2024-03-09 11:21:24 +02:00
|
|
|
// SPDX-License-Identifier: MIT
|
|
|
|
// SPDX-FileCopyrightText: © 2015 LabStack LLC and Echo contributors
|
|
|
|
|
2021-01-05 12:14:51 +02:00
|
|
|
package middleware
|
|
|
|
|
|
|
|
import (
|
2021-08-22 19:25:09 +02:00
|
|
|
"bytes"
|
2022-05-21 23:21:50 +02:00
|
|
|
"context"
|
2021-01-05 12:14:51 +02:00
|
|
|
"errors"
|
2021-08-22 19:25:09 +02:00
|
|
|
"fmt"
|
2022-11-21 14:29:43 +02:00
|
|
|
"io"
|
2021-08-22 19:25:09 +02:00
|
|
|
"log"
|
|
|
|
"net"
|
2021-01-05 12:14:51 +02:00
|
|
|
"net/http"
|
|
|
|
"net/http/httptest"
|
|
|
|
"net/url"
|
|
|
|
"reflect"
|
|
|
|
"strings"
|
2022-05-21 19:58:15 +02:00
|
|
|
"sync"
|
2021-01-05 12:14:51 +02:00
|
|
|
"testing"
|
|
|
|
"time"
|
2021-07-10 04:36:03 +02:00
|
|
|
|
|
|
|
"github.com/labstack/echo/v4"
|
|
|
|
"github.com/stretchr/testify/assert"
|
2021-01-05 12:14:51 +02:00
|
|
|
)
|
|
|
|
|
|
|
|
func TestTimeoutSkipper(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
Skipper: func(context echo.Context) bool {
|
|
|
|
return true
|
|
|
|
},
|
2021-03-08 03:13:22 +02:00
|
|
|
Timeout: 1 * time.Nanosecond,
|
2021-01-05 12:14:51 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
err := m(func(c echo.Context) error {
|
2021-03-08 03:13:22 +02:00
|
|
|
time.Sleep(25 * time.Microsecond)
|
|
|
|
return errors.New("response from handler")
|
2021-01-05 12:14:51 +02:00
|
|
|
})(c)
|
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
// if not skipped we would have not returned error due context timeout logic
|
|
|
|
assert.EqualError(t, err, "response from handler")
|
2021-01-05 12:14:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutWithTimeout0(t *testing.T) {
|
|
|
|
t.Parallel()
|
2021-03-08 03:13:22 +02:00
|
|
|
m := Timeout()
|
2021-01-05 12:14:51 +02:00
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
assert.NotEqual(t, "*context.timerCtx", reflect.TypeOf(c.Request().Context()).String())
|
|
|
|
return nil
|
|
|
|
})(c)
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
}
|
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
func TestTimeoutErrorOutInHandler(t *testing.T) {
|
2021-01-05 12:14:51 +02:00
|
|
|
t.Parallel()
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
2021-03-08 03:13:22 +02:00
|
|
|
// Timeout has to be defined or the whole flow for timeout middleware will be skipped
|
|
|
|
Timeout: 50 * time.Millisecond,
|
2021-01-05 12:14:51 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
2022-03-13 16:00:02 +02:00
|
|
|
rec.Code = 1 // we want to be sure that even 200 will not be sent
|
2021-01-05 12:14:51 +02:00
|
|
|
err := m(func(c echo.Context) error {
|
2022-03-13 16:00:02 +02:00
|
|
|
// this error must not be written to the client response. Middlewares upstream of timeout middleware must be able
|
|
|
|
// to handle returned error and this can be done only then handler has not yet committed (written status code)
|
|
|
|
// the response.
|
2021-03-12 13:49:09 +02:00
|
|
|
return echo.NewHTTPError(http.StatusTeapot, "err")
|
2021-01-05 12:14:51 +02:00
|
|
|
})(c)
|
|
|
|
|
|
|
|
assert.Error(t, err)
|
2022-03-13 16:00:02 +02:00
|
|
|
assert.EqualError(t, err, "code=418, message=err")
|
|
|
|
assert.Equal(t, 1, rec.Code)
|
|
|
|
assert.Equal(t, "", rec.Body.String())
|
2021-03-12 13:49:09 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutSuccessfulRequest(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
// Timeout has to be defined or the whole flow for timeout middleware will be skipped
|
|
|
|
Timeout: 50 * time.Millisecond,
|
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
return c.JSON(http.StatusCreated, map[string]string{"data": "ok"})
|
|
|
|
})(c)
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, http.StatusCreated, rec.Code)
|
|
|
|
assert.Equal(t, "{\"data\":\"ok\"}\n", rec.Body.String())
|
2021-01-05 12:14:51 +02:00
|
|
|
}
|
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
func TestTimeoutOnTimeoutRouteErrorHandler(t *testing.T) {
|
2021-01-05 12:14:51 +02:00
|
|
|
t.Parallel()
|
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
actualErrChan := make(chan error, 1)
|
2021-01-05 12:14:51 +02:00
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
2021-03-08 03:13:22 +02:00
|
|
|
Timeout: 1 * time.Millisecond,
|
|
|
|
OnTimeoutRouteErrorHandler: func(err error, c echo.Context) {
|
|
|
|
actualErrChan <- err
|
|
|
|
},
|
2021-01-05 12:14:51 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
2022-11-21 16:05:30 +02:00
|
|
|
stopChan := make(chan struct{})
|
2021-01-05 12:14:51 +02:00
|
|
|
err := m(func(c echo.Context) error {
|
2021-03-08 03:13:22 +02:00
|
|
|
<-stopChan
|
|
|
|
return errors.New("error in route after timeout")
|
2021-01-05 12:14:51 +02:00
|
|
|
})(c)
|
2021-03-08 03:13:22 +02:00
|
|
|
stopChan <- struct{}{}
|
|
|
|
assert.NoError(t, err)
|
2021-01-05 12:14:51 +02:00
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
actualErr := <-actualErrChan
|
|
|
|
assert.EqualError(t, actualErr, "error in route after timeout")
|
2021-01-05 12:14:51 +02:00
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutTestRequestClone(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
req := httptest.NewRequest(http.MethodPost, "/uri?query=value", strings.NewReader(url.Values{"form": {"value"}}.Encode()))
|
|
|
|
req.AddCookie(&http.Cookie{Name: "cookie", Value: "value"})
|
|
|
|
req.Header.Set("Content-Type", "application/x-www-form-urlencoded")
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
// Timeout has to be defined or the whole flow for timeout middleware will be skipped
|
2021-03-08 03:13:22 +02:00
|
|
|
Timeout: 1 * time.Second,
|
2021-01-05 12:14:51 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
// Cookie test
|
|
|
|
cookie, err := c.Request().Cookie("cookie")
|
|
|
|
if assert.NoError(t, err) {
|
|
|
|
assert.EqualValues(t, "cookie", cookie.Name)
|
|
|
|
assert.EqualValues(t, "value", cookie.Value)
|
|
|
|
}
|
|
|
|
|
|
|
|
// Form values
|
|
|
|
if assert.NoError(t, c.Request().ParseForm()) {
|
|
|
|
assert.EqualValues(t, "value", c.Request().FormValue("form"))
|
|
|
|
}
|
|
|
|
|
|
|
|
// Query string
|
|
|
|
assert.EqualValues(t, "value", c.Request().URL.Query()["query"][0])
|
|
|
|
return nil
|
|
|
|
})(c)
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
}
|
2021-03-01 23:45:18 +02:00
|
|
|
|
|
|
|
func TestTimeoutRecoversPanic(t *testing.T) {
|
|
|
|
t.Parallel()
|
2021-03-08 03:13:22 +02:00
|
|
|
e := echo.New()
|
|
|
|
e.Use(Recover()) // recover middleware will handler our panic
|
|
|
|
e.Use(TimeoutWithConfig(TimeoutConfig{
|
|
|
|
Timeout: 50 * time.Millisecond,
|
|
|
|
}))
|
|
|
|
|
|
|
|
e.GET("/", func(c echo.Context) error {
|
|
|
|
panic("panic!!!")
|
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
assert.NotPanics(t, func() {
|
|
|
|
e.ServeHTTP(rec, req)
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutDataRace(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
timeout := 1 * time.Millisecond
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
Timeout: timeout,
|
|
|
|
ErrorMessage: "Timeout! change me",
|
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
// NOTE: when difference between timeout duration and handler execution time is almost the same (in range of 100microseconds)
|
|
|
|
// the result of timeout does not seem to be reliable - could respond timeout, could respond handler output
|
|
|
|
// difference over 500microseconds (0.5millisecond) response seems to be reliable
|
|
|
|
time.Sleep(timeout) // timeout and handler execution time difference is close to zero
|
|
|
|
return c.String(http.StatusOK, "Hello, World!")
|
|
|
|
})(c)
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
|
|
|
|
if rec.Code == http.StatusServiceUnavailable {
|
|
|
|
assert.Equal(t, "Timeout! change me", rec.Body.String())
|
|
|
|
} else {
|
|
|
|
assert.Equal(t, "Hello, World!", rec.Body.String())
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutWithErrorMessage(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
timeout := 1 * time.Millisecond
|
2021-03-01 23:45:18 +02:00
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
2021-03-08 03:13:22 +02:00
|
|
|
Timeout: timeout,
|
|
|
|
ErrorMessage: "Timeout! change me",
|
2021-03-01 23:45:18 +02:00
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
2022-11-21 16:05:30 +02:00
|
|
|
stopChan := make(chan struct{})
|
2021-03-01 23:45:18 +02:00
|
|
|
err := m(func(c echo.Context) error {
|
2021-03-08 03:13:22 +02:00
|
|
|
// NOTE: when difference between timeout duration and handler execution time is almost the same (in range of 100microseconds)
|
|
|
|
// the result of timeout does not seem to be reliable - could respond timeout, could respond handler output
|
|
|
|
// difference over 500microseconds (0.5millisecond) response seems to be reliable
|
|
|
|
<-stopChan
|
|
|
|
return c.String(http.StatusOK, "Hello, World!")
|
2021-03-01 23:45:18 +02:00
|
|
|
})(c)
|
2021-03-08 03:13:22 +02:00
|
|
|
stopChan <- struct{}{}
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, http.StatusServiceUnavailable, rec.Code)
|
|
|
|
assert.Equal(t, "Timeout! change me", rec.Body.String())
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestTimeoutWithDefaultErrorMessage(t *testing.T) {
|
|
|
|
t.Parallel()
|
2021-03-01 23:45:18 +02:00
|
|
|
|
2021-03-08 03:13:22 +02:00
|
|
|
timeout := 1 * time.Millisecond
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
Timeout: timeout,
|
|
|
|
ErrorMessage: "",
|
|
|
|
})
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
2022-11-21 16:05:30 +02:00
|
|
|
stopChan := make(chan struct{})
|
2021-03-08 03:13:22 +02:00
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
<-stopChan
|
|
|
|
return c.String(http.StatusOK, "Hello, World!")
|
|
|
|
})(c)
|
|
|
|
stopChan <- struct{}{}
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, http.StatusServiceUnavailable, rec.Code)
|
|
|
|
assert.Equal(t, `<html><head><title>Timeout</title></head><body><h1>Timeout</h1></body></html>`, rec.Body.String())
|
2021-03-01 23:45:18 +02:00
|
|
|
}
|
2021-07-10 04:36:03 +02:00
|
|
|
|
|
|
|
func TestTimeoutCanHandleContextDeadlineOnNextHandler(t *testing.T) {
|
|
|
|
t.Parallel()
|
|
|
|
|
|
|
|
timeout := 1 * time.Millisecond
|
|
|
|
m := TimeoutWithConfig(TimeoutConfig{
|
|
|
|
Timeout: timeout,
|
|
|
|
ErrorMessage: "Timeout! change me",
|
|
|
|
})
|
|
|
|
|
|
|
|
handlerFinishedExecution := make(chan bool)
|
|
|
|
|
|
|
|
req := httptest.NewRequest(http.MethodGet, "/", nil)
|
|
|
|
rec := httptest.NewRecorder()
|
|
|
|
|
|
|
|
e := echo.New()
|
|
|
|
c := e.NewContext(req, rec)
|
|
|
|
|
|
|
|
stopChan := make(chan struct{})
|
|
|
|
err := m(func(c echo.Context) error {
|
|
|
|
// NOTE: when difference between timeout duration and handler execution time is almost the same (in range of 100microseconds)
|
|
|
|
// the result of timeout does not seem to be reliable - could respond timeout, could respond handler output
|
|
|
|
// difference over 500microseconds (0.5millisecond) response seems to be reliable
|
|
|
|
<-stopChan
|
|
|
|
|
|
|
|
// The Request Context should have a Deadline set by http.TimeoutHandler
|
|
|
|
if _, ok := c.Request().Context().Deadline(); !ok {
|
|
|
|
assert.Fail(t, "No timeout set on Request Context")
|
|
|
|
}
|
|
|
|
handlerFinishedExecution <- c.Request().Context().Err() == nil
|
|
|
|
return c.String(http.StatusOK, "Hello, World!")
|
|
|
|
})(c)
|
|
|
|
stopChan <- struct{}{}
|
|
|
|
|
|
|
|
assert.NoError(t, err)
|
|
|
|
assert.Equal(t, http.StatusServiceUnavailable, rec.Code)
|
|
|
|
assert.Equal(t, "Timeout! change me", rec.Body.String())
|
|
|
|
assert.False(t, <-handlerFinishedExecution)
|
|
|
|
}
|
2021-08-22 19:25:09 +02:00
|
|
|
|
|
|
|
func TestTimeoutWithFullEchoStack(t *testing.T) {
|
|
|
|
// test timeout with full http server stack running, do see what http.Server.ErrorLog contains
|
|
|
|
var testCases = []struct {
|
2022-05-21 23:21:50 +02:00
|
|
|
name string
|
|
|
|
whenPath string
|
|
|
|
whenForceHandlerTimeout bool
|
|
|
|
expectStatusCode int
|
|
|
|
expectResponse string
|
|
|
|
expectLogContains []string
|
|
|
|
expectLogNotContains []string
|
2021-08-22 19:25:09 +02:00
|
|
|
}{
|
|
|
|
{
|
|
|
|
name: "404 - write response in global error handler",
|
|
|
|
whenPath: "/404",
|
|
|
|
expectResponse: "{\"message\":\"Not Found\"}\n",
|
|
|
|
expectStatusCode: http.StatusNotFound,
|
|
|
|
expectLogNotContains: []string{"echo:http: superfluous response.WriteHeader call from"},
|
|
|
|
expectLogContains: []string{`"status":404,"error":"code=404, message=Not Found"`},
|
|
|
|
},
|
|
|
|
{
|
|
|
|
name: "418 - write response in handler",
|
|
|
|
whenPath: "/",
|
|
|
|
expectResponse: "{\"message\":\"OK\"}\n",
|
|
|
|
expectStatusCode: http.StatusTeapot,
|
|
|
|
expectLogNotContains: []string{"echo:http: superfluous response.WriteHeader call from"},
|
|
|
|
expectLogContains: []string{`"status":418,"error":"",`},
|
|
|
|
},
|
|
|
|
{
|
2022-05-21 23:21:50 +02:00
|
|
|
name: "503 - handler timeouts, write response in timeout middleware",
|
|
|
|
whenForceHandlerTimeout: true,
|
|
|
|
whenPath: "/",
|
|
|
|
expectResponse: "<html><head><title>Timeout</title></head><body><h1>Timeout</h1></body></html>",
|
|
|
|
expectStatusCode: http.StatusServiceUnavailable,
|
2021-08-22 19:25:09 +02:00
|
|
|
expectLogNotContains: []string{
|
|
|
|
"echo:http: superfluous response.WriteHeader call from",
|
|
|
|
},
|
2022-05-21 23:21:50 +02:00
|
|
|
expectLogContains: []string{"http: Handler timeout"},
|
2021-08-22 19:25:09 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
|
|
|
|
for _, tc := range testCases {
|
|
|
|
t.Run(tc.name, func(t *testing.T) {
|
2022-05-21 18:27:22 +02:00
|
|
|
e := echo.New()
|
|
|
|
|
2022-05-21 19:58:15 +02:00
|
|
|
buf := new(coroutineSafeBuffer)
|
2022-05-21 18:27:22 +02:00
|
|
|
e.Logger.SetOutput(buf)
|
|
|
|
|
|
|
|
// NOTE: timeout middleware is first as it changes Response.Writer and causes data race for logger middleware if it is not first
|
|
|
|
e.Use(TimeoutWithConfig(TimeoutConfig{
|
2023-02-19 10:38:34 +02:00
|
|
|
Timeout: 100 * time.Millisecond,
|
2022-05-21 18:27:22 +02:00
|
|
|
}))
|
|
|
|
e.Use(Logger())
|
|
|
|
e.Use(Recover())
|
|
|
|
|
2022-05-21 23:21:50 +02:00
|
|
|
wg := sync.WaitGroup{}
|
|
|
|
if tc.whenForceHandlerTimeout {
|
|
|
|
wg.Add(1) // make `wg.Wait()` block until we release it with `wg.Done()`
|
|
|
|
}
|
2022-05-21 18:27:22 +02:00
|
|
|
e.GET("/", func(c echo.Context) error {
|
2022-05-21 23:21:50 +02:00
|
|
|
wg.Wait()
|
2022-05-21 18:27:22 +02:00
|
|
|
return c.JSON(http.StatusTeapot, map[string]string{"message": "OK"})
|
|
|
|
})
|
|
|
|
|
|
|
|
server, addr, err := startServer(e)
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
return
|
|
|
|
}
|
|
|
|
defer server.Close()
|
2021-08-22 19:25:09 +02:00
|
|
|
|
|
|
|
res, err := http.Get(fmt.Sprintf("http://%v%v", addr, tc.whenPath))
|
|
|
|
if err != nil {
|
|
|
|
assert.NoError(t, err)
|
|
|
|
return
|
|
|
|
}
|
2022-05-21 23:21:50 +02:00
|
|
|
if tc.whenForceHandlerTimeout {
|
|
|
|
wg.Done()
|
2023-02-19 10:38:34 +02:00
|
|
|
// extremely short periods are not reliable for tests when it comes to goroutines. We can not guarantee in which
|
|
|
|
// order scheduler decides do execute: 1) request goroutine, 2) timeout timer goroutine.
|
|
|
|
// most of the time we get result we expect but Mac OS seems to be quite flaky
|
|
|
|
time.Sleep(50 * time.Millisecond)
|
|
|
|
|
2022-05-21 23:21:50 +02:00
|
|
|
// shutdown waits for server to shutdown. this way we wait logger mw to be executed
|
2023-02-19 10:38:34 +02:00
|
|
|
ctx, cancel := context.WithTimeout(context.Background(), 200*time.Millisecond)
|
2022-05-21 23:21:50 +02:00
|
|
|
defer cancel()
|
|
|
|
server.Shutdown(ctx)
|
|
|
|
}
|
2021-08-22 19:25:09 +02:00
|
|
|
|
|
|
|
assert.Equal(t, tc.expectStatusCode, res.StatusCode)
|
2022-11-21 14:29:43 +02:00
|
|
|
if body, err := io.ReadAll(res.Body); err == nil {
|
2021-08-22 19:25:09 +02:00
|
|
|
assert.Equal(t, tc.expectResponse, string(body))
|
|
|
|
} else {
|
|
|
|
assert.Fail(t, err.Error())
|
|
|
|
}
|
|
|
|
|
|
|
|
logged := buf.String()
|
|
|
|
for _, subStr := range tc.expectLogContains {
|
2022-05-21 23:21:50 +02:00
|
|
|
assert.True(t, strings.Contains(logged, subStr), "expected logs to contain: %v, logged: '%v'", subStr, logged)
|
2021-08-22 19:25:09 +02:00
|
|
|
}
|
|
|
|
for _, subStr := range tc.expectLogNotContains {
|
2022-05-21 23:21:50 +02:00
|
|
|
assert.False(t, strings.Contains(logged, subStr), "expected logs not to contain: %v, logged: '%v'", subStr, logged)
|
2021-08-22 19:25:09 +02:00
|
|
|
}
|
|
|
|
})
|
|
|
|
}
|
|
|
|
}
|
|
|
|
|
2022-05-21 19:58:15 +02:00
|
|
|
// as we are spawning multiple coroutines - one for http server, one for request, one by timeout middleware, one by testcase
|
|
|
|
// we are accessing logger (writing/reading) from multiple coroutines and causing dataraces (most often reported on macos)
|
|
|
|
// we could be writing to logger in logger middleware and at the same time our tests is getting logger buffer contents
|
|
|
|
// in testcase coroutine.
|
|
|
|
type coroutineSafeBuffer struct {
|
|
|
|
bytes.Buffer
|
|
|
|
lock sync.RWMutex
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *coroutineSafeBuffer) Write(p []byte) (n int, err error) {
|
|
|
|
b.lock.Lock()
|
|
|
|
defer b.lock.Unlock()
|
|
|
|
|
|
|
|
return b.Buffer.Write(p)
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *coroutineSafeBuffer) Bytes() []byte {
|
|
|
|
b.lock.RLock()
|
|
|
|
defer b.lock.RUnlock()
|
|
|
|
|
|
|
|
return b.Buffer.Bytes()
|
|
|
|
}
|
|
|
|
|
|
|
|
func (b *coroutineSafeBuffer) String() string {
|
|
|
|
b.lock.RLock()
|
|
|
|
defer b.lock.RUnlock()
|
|
|
|
|
|
|
|
return b.Buffer.String()
|
|
|
|
}
|
|
|
|
|
2021-08-22 19:25:09 +02:00
|
|
|
func startServer(e *echo.Echo) (*http.Server, string, error) {
|
|
|
|
l, err := net.Listen("tcp", ":0")
|
|
|
|
if err != nil {
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
|
|
|
|
s := http.Server{
|
|
|
|
Handler: e,
|
|
|
|
ErrorLog: log.New(e.Logger.Output(), "echo:", 0),
|
|
|
|
}
|
|
|
|
|
|
|
|
errCh := make(chan error)
|
|
|
|
go func() {
|
|
|
|
if err := s.Serve(l); err != http.ErrServerClosed {
|
|
|
|
errCh <- err
|
|
|
|
}
|
|
|
|
}()
|
|
|
|
|
|
|
|
select {
|
|
|
|
case <-time.After(10 * time.Millisecond):
|
|
|
|
return &s, l.Addr().String(), nil
|
|
|
|
case err := <-errCh:
|
|
|
|
return nil, "", err
|
|
|
|
}
|
|
|
|
}
|