mirror of
https://github.com/yusing/godoxy.git
synced 2026-04-27 02:38:33 +02:00
fix proxy rules behavior and implemented a few more rules and commands, dependencies upgrade
This commit is contained in:
@@ -3,249 +3,44 @@ package rules
|
||||
import (
|
||||
"testing"
|
||||
|
||||
E "github.com/yusing/go-proxy/internal/error"
|
||||
"github.com/yusing/go-proxy/internal/utils"
|
||||
. "github.com/yusing/go-proxy/internal/utils/testing"
|
||||
)
|
||||
|
||||
func TestParseSubjectArgs(t *testing.T) {
|
||||
t.Run("basic", func(t *testing.T) {
|
||||
subject, args, err := parse("rewrite / /foo/bar")
|
||||
ExpectNoError(t, err)
|
||||
ExpectEqual(t, subject, "rewrite")
|
||||
ExpectDeepEqual(t, args, []string{"/", "/foo/bar"})
|
||||
})
|
||||
t.Run("with quotes", func(t *testing.T) {
|
||||
subject, args, err := parse(`error 403 "Forbidden 'foo' 'bar'."`)
|
||||
ExpectNoError(t, err)
|
||||
ExpectEqual(t, subject, "error")
|
||||
ExpectDeepEqual(t, args, []string{"403", "Forbidden 'foo' 'bar'."})
|
||||
})
|
||||
t.Run("with escaped", func(t *testing.T) {
|
||||
subject, args, err := parse(`error 403 Forbidden\ \"foo\"\ \"bar\".`)
|
||||
ExpectNoError(t, err)
|
||||
ExpectEqual(t, subject, "error")
|
||||
ExpectDeepEqual(t, args, []string{"403", "Forbidden \"foo\" \"bar\"."})
|
||||
})
|
||||
}
|
||||
|
||||
func TestParseCommands(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
input string
|
||||
wantErr error
|
||||
}{
|
||||
// bypass tests
|
||||
{
|
||||
name: "bypass_valid",
|
||||
input: "bypass",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "bypass_invalid_with_args",
|
||||
input: "bypass /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// rewrite tests
|
||||
{
|
||||
name: "rewrite_valid",
|
||||
input: "rewrite / /foo/bar",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "rewrite_missing_target",
|
||||
input: "rewrite /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "rewrite_too_many_args",
|
||||
input: "rewrite / / /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "rewrite_no_leading_slash",
|
||||
input: "rewrite abc /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// serve tests
|
||||
{
|
||||
name: "serve_valid",
|
||||
input: "serve /var/www",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "serve_missing_path",
|
||||
input: "serve ",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "serve_too_many_args",
|
||||
input: "serve / / /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// redirect tests
|
||||
{
|
||||
name: "redirect_valid",
|
||||
input: "redirect /",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "redirect_too_many_args",
|
||||
input: "redirect / /",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// error directive tests
|
||||
{
|
||||
name: "error_valid",
|
||||
input: "error 404 Not\\ Found",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "error_missing_status_code",
|
||||
input: "error Not\\ Found",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "error_too_many_args",
|
||||
input: "error 404 Not\\ Found extra",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "error_no_escaped_space",
|
||||
input: "error 404 Not Found",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "error_invalid_status_code",
|
||||
input: "error 123 abc",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// proxy directive tests
|
||||
{
|
||||
name: "proxy_valid",
|
||||
input: "proxy localhost:8080",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "proxy_missing_target",
|
||||
input: "proxy",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "proxy_too_many_args",
|
||||
input: "proxy localhost:8080 extra",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "proxy_invalid_url",
|
||||
input: "proxy :invalid_url",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// unknown directive test
|
||||
{
|
||||
name: "unknown_directive",
|
||||
input: "unknown /",
|
||||
wantErr: ErrUnknownDirective,
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
cmd := Command{}
|
||||
err := cmd.Parse(tt.input)
|
||||
if tt.wantErr != nil {
|
||||
ExpectError(t, tt.wantErr, err)
|
||||
} else {
|
||||
ExpectNoError(t, err)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestParseOn(t *testing.T) {
|
||||
tests := []struct {
|
||||
name string
|
||||
input string
|
||||
wantErr E.Error
|
||||
}{
|
||||
// header
|
||||
{
|
||||
name: "header_valid",
|
||||
input: "header Connection Upgrade",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "header_invalid",
|
||||
input: "header Connection",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// query
|
||||
{
|
||||
name: "query_valid",
|
||||
input: "query key value",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "query_invalid",
|
||||
input: "query key",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// method
|
||||
{
|
||||
name: "method_valid",
|
||||
input: "method GET",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "method_invalid",
|
||||
input: "method",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// path
|
||||
{
|
||||
name: "path_valid",
|
||||
input: "path /home",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "path_invalid",
|
||||
input: "path",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
// remote
|
||||
{
|
||||
name: "remote_valid",
|
||||
input: "remote 127.0.0.1",
|
||||
wantErr: nil,
|
||||
},
|
||||
{
|
||||
name: "remote_invalid",
|
||||
input: "remote",
|
||||
wantErr: ErrInvalidArguments,
|
||||
},
|
||||
{
|
||||
name: "unknown_target",
|
||||
input: "unknown",
|
||||
wantErr: ErrInvalidOnTarget,
|
||||
},
|
||||
}
|
||||
|
||||
for _, tt := range tests {
|
||||
t.Run(tt.name, func(t *testing.T) {
|
||||
on := &RuleOn{}
|
||||
err := on.Parse(tt.input)
|
||||
if tt.wantErr != nil {
|
||||
ExpectError(t, tt.wantErr, err)
|
||||
} else {
|
||||
ExpectNoError(t, err)
|
||||
}
|
||||
})
|
||||
}
|
||||
}
|
||||
|
||||
func TestParseRule(t *testing.T) {
|
||||
// test := map[string]any{
|
||||
// "name": "test",
|
||||
// "on": "method GET",
|
||||
// "do": "bypass",
|
||||
// }
|
||||
test := []map[string]any{
|
||||
{
|
||||
"name": "test",
|
||||
"on": "method POST",
|
||||
"do": "error 403 Forbidden",
|
||||
},
|
||||
{
|
||||
"name": "auth",
|
||||
"on": `basic_auth "username" "password" | basic_auth username2 "password2" | basic_auth "username3" "password3"`,
|
||||
"do": "bypass",
|
||||
},
|
||||
{
|
||||
"name": "default",
|
||||
"do": "require_basic_auth any_realm",
|
||||
},
|
||||
}
|
||||
|
||||
var rules struct {
|
||||
Rules Rules
|
||||
}
|
||||
err := utils.Deserialize(utils.SerializedObject{"rules": test}, &rules)
|
||||
ExpectNoError(t, err)
|
||||
ExpectEqual(t, len(rules.Rules), len(test))
|
||||
ExpectEqual(t, rules.Rules[0].Name, "test")
|
||||
ExpectEqual(t, rules.Rules[0].On.String(), "method POST")
|
||||
ExpectEqual(t, rules.Rules[0].Do.String(), "error 403 Forbidden")
|
||||
|
||||
ExpectEqual(t, rules.Rules[1].Name, "auth")
|
||||
ExpectEqual(t, rules.Rules[1].On.String(), `basic_auth "username" "password" | basic_auth username2 "password2" | basic_auth "username3" "password3"`)
|
||||
ExpectEqual(t, rules.Rules[1].Do.String(), "bypass")
|
||||
|
||||
ExpectEqual(t, rules.Rules[2].Name, "default")
|
||||
ExpectEqual(t, rules.Rules[2].Do.String(), "require_basic_auth any_realm")
|
||||
}
|
||||
|
||||
// TODO: real tests.
|
||||
|
||||
Reference in New Issue
Block a user