components-contrib/bindings/http/http_test.go

1008 lines
27 KiB
Go

/*
Copyright 2021 The Dapr Authors
Licensed under the Apache License, Version 2.0 (the "License");
you may not use this file except in compliance with the License.
You may obtain a copy of the License at
http://www.apache.org/licenses/LICENSE-2.0
Unless required by applicable law or agreed to in writing, software
distributed under the License is distributed on an "AS IS" BASIS,
WITHOUT WARRANTIES OR CONDITIONS OF ANY KIND, either express or implied.
See the License for the specific language governing permissions and
limitations under the License.
*/
package http
import (
"context"
"crypto/ecdsa"
"crypto/elliptic"
"crypto/rand"
"crypto/tls"
"crypto/x509"
"crypto/x509/pkix"
"encoding/pem"
"fmt"
"io"
"math/big"
"net"
"net/http"
"net/http/httptest"
"os"
"path/filepath"
"strconv"
"strings"
"testing"
"time"
"github.com/stretchr/testify/assert"
"github.com/stretchr/testify/require"
"github.com/dapr/components-contrib/bindings"
"github.com/dapr/components-contrib/metadata"
"github.com/dapr/kit/logger"
)
func TestOperations(t *testing.T) {
opers := (*HTTPSource)(nil).Operations()
assert.Equal(t, []bindings.OperationKind{
bindings.CreateOperation,
"get",
"head",
"post",
"put",
"patch",
"delete",
"options",
"trace",
}, opers)
}
//nolint:forbidigo
func TestMain(m *testing.M) {
err := generateCACertificate()
if err != nil {
fmt.Println("Failed to generate CA certificate:", err)
os.Exit(1)
}
err = generateMTLSCertificates()
if err != nil {
fmt.Println("Failed to generate mTLS certificates:", err)
os.Exit(1)
}
exitCode := m.Run()
err = deleteTestCerts()
if err != nil {
fmt.Println("Failed to delete test certificates:", err)
os.Exit(1)
}
os.Exit(exitCode)
}
func deleteTestCerts() error {
files, err := filepath.Glob(filepath.Join("testdata", "*.key"))
if err != nil {
return err
}
for _, file := range files {
err = os.Remove(file)
if err != nil {
return err
}
}
files, err = filepath.Glob(filepath.Join("testdata", "*.pem"))
if err != nil {
return err
}
for _, file := range files {
err = os.Remove(file)
if err != nil {
return err
}
}
return nil
}
func generateCACertificate() error {
// Generate a private key for the CA
caPrivateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
return err
}
// Create a self-signed CA certificate
caTemplate := &x509.Certificate{
SerialNumber: big.NewInt(1),
Subject: pkix.Name{CommonName: "CA"},
NotBefore: time.Now().Add(-1 * time.Hour),
NotAfter: time.Now().Add(24 * time.Hour),
KeyUsage: x509.KeyUsageCertSign | x509.KeyUsageCRLSign,
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
BasicConstraintsValid: true,
IsCA: true,
}
caCertificate, err := x509.CreateCertificate(rand.Reader, caTemplate, caTemplate, caPrivateKey.Public(), caPrivateKey)
if err != nil {
return err
}
// Save the CA certificate to "ca.pem"
caCertFile, err := os.Create(filepath.Join("testdata", "ca.pem"))
if err != nil {
return err
}
defer caCertFile.Close()
err = pem.Encode(caCertFile, &pem.Block{Type: "CERTIFICATE", Bytes: caCertificate})
if err != nil {
return err
}
// Save the CA private key to "ca.key"
caKeyFile, err := os.Create(filepath.Join("testdata", "ca.key"))
if err != nil {
return err
}
defer caKeyFile.Close()
caPrivateKeyBytes, err := x509.MarshalPKCS8PrivateKey(caPrivateKey)
if err != nil {
return err
}
err = pem.Encode(caKeyFile, &pem.Block{Type: "PRIVATE KEY", Bytes: caPrivateKeyBytes})
if err != nil {
return err
}
return nil
}
func generateMTLSCertificates() error {
// Load the CA private key
caKeyFile, err := os.ReadFile(filepath.Join("testdata", "ca.key"))
if err != nil {
return err
}
caKeyBlock, _ := pem.Decode(caKeyFile)
caPrivateKey, err := x509.ParsePKCS8PrivateKey(caKeyBlock.Bytes)
if err != nil {
return err
}
// Load the CA certificate
caCertFile, err := os.ReadFile(filepath.Join("testdata", "ca.pem"))
if err != nil {
return err
}
caCertBlock, _ := pem.Decode(caCertFile)
caCertificate, err := x509.ParseCertificate(caCertBlock.Bytes)
if err != nil {
return err
}
// Generate a private key for the client
clientPrivateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
return err
}
// Create a certificate for the client
client := &x509.Certificate{
SerialNumber: big.NewInt(10),
Subject: pkix.Name{Organization: []string{"client"}},
NotBefore: time.Now().Add(-1 * time.Hour),
NotAfter: time.Now().Add(24 * time.Hour),
IPAddresses: []net.IP{net.IPv4(127, 0, 0, 1), net.IPv6loopback},
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
KeyUsage: x509.KeyUsageDigitalSignature,
}
clientCertificate, err := x509.CreateCertificate(rand.Reader, client, caCertificate, clientPrivateKey.Public(), caPrivateKey)
if err != nil {
return err
}
// Save the client certificate to "client.pem"
clientCertFile, err := os.Create(filepath.Join("testdata", "client.pem"))
if err != nil {
return err
}
defer clientCertFile.Close()
err = pem.Encode(clientCertFile, &pem.Block{Type: "CERTIFICATE", Bytes: clientCertificate})
if err != nil {
return err
}
// Save the client private key to "client.key"
clientKeyFile, err := os.Create(filepath.Join("testdata", "client.key"))
if err != nil {
return err
}
defer clientKeyFile.Close()
clientPrivateKeyBytes, err := x509.MarshalPKCS8PrivateKey(clientPrivateKey)
if err != nil {
return err
}
err = pem.Encode(clientKeyFile, &pem.Block{Type: "PRIVATE KEY", Bytes: clientPrivateKeyBytes})
if err != nil {
return err
}
// Generate a private key for the server
serverPrivateKey, err := ecdsa.GenerateKey(elliptic.P256(), rand.Reader)
if err != nil {
return err
}
// Create a certificate for the server
server := &x509.Certificate{
SerialNumber: big.NewInt(11),
Subject: pkix.Name{Organization: []string{"server"}},
NotBefore: time.Now().Add(-1 * time.Hour),
NotAfter: time.Now().Add(24 * time.Hour),
IPAddresses: []net.IP{net.IPv4(127, 0, 0, 1), net.IPv6loopback},
ExtKeyUsage: []x509.ExtKeyUsage{x509.ExtKeyUsageClientAuth, x509.ExtKeyUsageServerAuth},
KeyUsage: x509.KeyUsageDigitalSignature,
}
serverCertificate, err := x509.CreateCertificate(rand.Reader, server, caCertificate, serverPrivateKey.Public(), caPrivateKey)
if err != nil {
return err
}
// Save the server certificate to "server.pem"
serverCertFile, err := os.Create(filepath.Join("testdata", "server.pem"))
if err != nil {
return err
}
defer serverCertFile.Close()
err = pem.Encode(serverCertFile, &pem.Block{Type: "CERTIFICATE", Bytes: serverCertificate})
if err != nil {
return err
}
// Save the server private key to "server.key"
serverKeyFile, err := os.Create(filepath.Join("testdata", "server.key"))
if err != nil {
return err
}
defer serverKeyFile.Close()
serverPrivateKeyBytes, err := x509.MarshalPKCS8PrivateKey(serverPrivateKey)
if err != nil {
return err
}
err = pem.Encode(serverKeyFile, &pem.Block{Type: "PRIVATE KEY", Bytes: serverPrivateKeyBytes})
if err != nil {
return err
}
return nil
}
type TestCase struct {
input string
operation string
metadata map[string]string
path string
err string
statusCode int
}
func (tc TestCase) ToInvokeRequest() bindings.InvokeRequest {
requestMetadata := tc.metadata
if requestMetadata == nil {
requestMetadata = map[string]string{}
}
requestMetadata["X-Status-Code"] = strconv.Itoa(tc.statusCode)
requestMetadata["path"] = tc.path
return bindings.InvokeRequest{
Data: []byte(tc.input),
Metadata: requestMetadata,
Operation: bindings.OperationKind(tc.operation),
}
}
type HTTPHandler struct {
Path string
Headers map[string]string
}
func (h *HTTPHandler) ServeHTTP(w http.ResponseWriter, req *http.Request) {
h.Path = req.URL.Path
if strings.TrimPrefix(h.Path, "/") == "large" {
// Write 5KB
for i := 0; i < 1<<10; i++ {
fmt.Fprint(w, "12345")
}
return
}
h.Headers = make(map[string]string)
for headerKey, headerValue := range req.Header {
h.Headers[headerKey] = headerValue[0]
}
input := req.Method
if req.Body != nil {
defer req.Body.Close()
b, _ := io.ReadAll(req.Body)
if len(b) > 0 {
input = string(b)
}
}
inputFromHeader := req.Header.Get("X-Input")
if inputFromHeader != "" {
input = inputFromHeader
}
sleepSeconds := req.Header.Get("X-Delay-Seconds")
if sleepSeconds != "" {
seconds, _ := strconv.Atoi(sleepSeconds)
time.Sleep(time.Duration(seconds) * time.Second)
}
w.Header().Set("Content-Type", "text/plain")
statusCode := req.Header.Get("X-Status-Code")
if statusCode != "" {
code, _ := strconv.Atoi(statusCode)
w.WriteHeader(code)
}
w.Write([]byte(strings.ToUpper(input)))
}
func NewHTTPHandler() *HTTPHandler {
return &HTTPHandler{
Path: "/",
Headers: make(map[string]string),
}
}
func InitBinding(s *httptest.Server, extraProps map[string]string) (bindings.OutputBinding, error) {
m := bindings.Metadata{Base: metadata.Base{
Properties: map[string]string{
"url": s.URL,
},
}}
for k, v := range extraProps {
m.Properties[k] = v
}
hs := NewHTTP(logger.NewLogger("test"))
err := hs.Init(context.Background(), m)
return hs, err
}
func TestInit(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
_, err := InitBinding(s, nil)
require.NoError(t, err)
}
func TestDefaultBehavior(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
hs, err := InitBinding(s, nil)
require.NoError(t, err)
verifyDefaultBehaviors(t, hs, handler)
}
func TestNon2XXErrorsSuppressed(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
hs, err := InitBinding(s, map[string]string{"errorIfNot2XX": "false"})
require.NoError(t, err)
verifyNon2XXErrorsSuppressed(t, hs, handler)
}
func TestSecurityTokenHeaderForwarded(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
t.Run("security token headers are forwarded", func(t *testing.T) {
hs, err := InitBinding(s, map[string]string{securityTokenHeader: "X-Token", securityToken: "12345"})
require.NoError(t, err)
req := TestCase{
input: "GET",
operation: "get",
path: "/",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
assert.Equal(t, "12345", handler.Headers["X-Token"])
})
t.Run("security token headers are forwarded", func(t *testing.T) {
hs, err := InitBinding(s, nil)
require.NoError(t, err)
req := TestCase{
input: "GET",
operation: "get",
path: "/",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
assert.Empty(t, handler.Headers["X-Token"])
})
}
func TestTraceHeadersForwarded(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
hs, err := InitBinding(s, nil)
require.NoError(t, err)
t.Run("trace headers are forwarded", func(t *testing.T) {
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/", "traceparent": "12345", "tracestate": "67890"},
path: "/",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
assert.Equal(t, "12345", handler.Headers["Traceparent"])
assert.Equal(t, "67890", handler.Headers["Tracestate"])
})
t.Run("trace headers should not be forwarded if empty", func(t *testing.T) {
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/", "traceparent": "", "tracestate": ""},
path: "/",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
_, traceParentExists := handler.Headers["Traceparent"]
assert.False(t, traceParentExists)
_, traceStateExists := handler.Headers["Tracestate"]
assert.False(t, traceStateExists)
})
t.Run("trace headers override headers in request metadata", func(t *testing.T) {
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/", "Traceparent": "abcde", "Tracestate": "fghijk", "traceparent": "12345", "tracestate": "67890"},
path: "/",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
assert.Equal(t, "12345", handler.Headers["Traceparent"])
assert.Equal(t, "67890", handler.Headers["Tracestate"])
})
}
func InitBindingForHTTPS(s *httptest.Server, extraProps map[string]string) (bindings.OutputBinding, error) {
m := bindings.Metadata{Base: metadata.Base{
Properties: map[string]string{
"url": s.URL,
},
}}
for k, v := range extraProps {
m.Properties[k] = v
}
hs := NewHTTP(logger.NewLogger("test"))
err := hs.Init(context.Background(), m)
return hs, err
}
func mTLSHandler(w http.ResponseWriter, r *http.Request) {
// r.TLS gets ignored by HTTP handlers.
// in case where client auth is not required, r.TLS.PeerCertificates will be empty.
res := strconv.Itoa(len(r.TLS.PeerCertificates))
io.WriteString(w, res)
}
func TestDefaultBehaviorHTTPS(t *testing.T) {
handler := NewHTTPHandler()
t.Run("client auth required", func(t *testing.T) {
// Passing true to setupHTTPSServer mandates the server to require for client auth.
server := setupHTTPSServer(t, true, handler)
defer server.Close()
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
"MTLSClientCert": filepath.Join(".", "testdata", "client.pem"),
"MTLSClientKey": filepath.Join(".", "testdata", "client.key"),
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
verifyDefaultBehaviors(t, hs, handler)
})
t.Run("client auth not required", func(t *testing.T) {
// Passing false to setupHTTPSServer sets up the server with client auth disabled.
server := setupHTTPSServer(t, false, handler)
defer server.Close()
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
verifyDefaultBehaviors(t, hs, handler)
})
}
func TestNon2XXErrorsSuppressedHTTPS(t *testing.T) {
handler := NewHTTPHandler()
t.Run("client auth required", func(t *testing.T) {
// Passing true to setupHTTPSServer mandates the server to require for client auth.
server := setupHTTPSServer(t, true, handler)
defer server.Close()
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
"MTLSClientCert": filepath.Join(".", "testdata", "client.pem"),
"MTLSClientKey": filepath.Join(".", "testdata", "client.key"),
"errorIfNot2XX": "false",
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
verifyNon2XXErrorsSuppressed(t, hs, handler)
})
t.Run("client auth not required", func(t *testing.T) {
// Passing false to setupHTTPSServer sets up the server with client auth disabled.
server := setupHTTPSServer(t, false, handler)
defer server.Close()
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
"errorIfNot2XX": "false",
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
verifyNon2XXErrorsSuppressed(t, hs, handler)
})
}
func TestHTTPSBinding(t *testing.T) {
handler := http.NewServeMux()
handler.HandleFunc("/testmTLS", mTLSHandler)
server := setupHTTPSServer(t, true, handler)
defer server.Close()
t.Run("get with https with valid client cert and clientAuthEnabled true", func(t *testing.T) {
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
"MTLSClientCert": filepath.Join(".", "testdata", "client.pem"),
"MTLSClientKey": filepath.Join(".", "testdata", "client.key"),
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/testmTLS"},
path: "/testmTLS",
err: "",
statusCode: 200,
}.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
require.NoError(t, err)
peerCerts, err := strconv.Atoi(string(response.Data))
require.NoError(t, err)
assert.Greater(t, peerCerts, 0)
req = TestCase{
input: "EXPECTED",
operation: "post",
metadata: map[string]string{"path": "/testmTLS"},
path: "/testmTLS",
err: "",
statusCode: 201,
}.ToInvokeRequest()
response, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
peerCerts, err = strconv.Atoi(string(response.Data))
require.NoError(t, err)
assert.Greater(t, peerCerts, 0)
})
t.Run("get with https with no client cert and clientAuthEnabled true", func(t *testing.T) {
certMap := map[string]string{}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/testmTLS"},
path: "/testmTLS",
err: "",
statusCode: 200,
}.ToInvokeRequest()
_, err = hs.Invoke(context.Background(), &req)
require.Error(t, err)
})
t.Run("get with https without client cert and clientAuthEnabled false", func(t *testing.T) {
server = setupHTTPSServer(t, false, handler)
certMap := map[string]string{
"MTLSRootCA": filepath.Join(".", "testdata", "ca.pem"),
}
hs, err := InitBindingForHTTPS(server, certMap)
require.NoError(t, err)
req := TestCase{
input: "GET",
operation: "get",
metadata: map[string]string{"path": "/testmTLS"},
path: "/testmTLS",
err: "",
statusCode: 200,
}.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
require.NoError(t, err)
peerCerts, err := strconv.Atoi(string(response.Data))
require.NoError(t, err)
// Checking for 0 peer certs as client auth is disabled.
// If client auth is enabled, then the number of peer certs will be > 0.
// For HTTP, request will not have TLS info only.
assert.Equal(t, 0, peerCerts)
req = TestCase{
input: "EXPECTED",
operation: "post",
metadata: map[string]string{"path": "/testmTLS"},
path: "/testmTLS",
err: "",
statusCode: 201,
}.ToInvokeRequest()
response, err = hs.Invoke(context.Background(), &req)
require.NoError(t, err)
peerCerts, err = strconv.Atoi(string(response.Data))
require.NoError(t, err)
// Checking for 0 peer certs as client auth is disabled.
// If client auth is enabled, then the number of peer certs will be > 0.
// For HTTP, request will not have TLS info only.
assert.Equal(t, 0, peerCerts)
})
}
func setupHTTPSServer(t *testing.T, clientAuthEnabled bool, handler http.Handler) *httptest.Server {
server := httptest.NewUnstartedServer(handler)
caCertFile, err := os.ReadFile(filepath.Join(".", "testdata", "ca.pem"))
require.NoError(t, err)
caCertPool := x509.NewCertPool()
caCertPool.AppendCertsFromPEM(caCertFile)
serverCert := filepath.Join(".", "testdata", "server.pem")
serverKey := filepath.Join(".", "testdata", "server.key")
cert, err := tls.LoadX509KeyPair(serverCert, serverKey)
require.NoError(t, err)
// Create the TLS Config with the CA pool and enable Client certificate validation
tlsConfig := &tls.Config{
MinVersion: tls.VersionTLS12,
ClientCAs: caCertPool,
Certificates: []tls.Certificate{cert},
}
if clientAuthEnabled {
tlsConfig.ClientAuth = tls.RequireAndVerifyClientCert
}
server.TLS = tlsConfig
server.StartTLS()
return server
}
func verifyDefaultBehaviors(t *testing.T, hs bindings.OutputBinding, handler *HTTPHandler) {
tests := map[string]TestCase{
"get": {
input: "GET",
operation: "get",
metadata: nil,
path: "/",
err: "",
statusCode: 200,
},
"request headers": {
input: "OVERRIDE",
operation: "get",
metadata: map[string]string{"X-Input": "override"},
path: "/",
err: "",
statusCode: 200,
},
"post": {
input: "expected",
operation: "post",
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "",
statusCode: 201,
},
"put": {
input: "expected",
operation: "put",
statusCode: 204,
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "",
},
"patch": {
input: "expected",
operation: "patch",
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "",
statusCode: 206,
},
"delete": {
input: "DELETE",
operation: "delete",
metadata: nil,
path: "/",
err: "",
statusCode: 200,
},
"options": {
input: "OPTIONS",
operation: "options",
metadata: nil,
path: "/",
err: "",
statusCode: 200,
},
"trace": {
input: "TRACE",
operation: "trace",
metadata: nil,
path: "/",
err: "",
statusCode: 200,
},
"backward compatibility": {
input: "expected",
operation: "create",
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "",
statusCode: 200,
},
"invalid operation": {
input: "notvalid",
operation: "notvalid",
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "invalid operation: notvalid",
statusCode: 400,
},
"internal server error": {
input: "internal server error",
operation: "post",
metadata: map[string]string{"path": "/"},
path: "/",
err: "received status code 500",
statusCode: 500,
},
"internal server error suppressed": {
input: "internal server error", // trigger 500 downstream
operation: "post",
metadata: map[string]string{"path": "/", "errorIfNot2XX": "false"},
path: "/",
err: "",
statusCode: 500,
},
"redirect should not yield an error": {
input: "show me the treasure!",
operation: "post",
metadata: map[string]string{"path": "/", "errorIfNot2XX": "false"},
path: "/",
err: "",
statusCode: 302,
},
"redirect results in an error if not suppressed": {
input: "show me the treasure!",
operation: "post",
metadata: map[string]string{"path": "/"},
path: "/",
err: "received status code 302",
statusCode: 302,
},
}
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
req := tc.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
if tc.err == "" {
require.NoError(t, err)
assert.Equal(t, tc.path, handler.Path)
if tc.statusCode != 204 {
// 204 will return no content, so we should skip checking
assert.Equal(t, strings.ToUpper(tc.input), string(response.Data))
}
assert.Equal(t, "text/plain", response.Metadata["Content-Type"])
} else {
require.Error(t, err)
assert.Equal(t, tc.err, err.Error())
}
})
}
}
func verifyNon2XXErrorsSuppressed(t *testing.T, hs bindings.OutputBinding, handler *HTTPHandler) {
tests := map[string]TestCase{
"internal server error": {
input: "internal server error",
operation: "post",
metadata: map[string]string{"path": "/"},
path: "/",
err: "",
statusCode: 500,
},
"internal server error overridden": {
input: "internal server error",
operation: "post",
metadata: map[string]string{"path": "/", "errorIfNot2XX": "true"},
path: "/",
err: "received status code 500",
statusCode: 500,
},
"internal server error suppressed by request and component": {
input: "internal server error", // trigger 500
operation: "post",
metadata: map[string]string{"path": "/", "errorIfNot2XX": "false"},
path: "/",
err: "",
statusCode: 500,
},
"trace": {
input: "TRACE",
operation: "trace",
metadata: nil,
path: "/",
err: "",
statusCode: 200,
},
"backward compatibility": {
input: "expected",
operation: "create",
metadata: map[string]string{"path": "/test"},
path: "/test",
err: "",
statusCode: 200,
},
}
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
req := tc.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
if tc.err == "" {
require.NoError(t, err)
assert.Equal(t, tc.path, handler.Path)
if tc.statusCode != 204 {
// 204 will return no content, so we should skip checking
assert.Equal(t, strings.ToUpper(tc.input), string(response.Data))
}
assert.Equal(t, "text/plain", response.Metadata["Content-Type"])
} else {
require.Error(t, err)
assert.Equal(t, tc.err, err.Error())
}
})
}
}
func TestTimeoutHonored(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
hs, err := InitBinding(s, map[string]string{"responseTimeout": "1s"})
require.NoError(t, err)
verifyTimeoutBehavior(t, hs, handler)
}
func verifyTimeoutBehavior(t *testing.T, hs bindings.OutputBinding, handler *HTTPHandler) {
tests := map[string]TestCase{
"exceedsResponseTimeout": {
input: "GET",
operation: "get",
metadata: map[string]string{"X-Delay-Seconds": "2"},
path: "/",
err: "context deadline exceeded",
statusCode: 200,
},
"meetsResposneTimeout": {
input: "GET",
operation: "get",
metadata: map[string]string{},
path: "/",
err: "",
statusCode: 200,
},
}
for name, tc := range tests {
t.Run(name, func(t *testing.T) {
req := tc.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
if tc.err == "" {
require.NoError(t, err)
assert.Equal(t, tc.path, handler.Path)
if tc.statusCode != 204 {
// 204 will return no content, so we should skip checking
assert.Equal(t, strings.ToUpper(tc.input), string(response.Data))
}
assert.Equal(t, "text/plain", response.Metadata["Content-Type"])
} else {
require.Error(t, err)
assert.Contains(t, err.Error(), tc.err)
}
})
}
}
func TestMaxBodySizeHonored(t *testing.T) {
handler := NewHTTPHandler()
s := httptest.NewServer(handler)
defer s.Close()
hs, err := InitBinding(s, map[string]string{"maxResponseBodySize": "1Ki"})
require.NoError(t, err)
tc := TestCase{
input: "GET",
operation: "get",
path: "/large",
err: "context deadline exceeded",
statusCode: 200,
}
req := tc.ToInvokeRequest()
response, err := hs.Invoke(context.Background(), &req)
require.NoError(t, err)
// Should have only read 1KB
assert.Len(t, response.Data, 1<<10)
}