Group all 69 projects into category subfolders under src/ and tests/ so the Rider Solution Explorer mirrors the module structure. Folders: Core, Server, Drivers (with a nested Driver CLIs subfolder), Client, Tooling. - Move every project folder on disk with git mv (history preserved as renames). - Recompute relative paths in 57 .csproj files: cross-category ProjectReferences, the lib/ HintPath+None refs in Driver.Historian.Wonderware, and the external mxaccessgw refs in Driver.Galaxy and its test project. - Rebuild ZB.MOM.WW.OtOpcUa.slnx with nested solution folders. - Re-prefix project paths in functional scripts (e2e, compliance, smoke SQL, integration, install). Build green (0 errors); unit tests pass. Docs left for a separate pass. Co-Authored-By: Claude Opus 4.7 (1M context) <noreply@anthropic.com>
77 lines
2.7 KiB
C#
77 lines
2.7 KiB
C#
using Shouldly;
|
|
using Xunit;
|
|
using ZB.MOM.WW.OtOpcUa.Client.CLI.Commands;
|
|
using ZB.MOM.WW.OtOpcUa.Client.CLI.Tests.Fakes;
|
|
using ZB.MOM.WW.OtOpcUa.Client.Shared.Models;
|
|
|
|
namespace ZB.MOM.WW.OtOpcUa.Client.CLI.Tests;
|
|
|
|
public class ConnectCommandTests
|
|
{
|
|
[Fact]
|
|
public async Task Execute_PrintsConnectionInfo()
|
|
{
|
|
var fakeService = new FakeOpcUaClientService
|
|
{
|
|
ConnectionInfoResult = new ConnectionInfo(
|
|
"opc.tcp://testhost:4840",
|
|
"MyServer",
|
|
"SignAndEncrypt",
|
|
"http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256",
|
|
"session-42",
|
|
"MySession")
|
|
};
|
|
var factory = new FakeOpcUaClientServiceFactory(fakeService);
|
|
var command = new ConnectCommand(factory)
|
|
{
|
|
Url = "opc.tcp://testhost:4840"
|
|
};
|
|
|
|
using var console = TestConsoleHelper.CreateConsole();
|
|
await command.ExecuteAsync(console);
|
|
|
|
var output = TestConsoleHelper.GetOutput(console);
|
|
output.ShouldContain("Connected to: opc.tcp://testhost:4840");
|
|
output.ShouldContain("Server: MyServer");
|
|
output.ShouldContain("Security Mode: SignAndEncrypt");
|
|
output.ShouldContain("Security Policy: http://opcfoundation.org/UA/SecurityPolicy#Basic256Sha256");
|
|
output.ShouldContain("Connection successful.");
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Execute_CallsConnectAndDisconnect()
|
|
{
|
|
var fakeService = new FakeOpcUaClientService();
|
|
var factory = new FakeOpcUaClientServiceFactory(fakeService);
|
|
var command = new ConnectCommand(factory)
|
|
{
|
|
Url = "opc.tcp://localhost:4840"
|
|
};
|
|
|
|
using var console = TestConsoleHelper.CreateConsole();
|
|
await command.ExecuteAsync(console);
|
|
|
|
fakeService.ConnectCalled.ShouldBeTrue();
|
|
fakeService.DisconnectCalled.ShouldBeTrue();
|
|
fakeService.DisposeCalled.ShouldBeTrue();
|
|
}
|
|
|
|
[Fact]
|
|
public async Task Execute_DisconnectsOnError()
|
|
{
|
|
var fakeService = new FakeOpcUaClientService
|
|
{
|
|
ConnectException = new InvalidOperationException("Connection refused")
|
|
};
|
|
var factory = new FakeOpcUaClientServiceFactory(fakeService);
|
|
var command = new ConnectCommand(factory)
|
|
{
|
|
Url = "opc.tcp://localhost:4840"
|
|
};
|
|
|
|
using var console = TestConsoleHelper.CreateConsole();
|
|
// The command should propagate the exception but still clean up.
|
|
// Since connect fails, service is null in finally, so no disconnect.
|
|
await Should.ThrowAsync<InvalidOperationException>(async () => await command.ExecuteAsync(console));
|
|
}
|
|
} |