func TestAddTrailingSlash(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/add-slash", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := AddTrailingSlash()(func(c echo.Context) error { return nil }) h(c) assert.Equal(t, "/add-slash/", req.URL().Path()) assert.Equal(t, "/add-slash/", req.URI()) // With config req = test.NewRequest(echo.GET, "/add-slash?key=value", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) h = AddTrailingSlashWithConfig(TrailingSlashConfig{ RedirectCode: http.StatusMovedPermanently, })(func(c echo.Context) error { return nil }) h(c) assert.Equal(t, http.StatusMovedPermanently, rec.Status()) assert.Equal(t, "/add-slash/?key=value", rec.Header().Get(echo.HeaderLocation)) }
func TestCORS(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) cors := CORSWithConfig(CORSConfig{ AllowCredentials: true, }) h := cors(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) // No origin header h(c) assert.Equal(t, "", rec.Header().Get(echo.HeaderAccessControlAllowOrigin)) // Empty origin header req = test.NewRequest(echo.GET, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderOrigin, "") h(c) assert.Equal(t, "*", rec.Header().Get(echo.HeaderAccessControlAllowOrigin)) // Wildcard origin req = test.NewRequest(echo.GET, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderOrigin, "localhost") h(c) assert.Equal(t, "*", rec.Header().Get(echo.HeaderAccessControlAllowOrigin)) // Simple request req = test.NewRequest(echo.GET, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderOrigin, "localhost") cors = CORSWithConfig(CORSConfig{ AllowOrigins: []string{"localhost"}, AllowCredentials: true, MaxAge: 3600, }) h = cors(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) h(c) assert.Equal(t, "localhost", rec.Header().Get(echo.HeaderAccessControlAllowOrigin)) // Preflight request req = test.NewRequest(echo.OPTIONS, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderOrigin, "localhost") req.Header().Set(echo.HeaderContentType, echo.MIMEApplicationJSON) h(c) assert.Equal(t, "localhost", rec.Header().Get(echo.HeaderAccessControlAllowOrigin)) assert.NotEmpty(t, rec.Header().Get(echo.HeaderAccessControlAllowMethods)) assert.Equal(t, "true", rec.Header().Get(echo.HeaderAccessControlAllowCredentials)) assert.Equal(t, "3600", rec.Header().Get(echo.HeaderAccessControlMaxAge)) }
func TestGzip(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) // Skip if no Accept-Encoding header h := Gzip()(func(c echo.Context) error { c.Response().Write([]byte("test")) // For Content-Type sniffing return nil }) h(c) assert.Equal(t, "test", rec.Body.String()) req = test.NewRequest(echo.GET, "/", nil) req.Header().Set(echo.HeaderAcceptEncoding, "gzip") rec = test.NewResponseRecorder() c = e.NewContext(req, rec) // Gzip h(c) assert.Equal(t, "gzip", rec.Header().Get(echo.HeaderContentEncoding)) assert.Contains(t, rec.Header().Get(echo.HeaderContentType), echo.MIMETextPlain) r, err := gzip.NewReader(rec.Body) defer r.Close() if assert.NoError(t, err) { buf := new(bytes.Buffer) buf.ReadFrom(r) assert.Equal(t, "test", buf.String()) } }
func TestStatic(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := Static("../_fixture")(func(c echo.Context) error { return echo.ErrNotFound }) // Directory if assert.NoError(t, h(c)) { assert.Contains(t, rec.Body.String(), "Echo") } // HTML5 mode req = test.NewRequest(echo.GET, "/client", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) static := StaticWithConfig(StaticConfig{ Root: "../_fixture", HTML5: true, }) h = static(func(c echo.Context) error { return echo.ErrNotFound }) if assert.NoError(t, h(c)) { assert.Equal(t, http.StatusOK, rec.Status()) } // Browse req = test.NewRequest(echo.GET, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) static = StaticWithConfig(StaticConfig{ Root: "../_fixture/images", Browse: true, }) h = static(func(c echo.Context) error { return echo.ErrNotFound }) if assert.NoError(t, h(c)) { assert.Contains(t, rec.Body.String(), "walle") } // Not found req = test.NewRequest(echo.GET, "/not-found", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) static = StaticWithConfig(StaticConfig{ Root: "../_fixture/images", }) h = static(func(c echo.Context) error { return echo.ErrNotFound }) assert.Error(t, h(c)) }
func TestContextServeContent(t *testing.T) { e := New() req := test.NewRequest(GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) fs := http.Dir("_fixture/images") f, err := fs.Open("walle.png") if assert.NoError(t, err) { fi, err := f.Stat() if assert.NoError(t, err) { // Not cached if assert.NoError(t, c.ServeContent(f, fi.Name(), fi.ModTime())) { assert.Equal(t, http.StatusOK, rec.Status()) } // Cached rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(HeaderIfModifiedSince, fi.ModTime().UTC().Format(http.TimeFormat)) if assert.NoError(t, c.ServeContent(f, fi.Name(), fi.ModTime())) { assert.Equal(t, http.StatusNotModified, rec.Status()) } } } }
func TestEcho(t *testing.T) { e := New() req := test.NewRequest(GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) // Router assert.NotNil(t, e.Router()) // Debug e.SetDebug(true) assert.True(t, e.Debug()) // DefaultHTTPErrorHandler e.DefaultHTTPErrorHandler(errors.New("error"), c) assert.Equal(t, http.StatusInternalServerError, rec.Status()) // Encoders _, err := e.Encoder("undefined") assert.Error(t, err) e.SetEncoder("custom", &testEncoder{}) if enc, err := e.Encoder("custom"); assert.NoError(t, err) { encoded, _ := enc.Encode(nil) assert.Equal(t, []byte("encoded"), encoded) } }
func TestLoggerIPAddress(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) buf := new(bytes.Buffer) e.Logger().SetOutput(buf) ip := "127.0.0.1" h := Logger()(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) // With X-Real-IP req.Header().Add(echo.HeaderXRealIP, ip) h(c) assert.Contains(t, ip, buf.String()) // With X-Forwarded-For buf.Reset() req.Header().Del(echo.HeaderXRealIP) req.Header().Add(echo.HeaderXForwardedFor, ip) h(c) assert.Contains(t, ip, buf.String()) buf.Reset() h(c) assert.Contains(t, ip, buf.String()) }
func TestEchoNotFound(t *testing.T) { e := New() req := test.NewRequest(GET, "/files", nil) rec := test.NewResponseRecorder() e.ServeHTTP(req, rec) assert.Equal(t, http.StatusNotFound, rec.Status()) }
func TestSecure(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := func(c echo.Context) error { return c.String(http.StatusOK, "test") } // Default Secure()(h)(c) assert.Equal(t, "1; mode=block", rec.Header().Get(echo.HeaderXXSSProtection)) assert.Equal(t, "nosniff", rec.Header().Get(echo.HeaderXContentTypeOptions)) assert.Equal(t, "SAMEORIGIN", rec.Header().Get(echo.HeaderXFrameOptions)) assert.Equal(t, "", rec.Header().Get(echo.HeaderStrictTransportSecurity)) assert.Equal(t, "", rec.Header().Get(echo.HeaderContentSecurityPolicy)) // Custom req.Header().Set(echo.HeaderXForwardedProto, "https") rec = test.NewResponseRecorder() c = e.NewContext(req, rec) SecureWithConfig(SecureConfig{ XSSProtection: "", ContentTypeNosniff: "", XFrameOptions: "", HSTSMaxAge: 3600, ContentSecurityPolicy: "default-src 'self'", })(h)(c) assert.Equal(t, "", rec.Header().Get(echo.HeaderXXSSProtection)) assert.Equal(t, "", rec.Header().Get(echo.HeaderXContentTypeOptions)) assert.Equal(t, "", rec.Header().Get(echo.HeaderXFrameOptions)) assert.Equal(t, "max-age=3600; includeSubdomains", rec.Header().Get(echo.HeaderStrictTransportSecurity)) assert.Equal(t, "default-src 'self'", rec.Header().Get(echo.HeaderContentSecurityPolicy)) }
func TestContextQueryParam(t *testing.T) { q := make(url.Values) q.Set("name", "joe") q.Set("email", "*****@*****.**") rq := test.NewRequest(GET, "/?"+q.Encode(), nil) e := New() c := e.NewContext(rq, nil) assert.Equal(t, "joe", c.QueryParam("name")) assert.Equal(t, "*****@*****.**", c.QueryParam("email")) }
func TestEchoMethodNotAllowed(t *testing.T) { e := New() e.GET("/", func(c Context) error { return c.String(http.StatusOK, "Echo!") }) req := test.NewRequest(POST, "/", nil) rec := test.NewResponseRecorder() e.ServeHTTP(req, rec) assert.Equal(t, http.StatusMethodNotAllowed, rec.Status()) }
func TestContextRedirect(t *testing.T) { e := New() req := test.NewRequest(GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) assert.Equal(t, nil, c.Redirect(http.StatusMovedPermanently, "http://labstack.github.io/echo")) assert.Equal(t, http.StatusMovedPermanently, rec.Status()) assert.Equal(t, "http://labstack.github.io/echo", rec.Header().Get(HeaderLocation)) assert.Error(t, c.Redirect(310, "http://labstack.github.io/echo")) }
func TestBinderQueryParams(t *testing.T) { e := New() req := test.NewRequest(GET, "/?id=1&name=Jon Snow", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) u := new(user) err := c.Bind(u) if assert.NoError(t, err) { assert.Equal(t, 1, u.ID) assert.Equal(t, "Jon Snow", u.Name) } }
func TestGzipErrorReturned(t *testing.T) { e := echo.New() e.Use(Gzip()) e.GET("/", func(c echo.Context) error { return echo.NewHTTPError(http.StatusInternalServerError, "error") }) req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() e.ServeHTTP(req, rec) assert.Empty(t, rec.Header().Get(echo.HeaderContentEncoding)) assert.Equal(t, "error", rec.Body.String()) }
func TestNonWWWRedirect(t *testing.T) { e := echo.New() next := func(c echo.Context) (err error) { return c.NoContent(http.StatusOK) } req := test.NewRequest(echo.GET, "http://www.labstack.com", nil) res := test.NewResponseRecorder() c := e.NewContext(req, res) NonWWWRedirect()(next)(c) assert.Equal(t, http.StatusMovedPermanently, res.Status()) assert.Equal(t, "http://labstack.com", res.Header().Get(echo.HeaderLocation)) }
func TestBinderForm(t *testing.T) { testBinderOkay(t, strings.NewReader(userForm), MIMEApplicationForm) testBinderError(t, nil, MIMEApplicationForm) e := New() req := test.NewRequest(POST, "/", strings.NewReader(userForm)) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) req.Header().Set(HeaderContentType, MIMEApplicationForm) var obj = make([]struct{ Field string }, 0) err := c.Bind(&obj) assert.Error(t, err) }
func TestBodyLimit(t *testing.T) { e := echo.New() hw := []byte("Hello, World!") req := test.NewRequest(echo.POST, "/", bytes.NewReader(hw)) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := func(c echo.Context) error { body, err := ioutil.ReadAll(c.Request().Body()) if err != nil { return err } return c.String(http.StatusOK, string(body)) } // Based on content length (within limit) if assert.NoError(t, BodyLimit("2M")(h)(c)) { assert.Equal(t, http.StatusOK, rec.Status()) assert.Equal(t, hw, rec.Body.Bytes()) } // Based on content read (overlimit) he := BodyLimit("2B")(h)(c).(*echo.HTTPError) assert.Equal(t, http.StatusRequestEntityTooLarge, he.Code) // Based on content read (within limit) req = test.NewRequest(echo.POST, "/", bytes.NewReader(hw)) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) if assert.NoError(t, BodyLimit("2M")(h)(c)) { assert.Equal(t, http.StatusOK, rec.Status()) assert.Equal(t, "Hello, World!", rec.Body.String()) } // Based on content read (overlimit) req = test.NewRequest(echo.POST, "/", bytes.NewReader(hw)) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) he = BodyLimit("2B")(h)(c).(*echo.HTTPError) assert.Equal(t, http.StatusRequestEntityTooLarge, he.Code) }
func testBinderOkay(t *testing.T, r io.Reader, ctype string) { e := New() req := test.NewRequest(POST, "/", r) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) req.Header().Set(HeaderContentType, ctype) u := new(user) err := c.Bind(u) if assert.NoError(t, err) { assert.Equal(t, 1, u.ID) assert.Equal(t, "Jon Snow", u.Name) } }
func TestCSRF(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) csrf := CSRFWithConfig(CSRFConfig{ Secret: []byte("secret"), CookiePath: "/", CookieDomain: "labstack.com", }) h := csrf(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) // No secret assert.Panics(t, func() { CSRF(nil) }) // Generate CSRF token h(c) assert.Contains(t, rec.Header().Get(echo.HeaderSetCookie), "csrf") // Empty/invalid CSRF token req = test.NewRequest(echo.POST, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderXCSRFToken, "") he := h(c).(*echo.HTTPError) assert.Equal(t, http.StatusForbidden, he.Code) // Valid CSRF token salt, _ := generateSalt(8) token := generateCSRFToken([]byte("secret"), salt) req.Header().Set(echo.HeaderXCSRFToken, token) if assert.NoError(t, h(c)) { assert.Equal(t, http.StatusOK, rec.Status()) } }
func TestContextFormValue(t *testing.T) { f := make(url.Values) f.Set("name", "joe") f.Set("email", "*****@*****.**") e := New() rq := test.NewRequest(POST, "/", strings.NewReader(f.Encode())) rq.Header().Add(HeaderContentType, MIMEApplicationForm) c := e.NewContext(rq, nil) assert.Equal(t, "joe", c.FormValue("name")) assert.Equal(t, "*****@*****.**", c.FormValue("email")) }
func TestLogger(t *testing.T) { // Note: Just for the test coverage, not a real test. e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := Logger()(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) // Status 2xx h(c) // Status 3xx rec = test.NewResponseRecorder() c = e.NewContext(req, rec) h = Logger()(func(c echo.Context) error { return c.String(http.StatusTemporaryRedirect, "test") }) h(c) // Status 4xx rec = test.NewResponseRecorder() c = e.NewContext(req, rec) h = Logger()(func(c echo.Context) error { return c.String(http.StatusNotFound, "test") }) h(c) // Status 5xx with empty path req = test.NewRequest(echo.GET, "", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) h = Logger()(func(c echo.Context) error { return errors.New("error") }) h(c) }
func TestCSRFTokenFromForm(t *testing.T) { f := make(url.Values) f.Set("csrf", "token") e := echo.New() req := test.NewRequest(echo.POST, "/", strings.NewReader(f.Encode())) req.Header().Add(echo.HeaderContentType, echo.MIMEApplicationForm) c := e.NewContext(req, nil) token, err := csrfTokenFromForm("csrf")(c) if assert.NoError(t, err) { assert.Equal(t, "token", token) } token, err = csrfTokenFromForm("invalid")(c) assert.Error(t, err) }
func TestGzipNoContent(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) h := Gzip()(func(c echo.Context) error { return c.NoContent(http.StatusOK) }) if assert.NoError(t, h(c)) { assert.Empty(t, rec.Header().Get(echo.HeaderContentEncoding)) assert.Empty(t, rec.Header().Get(echo.HeaderContentType)) assert.Equal(t, 0, len(rec.Body.Bytes())) } }
func TestRecover(t *testing.T) { e := echo.New() buf := new(bytes.Buffer) e.SetLogOutput(buf) rq := test.NewRequest(echo.GET, "/", nil) rc := test.NewResponseRecorder() c := e.NewContext(rq, rc) h := Recover()(echo.HandlerFunc(func(c echo.Context) error { panic("test") })) h(c) assert.Equal(t, http.StatusInternalServerError, rc.Status()) assert.Contains(t, buf.String(), "PANIC RECOVER") }
func TestMethodOverride(t *testing.T) { e := echo.New() m := MethodOverride() h := func(c echo.Context) error { return c.String(http.StatusOK, "test") } // Override with http header req := test.NewRequest(echo.POST, "/", nil) rec := test.NewResponseRecorder() req.Header().Set(echo.HeaderXHTTPMethodOverride, echo.DELETE) c := e.NewContext(req, rec) m(h)(c) assert.Equal(t, echo.DELETE, req.Method()) // Override with form parameter m = MethodOverrideWithConfig(MethodOverrideConfig{Getter: MethodFromForm("_method")}) req = test.NewRequest(echo.POST, "/", bytes.NewReader([]byte("_method="+echo.DELETE))) rec = test.NewResponseRecorder() req.Header().Set(echo.HeaderContentType, echo.MIMEApplicationForm) c = e.NewContext(req, rec) m(h)(c) assert.Equal(t, echo.DELETE, req.Method()) // Override with query paramter m = MethodOverrideWithConfig(MethodOverrideConfig{Getter: MethodFromQuery("_method")}) req = test.NewRequest(echo.POST, "/?_method="+echo.DELETE, nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) m(h)(c) assert.Equal(t, echo.DELETE, req.Method()) // Ignore `GET` req = test.NewRequest(echo.GET, "/", nil) req.Header().Set(echo.HeaderXHTTPMethodOverride, echo.DELETE) assert.Equal(t, echo.GET, req.Method()) }
func TestCSRF(t *testing.T) { e := echo.New() req := test.NewRequest(echo.GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) csrf := CSRFWithConfig(CSRFConfig{ TokenLength: 16, }) h := csrf(func(c echo.Context) error { return c.String(http.StatusOK, "test") }) // Generate CSRF token h(c) assert.Contains(t, rec.Header().Get(echo.HeaderSetCookie), "_csrf") // Without CSRF cookie req = test.NewRequest(echo.POST, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) assert.Error(t, h(c)) // Empty/invalid CSRF token req = test.NewRequest(echo.POST, "/", nil) rec = test.NewResponseRecorder() c = e.NewContext(req, rec) req.Header().Set(echo.HeaderXCSRFToken, "") assert.Error(t, h(c)) // Valid CSRF token token := random.String(16) req.Header().Set(echo.HeaderCookie, "_csrf="+token) req.Header().Set(echo.HeaderXCSRFToken, token) if assert.NoError(t, h(c)) { assert.Equal(t, http.StatusOK, rec.Status()) } }
func TestCSRFTokenFromQuery(t *testing.T) { q := make(url.Values) q.Set("csrf", "token") e := echo.New() req := test.NewRequest(echo.GET, "/?"+q.Encode(), nil) req.Header().Add(echo.HeaderContentType, echo.MIMEApplicationForm) c := e.NewContext(req, nil) token, err := csrfTokenFromQuery("csrf")(c) if assert.NoError(t, err) { assert.Equal(t, "token", token) } token, err = csrfTokenFromQuery("invalid")(c) assert.Error(t, err) csrfTokenFromQuery("csrf") }
func TestContextMultipartForm(t *testing.T) { e := New() buf := new(bytes.Buffer) mw := multipart.NewWriter(buf) mw.WriteField("name", "Jon Snow") mw.Close() req := test.NewRequest(POST, "/", buf) req.Header().Set(HeaderContentType, mw.FormDataContentType()) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) f, err := c.MultipartForm() if assert.NoError(t, err) { assert.NotNil(t, f) } }
func TestEcho(t *testing.T) { e := New() req := test.NewRequest(GET, "/", nil) rec := test.NewResponseRecorder() c := e.NewContext(req, rec) // Router assert.NotNil(t, e.Router()) // Debug e.SetDebug(true) assert.True(t, e.debug) // DefaultHTTPErrorHandler e.DefaultHTTPErrorHandler(errors.New("error"), c) assert.Equal(t, http.StatusInternalServerError, rec.Status()) }
func TestGzipNoContent(t *testing.T) { e := echo.New() rq := test.NewRequest(echo.GET, "/", nil) rc := test.NewResponseRecorder() c := e.NewContext(rq, rc) h := Gzip()(func(c echo.Context) error { return c.NoContent(http.StatusOK) }) h(c) assert.Empty(t, rc.Header().Get(echo.HeaderContentEncoding)) assert.Empty(t, rc.Header().Get(echo.HeaderContentType)) b, err := ioutil.ReadAll(rc.Body) if assert.NoError(t, err) { assert.Equal(t, 0, len(b)) } }