2023-09-07 22:46:34 +00:00
|
|
|
package main
|
|
|
|
|
|
|
|
import (
|
|
|
|
"bytes"
|
2024-07-19 14:08:30 +00:00
|
|
|
"fmt"
|
2023-09-07 22:46:34 +00:00
|
|
|
"io"
|
2024-07-19 14:08:30 +00:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"strings"
|
2023-09-07 22:46:34 +00:00
|
|
|
"testing"
|
|
|
|
)
|
|
|
|
|
2024-07-19 14:08:30 +00:00
|
|
|
func TestRequestHandler(t *testing.T) {
|
|
|
|
f := func(cfgStr, requestURL string, backendHandler http.HandlerFunc, responseExpected string) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
ts := httptest.NewServer(backendHandler)
|
|
|
|
defer ts.Close()
|
|
|
|
|
|
|
|
cfgStr = strings.ReplaceAll(cfgStr, "{BACKEND}", ts.URL)
|
|
|
|
responseExpected = strings.ReplaceAll(responseExpected, "{BACKEND}", ts.URL)
|
|
|
|
|
|
|
|
cfgOrigP := authConfigData.Load()
|
|
|
|
if _, err := reloadAuthConfigData([]byte(cfgStr)); err != nil {
|
|
|
|
t.Fatalf("cannot load config data: %s", err)
|
|
|
|
}
|
|
|
|
defer func() {
|
|
|
|
cfgOrig := []byte("unauthorized_user:\n url_prefix: http://foo/bar")
|
|
|
|
if cfgOrigP != nil {
|
|
|
|
cfgOrig = *cfgOrigP
|
|
|
|
}
|
|
|
|
_, err := reloadAuthConfigData(cfgOrig)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("cannot load the original config: %s", err)
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
r, err := http.NewRequest(http.MethodGet, requestURL, nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("cannot initialize http request: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
w := &fakeResponseWriter{}
|
|
|
|
if !requestHandler(w, r) {
|
|
|
|
t.Fatalf("unexpected false is returned from requestHandler")
|
|
|
|
}
|
|
|
|
|
|
|
|
response := w.getResponse()
|
2024-07-19 15:26:51 +00:00
|
|
|
response = strings.ReplaceAll(response, "\r\n", "\n")
|
2024-07-19 14:08:30 +00:00
|
|
|
response = strings.TrimSpace(response)
|
|
|
|
responseExpected = strings.TrimSpace(responseExpected)
|
|
|
|
if response != responseExpected {
|
2024-07-19 15:26:51 +00:00
|
|
|
t.Fatalf("unexpected response\ngot\n%s\nwant\n%s", response, responseExpected)
|
2024-07-19 14:08:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
// regular url_prefix
|
|
|
|
cfgStr := `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: {BACKEND}/foo?bar=baz
|
|
|
|
`
|
|
|
|
requestURL := "http://some-host.com/abc/def?some_arg=some_value"
|
|
|
|
backendHandler := func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
2024-07-19 15:26:51 +00:00
|
|
|
responseExpected := `
|
|
|
|
statusCode=200
|
2024-07-19 14:08:30 +00:00
|
|
|
requested_url={BACKEND}/foo/abc/def?bar=baz&some_arg=some_value
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// keep_original_host
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: "{BACKEND}/foo?bar=baz"
|
|
|
|
keep_original_host: true
|
|
|
|
`
|
2024-07-19 15:26:51 +00:00
|
|
|
requestURL = "http://some-host.com/abc/def"
|
2024-07-19 14:08:30 +00:00
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
2024-07-19 15:26:51 +00:00
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url=http://some-host.com/foo/abc/def?bar=baz
|
2024-07-19 14:08:30 +00:00
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// override request host
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: "{BACKEND}/foo?bar=baz"
|
|
|
|
headers:
|
|
|
|
- "Host: other-host:12345"
|
|
|
|
`
|
2024-07-19 15:26:51 +00:00
|
|
|
requestURL = "http://some-host.com/abc/def"
|
2024-07-19 14:08:30 +00:00
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
2024-07-19 15:26:51 +00:00
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url=http://other-host:12345/foo/abc/def?bar=baz
|
2024-07-19 14:08:30 +00:00
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
2024-07-19 15:26:51 +00:00
|
|
|
// /-/reload handler failure
|
|
|
|
origAuthKey := reloadAuthKey.Get()
|
|
|
|
if err := reloadAuthKey.Set("secret"); err != nil {
|
|
|
|
t.Fatalf("unexpected error: %s", err)
|
|
|
|
}
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: "{BACKEND}/foo"
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/-/reload"
|
|
|
|
backendHandler = func(_ http.ResponseWriter, _ *http.Request) {
|
|
|
|
panic(fmt.Errorf("backend handler shouldn't be called"))
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=401
|
|
|
|
The provided authKey doesn't match -reloadAuthKey
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
if err := reloadAuthKey.Set(origAuthKey); err != nil {
|
|
|
|
t.Fatalf("unexpected error: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
// missing authorization
|
|
|
|
cfgStr = `
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
url_prefix: "{BACKEND}/bar"
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/a/b"
|
|
|
|
backendHandler = func(_ http.ResponseWriter, _ *http.Request) {
|
|
|
|
panic(fmt.Errorf("backend handler shouldn't be called"))
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=401
|
|
|
|
Www-Authenticate: Basic realm="Restricted"
|
|
|
|
missing 'Authorization' request header
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// incorrect authorization
|
|
|
|
cfgStr = `
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
password: secret
|
|
|
|
url_prefix: "{BACKEND}/bar"
|
|
|
|
`
|
|
|
|
requestURL = "http://foo:invalid-secret@some-host.com/a/b"
|
|
|
|
backendHandler = func(_ http.ResponseWriter, _ *http.Request) {
|
|
|
|
panic(fmt.Errorf("backend handler shouldn't be called"))
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=401
|
|
|
|
Unauthorized
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// correct authorization
|
|
|
|
cfgStr = `
|
|
|
|
users:
|
|
|
|
- username: foo
|
|
|
|
password: secret
|
|
|
|
url_prefix: "{BACKEND}/bar"
|
|
|
|
`
|
|
|
|
requestURL = "http://foo:secret@some-host.com/a/b"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/bar/a/b
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// verify how path cleanup works
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: {BACKEND}/foo?bar=baz
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/../../a//.///bar/"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/foo/a/bar/?bar=baz
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// verify how path cleanup works for url without path
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: {BACKEND}/foo?bar=baz
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/foo?bar=baz
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// verify how path cleanup works for url without path if url_prefix path ends with /
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: {BACKEND}/foo/?bar=baz
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/foo/?bar=baz
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
// verify how path cleanup works for url without path and the url_prefix without path prefix
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_prefix: {BACKEND}/?bar=baz
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/?bar=baz
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
|
|
|
|
|
|
|
// verify routing to default_url
|
|
|
|
cfgStr = `
|
|
|
|
unauthorized_user:
|
|
|
|
url_map:
|
|
|
|
- src_paths: ["/foo/.+"]
|
|
|
|
url_prefix: {BACKEND}/x-foo/
|
|
|
|
default_url: {BACKEND}/404.html
|
|
|
|
`
|
|
|
|
requestURL = "http://some-host.com/abc?de=fg"
|
|
|
|
backendHandler = func(w http.ResponseWriter, r *http.Request) {
|
|
|
|
fmt.Fprintf(w, "requested_url=http://%s%s", r.Host, r.URL)
|
|
|
|
}
|
|
|
|
responseExpected = `
|
|
|
|
statusCode=200
|
|
|
|
requested_url={BACKEND}/404.html?request_path=http%3A%2F%2Fsome-host.com%2Fabc%3Fde%3Dfg
|
|
|
|
`
|
|
|
|
f(cfgStr, requestURL, backendHandler, responseExpected)
|
2024-07-19 14:08:30 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
type fakeResponseWriter struct {
|
|
|
|
h http.Header
|
|
|
|
|
|
|
|
bb bytes.Buffer
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *fakeResponseWriter) getResponse() string {
|
|
|
|
return w.bb.String()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *fakeResponseWriter) Header() http.Header {
|
|
|
|
if w.h == nil {
|
|
|
|
w.h = http.Header{}
|
|
|
|
}
|
|
|
|
return w.h
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *fakeResponseWriter) Write(p []byte) (int, error) {
|
|
|
|
return w.bb.Write(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (w *fakeResponseWriter) WriteHeader(statusCode int) {
|
|
|
|
fmt.Fprintf(&w.bb, "statusCode=%d\n", statusCode)
|
|
|
|
if w.h == nil {
|
|
|
|
return
|
|
|
|
}
|
|
|
|
err := w.h.WriteSubset(&w.bb, map[string]bool{
|
2024-07-19 15:26:51 +00:00
|
|
|
"Content-Length": true,
|
|
|
|
"Content-Type": true,
|
|
|
|
"Date": true,
|
|
|
|
"X-Content-Type-Options": true,
|
2024-07-19 14:08:30 +00:00
|
|
|
})
|
|
|
|
if err != nil {
|
2024-07-19 15:26:51 +00:00
|
|
|
panic(fmt.Errorf("cannot marshal headers: %s", err))
|
2024-07-19 14:08:30 +00:00
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-07-17 09:06:16 +00:00
|
|
|
func TestReadTrackingBody_RetrySuccess(t *testing.T) {
|
|
|
|
f := func(s string, maxBodySize int) {
|
2023-09-07 22:46:34 +00:00
|
|
|
t.Helper()
|
2024-07-17 09:06:16 +00:00
|
|
|
|
|
|
|
rtb := getReadTrackingBody(io.NopCloser(bytes.NewBufferString(s)), maxBodySize)
|
|
|
|
defer putReadTrackingBody(rtb)
|
|
|
|
|
2023-09-07 22:46:34 +00:00
|
|
|
if !rtb.canRetry() {
|
2024-07-17 09:06:16 +00:00
|
|
|
t.Fatalf("canRetry() must return true before reading anything")
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
for i := 0; i < 5; i++ {
|
|
|
|
data, err := io.ReadAll(rtb)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading all the data at iteration %d: %s", i, err)
|
|
|
|
}
|
|
|
|
if string(data) != s {
|
|
|
|
t.Fatalf("unexpected data read at iteration %d\ngot\n%s\nwant\n%s", i, data, s)
|
|
|
|
}
|
|
|
|
if err := rtb.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected error when closing readTrackingBody at iteration %d: %s", i, err)
|
|
|
|
}
|
|
|
|
if !rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return true at iteration %d", i)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-07-17 09:06:16 +00:00
|
|
|
f("", 0)
|
|
|
|
f("", -1)
|
|
|
|
f("", 100)
|
|
|
|
f("foo", 100)
|
|
|
|
f("foobar", 100)
|
|
|
|
f(newTestString(1000), 1000)
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
|
2024-07-17 09:06:16 +00:00
|
|
|
func TestReadTrackingBody_RetrySuccessPartialRead(t *testing.T) {
|
|
|
|
f := func(s string, maxBodySize int) {
|
2023-09-07 22:46:34 +00:00
|
|
|
t.Helper()
|
2024-07-17 09:06:16 +00:00
|
|
|
|
|
|
|
// Check the case with partial read
|
|
|
|
rtb := getReadTrackingBody(io.NopCloser(bytes.NewBufferString(s)), maxBodySize)
|
|
|
|
defer putReadTrackingBody(rtb)
|
|
|
|
|
|
|
|
for i := 0; i < len(s); i++ {
|
|
|
|
buf := make([]byte, i)
|
|
|
|
n, err := io.ReadFull(rtb, buf)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading %d bytes: %s", i, err)
|
|
|
|
}
|
|
|
|
if n != i {
|
|
|
|
t.Fatalf("unexpected number of bytes read; got %d; want %d", n, i)
|
|
|
|
}
|
|
|
|
if string(buf) != s[:i] {
|
|
|
|
t.Fatalf("unexpected data read with the length %d\ngot\n%s\nwant\n%s", i, buf, s[:i])
|
|
|
|
}
|
|
|
|
if err := rtb.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected error when closing reader after reading %d bytes", i)
|
|
|
|
}
|
|
|
|
if !rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return true after closing the reader after reading %d bytes", i)
|
|
|
|
}
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
2024-07-17 09:06:16 +00:00
|
|
|
|
|
|
|
data, err := io.ReadAll(rtb)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading all the data: %s", err)
|
|
|
|
}
|
|
|
|
if string(data) != s {
|
|
|
|
t.Fatalf("unexpected data read\ngot\n%s\nwant\n%s", data, s)
|
|
|
|
}
|
|
|
|
if err := rtb.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected error when closing readTrackingBody: %s", err)
|
|
|
|
}
|
|
|
|
if !rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return true after closing the reader after reading all the input")
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
f("", 0)
|
|
|
|
f("", -1)
|
|
|
|
f("", 100)
|
|
|
|
f("foo", 100)
|
|
|
|
f("foobar", 100)
|
|
|
|
f(newTestString(1000), 1000)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadTrackingBody_RetryFailureTooBigBody(t *testing.T) {
|
|
|
|
f := func(s string, maxBodySize int) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
rtb := getReadTrackingBody(io.NopCloser(bytes.NewBufferString(s)), maxBodySize)
|
|
|
|
defer putReadTrackingBody(rtb)
|
|
|
|
|
2023-09-07 22:46:34 +00:00
|
|
|
if !rtb.canRetry() {
|
2024-07-17 09:06:16 +00:00
|
|
|
t.Fatalf("canRetry() must return true before reading anything")
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
buf := make([]byte, 1)
|
2024-07-17 09:06:16 +00:00
|
|
|
n, err := io.ReadFull(rtb, buf)
|
2023-09-07 22:46:34 +00:00
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading a single byte: %s", err)
|
|
|
|
}
|
|
|
|
if n != 1 {
|
|
|
|
t.Fatalf("unexpected number of bytes read; got %d; want 1", n)
|
|
|
|
}
|
2024-07-17 09:06:16 +00:00
|
|
|
if !rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return true after reading one byte")
|
2024-07-16 16:59:16 +00:00
|
|
|
}
|
2023-09-07 22:46:34 +00:00
|
|
|
data, err := io.ReadAll(rtb)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading all the data: %s", err)
|
|
|
|
}
|
2024-07-17 09:06:16 +00:00
|
|
|
dataRead := string(buf) + string(data)
|
|
|
|
if dataRead != s {
|
|
|
|
t.Fatalf("unexpected data read\ngot\n%s\nwant\n%s", dataRead, s)
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
if err := rtb.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected error when closing readTrackingBody: %s", err)
|
|
|
|
}
|
|
|
|
if rtb.canRetry() {
|
2024-07-17 09:06:16 +00:00
|
|
|
t.Fatalf("canRetry() must return false after closing the reader")
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
data, err = io.ReadAll(rtb)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expecting non-nil error")
|
|
|
|
}
|
|
|
|
if len(data) != 0 {
|
|
|
|
t.Fatalf("unexpected non-empty data read: %q", data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2024-07-17 09:06:16 +00:00
|
|
|
const maxBodySize = 1000
|
|
|
|
f(newTestString(maxBodySize+1), maxBodySize)
|
|
|
|
f(newTestString(2*maxBodySize), maxBodySize)
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestReadTrackingBody_RetryFailureZeroOrNegativeMaxBodySize(t *testing.T) {
|
|
|
|
f := func(s string, maxBodySize int) {
|
|
|
|
t.Helper()
|
|
|
|
|
|
|
|
rtb := getReadTrackingBody(io.NopCloser(bytes.NewBufferString(s)), maxBodySize)
|
|
|
|
defer putReadTrackingBody(rtb)
|
|
|
|
|
|
|
|
if !rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return true before reading anything")
|
|
|
|
}
|
|
|
|
data, err := io.ReadAll(rtb)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatalf("unexpected error when reading all the data: %s", err)
|
|
|
|
}
|
|
|
|
if string(data) != s {
|
|
|
|
t.Fatalf("unexpected data read\ngot\n%s\nwant\n%s", data, s)
|
|
|
|
}
|
|
|
|
if err := rtb.Close(); err != nil {
|
|
|
|
t.Fatalf("unexpected error when closing readTrackingBody: %s", err)
|
|
|
|
}
|
|
|
|
|
|
|
|
if rtb.canRetry() {
|
|
|
|
t.Fatalf("canRetry() must return false after closing the reader")
|
|
|
|
}
|
|
|
|
data, err = io.ReadAll(rtb)
|
|
|
|
if err == nil {
|
|
|
|
t.Fatalf("expecting non-nil error")
|
|
|
|
}
|
|
|
|
if len(data) != 0 {
|
|
|
|
t.Fatalf("unexpected non-empty data read: %q", data)
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
f("foobar", 0)
|
|
|
|
f(newTestString(1000), 0)
|
|
|
|
|
|
|
|
f("foobar", -1)
|
|
|
|
f(newTestString(1000), -1)
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|
|
|
|
|
|
|
|
func newTestString(sLen int) string {
|
2024-07-17 09:06:16 +00:00
|
|
|
data := make([]byte, sLen)
|
|
|
|
for i := range data {
|
|
|
|
data[i] = byte(i)
|
|
|
|
}
|
|
|
|
return string(data)
|
2023-09-07 22:46:34 +00:00
|
|
|
}
|