View Issue Details

IDProjectCategoryView StatusLast Update
0003581Compliance Test Tool (CTT) Unified Architecture3 - Feature Requestpublic2017-11-14 10:54
ReporterAlexander Ockel (Siemens AG) Assigned ToAlexander Allmendinger  
PrioritynormalSeverityminorReproducibilityalways
Status assignedResolutionopen 
Target Version1.04 
Summary0003581: C0 control codes are not escaped in results file
Description

Product Version: 1.2.336.273

All C0 control codes (Unicode characters 0 to 31), except 0x9, 0xA and 0xD, are not escaped when printed to the results file. This may lead to parse errors when further processing the results xml-file, e.g. in a CI system such as Jenkins.

In XML 1.1, the NUL control code is not allowed (see http://www.w3.org/TR/xml11/#charsets). The two other illegal characters are (0xFFFE, 0xFFFF) are currently being escaped. The other mentioned control codes (0x1,0x2,0x3...) should be escaped to be consistent with the properly escaped control chars (0x9,0xA,...).

Steps To Reproduce
  1. Call addError() method with String.fromCharCode(0) as parameter (or run the attached script)
  2. Find the non-escaped character(s) in the error description
TagsNo tags attached.
Attached Files
Files Affected

Activities

Alexander Allmendinger

2017-11-14 10:54

developer   ~0008706

This fix requires modification to the CTT binaries in a core component which will require extensive testing. Because of the lack of time we are going to defer this fix to the next release.

Issue History

Date Modified Username Field Change
2016-10-27 13:29 Alexander Ockel (Siemens AG) New Issue
2016-10-27 13:29 Alexander Ockel (Siemens AG) File Added: illegal_xml_chars.js
2017-08-10 15:45 Paul Hunkar Assigned To => Alexander Allmendinger
2017-08-10 15:45 Paul Hunkar Status new => assigned
2017-11-14 10:54 Alexander Allmendinger Note Added: 0008706
2017-11-14 10:54 Alexander Allmendinger Category Implementation Bug => Feature Request
2017-11-14 10:54 Alexander Allmendinger Target Version => 1.04
2019-01-28 14:14 Paul Hunkar Category Feature Request => 3 - Feature Request