._o, "bar", None, bar)
27*7c568831SAndroid Build Coastguard Workeri = 10000
28*7c568831SAndroid Build Coastguard Workerwhile i > 0:
29*7c568831SAndroid Build Coastguard Worker    res = ctxt.xpathEval("foo(1)")
30*7c568831SAndroid Build Coastguard Worker    if res != 2:
31*7c568831SAndroid Build Coastguard Worker        print("xpath extension failure")
32*7c568831SAndroid Build Coastguard Worker        sys.exit(1)
33*7c568831SAndroid Build Coastguard Worker    i = i - 1
34*7c568831SAndroid Build Coastguard Workeri = 10000
35*7c568831SAndroid Build Coastguard Workerwhile i > 0:
36*7c568831SAndroid Build Coastguard Worker    res = ctxt.xpathEval("bar(1)")
37*7c568831SAndroid Build Coastguard Worker    if res != "3":
38*7c568831SAndroid Build Coastguard Worker        print("xpath extension failure got %s expecting '3'")
39*7c568831SAndroid Build Coastguard Worker        sys.exit(1)
40*7c568831SAndroid Build Coastguard Worker    i = i - 1
41*7c568831SAndroid Build Coastguard Workerdoc.freeDoc()
42*7c568831SAndroid Build Coastguard Workerctxt.xpathFreeContext()
43*7c568831SAndroid Build Coastguard Worker
44*7c568831SAndroid Build Coastguard Worker# Memory debug specific
45*7c568831SAndroid Build Coastguard Workerlibxml2.cleanupParser()
46*7c568831SAndroid Build Coastguard Workerif libxml2.debugMemory(1) == 0:
47*7c568831SAndroid Build Coastguard Worker    print("OK")
48*7c568831SAndroid Build Coastguard Workerelse:
49*7c568831SAndroid Build Coastguard Worker    print("Memory leak %d bytes" % (libxml2.debugMemory(1)))
50