2021-06-26 18:11:47 +02:00
|
|
|
package netxlite
|
|
|
|
|
|
|
|
import (
|
|
|
|
"context"
|
|
|
|
"errors"
|
|
|
|
"io"
|
2021-07-01 15:26:08 +02:00
|
|
|
"net"
|
2021-06-26 18:11:47 +02:00
|
|
|
"net/http"
|
|
|
|
"strings"
|
|
|
|
"testing"
|
2021-09-06 19:27:59 +02:00
|
|
|
"time"
|
2021-06-26 18:11:47 +02:00
|
|
|
|
|
|
|
"github.com/apex/log"
|
2021-09-06 17:21:34 +02:00
|
|
|
oohttp "github.com/ooni/oohttp"
|
2021-06-26 18:11:47 +02:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/atomicx"
|
2022-01-03 13:53:23 +01:00
|
|
|
"github.com/ooni/probe-cli/v3/internal/model/mocks"
|
2021-06-26 18:11:47 +02:00
|
|
|
)
|
|
|
|
|
2021-11-06 17:49:58 +01:00
|
|
|
func TestHTTPTransportErrWrapper(t *testing.T) {
|
|
|
|
t.Run("RoundTrip", func(t *testing.T) {
|
|
|
|
t.Run("with failure", func(t *testing.T) {
|
|
|
|
txp := &httpTransportErrWrapper{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return nil, io.EOF
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
resp, err := txp.RoundTrip(&http.Request{})
|
|
|
|
var errWrapper *ErrWrapper
|
|
|
|
if !errors.As(err, &errWrapper) {
|
|
|
|
t.Fatal("the returned error is not an ErrWrapper")
|
|
|
|
}
|
|
|
|
if errWrapper.Failure != FailureEOFError {
|
|
|
|
t.Fatal("unexpected failure", errWrapper.Failure)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected nil response")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with success", func(t *testing.T) {
|
|
|
|
expect := &http.Response{}
|
|
|
|
txp := &httpTransportErrWrapper{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return expect, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
resp, err := txp.RoundTrip(&http.Request{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp != expect {
|
|
|
|
t.Fatal("not the expected response")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
func TestHTTPTransportLogger(t *testing.T) {
|
|
|
|
t.Run("RoundTrip", func(t *testing.T) {
|
|
|
|
t.Run("with failure", func(t *testing.T) {
|
2021-09-08 22:48:10 +02:00
|
|
|
var count int
|
|
|
|
lo := &mocks.Logger{
|
|
|
|
MockDebug: func(message string) {
|
|
|
|
count++
|
|
|
|
},
|
|
|
|
MockDebugf: func(format string, v ...interface{}) {
|
|
|
|
count++
|
|
|
|
},
|
|
|
|
}
|
2021-09-08 00:59:48 +02:00
|
|
|
txp := &httpTransportLogger{
|
2021-09-08 22:48:10 +02:00
|
|
|
Logger: lo,
|
2021-09-08 00:59:48 +02:00
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return nil, io.EOF
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
client := &http.Client{Transport: txp}
|
|
|
|
resp, err := client.Get("https://www.google.com")
|
|
|
|
if !errors.Is(err, io.EOF) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected nil response here")
|
|
|
|
}
|
2021-09-08 22:48:10 +02:00
|
|
|
if count < 1 {
|
|
|
|
t.Fatal("no logs?!")
|
|
|
|
}
|
2021-09-08 00:59:48 +02:00
|
|
|
})
|
2021-06-26 18:11:47 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
t.Run("with success", func(t *testing.T) {
|
2021-09-08 22:48:10 +02:00
|
|
|
var count int
|
|
|
|
lo := &mocks.Logger{
|
|
|
|
MockDebug: func(message string) {
|
|
|
|
count++
|
|
|
|
},
|
|
|
|
MockDebugf: func(format string, v ...interface{}) {
|
|
|
|
count++
|
|
|
|
},
|
|
|
|
}
|
2021-09-08 00:59:48 +02:00
|
|
|
txp := &httpTransportLogger{
|
2021-09-08 22:48:10 +02:00
|
|
|
Logger: lo,
|
2021-09-08 00:59:48 +02:00
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return &http.Response{
|
|
|
|
Body: io.NopCloser(strings.NewReader("")),
|
|
|
|
Header: http.Header{
|
|
|
|
"Server": []string{"antani/0.1.0"},
|
|
|
|
},
|
|
|
|
StatusCode: 200,
|
|
|
|
}, nil
|
2021-06-26 18:11:47 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
},
|
|
|
|
}
|
|
|
|
client := &http.Client{Transport: txp}
|
2021-09-27 14:14:17 +02:00
|
|
|
req, err := http.NewRequest("GET", "https://www.google.com", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
req.Header.Set("User-Agent", "miniooni/0.1.0-dev")
|
|
|
|
resp, err := client.Do(req)
|
2021-09-08 00:59:48 +02:00
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
2021-09-28 12:42:01 +02:00
|
|
|
ReadAllContext(context.Background(), resp.Body)
|
2021-09-08 00:59:48 +02:00
|
|
|
resp.Body.Close()
|
2021-09-08 22:48:10 +02:00
|
|
|
if count < 1 {
|
|
|
|
t.Fatal("no logs?!")
|
|
|
|
}
|
2021-09-08 00:59:48 +02:00
|
|
|
})
|
|
|
|
})
|
2021-06-26 18:11:47 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
t.Run("CloseIdleConnections", func(t *testing.T) {
|
|
|
|
calls := &atomicx.Int64{}
|
|
|
|
txp := &httpTransportLogger{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
calls.Add(1)
|
|
|
|
},
|
2021-06-26 18:11:47 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
Logger: log.Log,
|
|
|
|
}
|
|
|
|
txp.CloseIdleConnections()
|
|
|
|
if calls.Load() != 1 {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
2021-06-26 18:11:47 +02:00
|
|
|
}
|
2021-07-01 15:26:08 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
func TestHTTPTransportConnectionsCloser(t *testing.T) {
|
|
|
|
t.Run("CloseIdleConnections", func(t *testing.T) {
|
|
|
|
var (
|
|
|
|
calledTxp bool
|
|
|
|
calledDialer bool
|
|
|
|
calledTLS bool
|
|
|
|
)
|
|
|
|
txp := &httpTransportConnectionsCloser{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
calledTxp = true
|
|
|
|
},
|
2021-07-01 15:26:08 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
Dialer: &mocks.Dialer{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
calledDialer = true
|
|
|
|
},
|
2021-09-06 16:53:28 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
TLSDialer: &mocks.TLSDialer{
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
calledTLS = true
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
txp.CloseIdleConnections()
|
|
|
|
if !calledDialer || !calledTLS || !calledTxp {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 16:53:28 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
t.Run("RoundTrip", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
txp := &httpTransportConnectionsCloser{
|
|
|
|
HTTPTransport: &mocks.HTTPTransport{
|
|
|
|
MockRoundTrip: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
client := &http.Client{Transport: txp}
|
|
|
|
resp, err := client.Get("https://www.google.com")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("unexpected resp")
|
|
|
|
}
|
|
|
|
})
|
2021-07-01 15:26:08 +02:00
|
|
|
}
|
2021-09-06 19:27:59 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
func TestNewHTTPTransport(t *testing.T) {
|
|
|
|
t.Run("works as intended with failing dialer", func(t *testing.T) {
|
|
|
|
called := &atomicx.Int64{}
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
d := &dialerResolver{
|
|
|
|
Dialer: &mocks.Dialer{
|
|
|
|
MockDialContext: func(ctx context.Context,
|
|
|
|
network, address string) (net.Conn, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
MockCloseIdleConnections: func() {
|
|
|
|
called.Add(1)
|
|
|
|
},
|
2021-09-06 19:27:59 +02:00
|
|
|
},
|
2021-09-09 01:19:17 +02:00
|
|
|
Resolver: NewResolverStdlib(log.Log),
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
td := NewTLSDialer(d, NewTLSHandshakerStdlib(log.Log))
|
|
|
|
txp := NewHTTPTransport(log.Log, d, td)
|
|
|
|
client := &http.Client{Transport: txp}
|
2021-09-29 16:04:26 +02:00
|
|
|
resp, err := client.Get("https://8.8.4.4/robots.txt")
|
2021-09-08 00:59:48 +02:00
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("not the error we expected", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected non-nil response here")
|
|
|
|
}
|
|
|
|
client.CloseIdleConnections()
|
|
|
|
if called.Load() < 1 {
|
|
|
|
t.Fatal("did not propagate CloseIdleConnections")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("creates the correct type chain", func(t *testing.T) {
|
|
|
|
d := &mocks.Dialer{}
|
|
|
|
td := &mocks.TLSDialer{}
|
|
|
|
txp := NewHTTPTransport(log.Log, d, td)
|
fix(netxlite): do not mutate outgoing requests (#508)
I have recently seen a data race related our way of
mutating the outgoing request to set the host header.
Unfortunately, I've lost track of the race output,
because I rebooted my Linux box before saving it.
Though, after inspecting why and and where we're mutating
outgoing requets, I've found that:
1. we add the host header when logging to have it logged,
which is not a big deal since we already emit the URL
rather than just the URL path when logging a request, and
so we can safely zap this piece of code;
2. as a result, in measurements we may omit the host header
but again this is pretty much obvious from the URL itself
and so it should not be very important (nonetheless,
avoid surprises and keep the existing behavior);
3. when the User-Agent header is not set, we default to
a `miniooni/0.1.0-dev` user agent, which is probably not
very useful anyway, so we can actually remove it.
Part of https://github.com/ooni/probe/issues/1733 (this diff
has been extracted from https://github.com/ooni/probe-cli/pull/506).
2021-09-27 13:35:47 +02:00
|
|
|
logger := txp.(*httpTransportLogger)
|
2021-09-08 00:59:48 +02:00
|
|
|
if logger.Logger != log.Log {
|
|
|
|
t.Fatal("invalid logger")
|
|
|
|
}
|
2021-11-06 17:49:58 +01:00
|
|
|
errWrapper := logger.HTTPTransport.(*httpTransportErrWrapper)
|
|
|
|
connectionsCloser := errWrapper.HTTPTransport.(*httpTransportConnectionsCloser)
|
2021-09-08 00:59:48 +02:00
|
|
|
withReadTimeout := connectionsCloser.Dialer.(*httpDialerWithReadTimeout)
|
|
|
|
if withReadTimeout.Dialer != d {
|
|
|
|
t.Fatal("invalid dialer")
|
|
|
|
}
|
|
|
|
tlsWithReadTimeout := connectionsCloser.TLSDialer.(*httpTLSDialerWithReadTimeout)
|
|
|
|
if tlsWithReadTimeout.TLSDialer != td {
|
|
|
|
t.Fatal("invalid tls dialer")
|
|
|
|
}
|
|
|
|
stdlib := connectionsCloser.HTTPTransport.(*oohttp.StdlibTransport)
|
|
|
|
if !stdlib.Transport.ForceAttemptHTTP2 {
|
|
|
|
t.Fatal("invalid ForceAttemptHTTP2")
|
|
|
|
}
|
|
|
|
if !stdlib.Transport.DisableCompression {
|
|
|
|
t.Fatal("invalid DisableCompression")
|
|
|
|
}
|
|
|
|
if stdlib.Transport.MaxConnsPerHost != 1 {
|
|
|
|
t.Fatal("invalid MaxConnPerHost")
|
|
|
|
}
|
|
|
|
if stdlib.Transport.DialTLSContext == nil {
|
|
|
|
t.Fatal("invalid DialTLSContext")
|
|
|
|
}
|
|
|
|
if stdlib.Transport.DialContext == nil {
|
|
|
|
t.Fatal("invalid DialContext")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 19:27:59 +02:00
|
|
|
}
|
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
func TestHTTPDialerWithReadTimeout(t *testing.T) {
|
|
|
|
t.Run("on success", func(t *testing.T) {
|
|
|
|
var (
|
|
|
|
calledWithZeroTime bool
|
|
|
|
calledWithNonZeroTime bool
|
|
|
|
)
|
|
|
|
origConn := &mocks.Conn{
|
2021-09-06 19:27:59 +02:00
|
|
|
MockSetReadDeadline: func(t time.Time) error {
|
|
|
|
switch t.IsZero() {
|
|
|
|
case true:
|
|
|
|
calledWithZeroTime = true
|
|
|
|
case false:
|
|
|
|
calledWithNonZeroTime = true
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
MockRead: func(b []byte) (int, error) {
|
|
|
|
return 0, io.EOF
|
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
d := &httpDialerWithReadTimeout{
|
|
|
|
Dialer: &mocks.Dialer{
|
|
|
|
MockDialContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return origConn, nil
|
|
|
|
},
|
2021-09-06 19:27:59 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
conn, err := d.DialContext(ctx, "", "")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if _, okay := conn.(*httpConnWithReadTimeout); !okay {
|
|
|
|
t.Fatal("invalid conn type")
|
|
|
|
}
|
|
|
|
if conn.(*httpConnWithReadTimeout).Conn != origConn {
|
|
|
|
t.Fatal("invalid origin conn")
|
|
|
|
}
|
|
|
|
b := make([]byte, 1024)
|
|
|
|
count, err := conn.Read(b)
|
|
|
|
if !errors.Is(err, io.EOF) {
|
|
|
|
t.Fatal("invalid error")
|
|
|
|
}
|
|
|
|
if count != 0 {
|
|
|
|
t.Fatal("invalid count")
|
|
|
|
}
|
|
|
|
if !calledWithZeroTime || !calledWithNonZeroTime {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 19:27:59 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
t.Run("on failure", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
d := &httpDialerWithReadTimeout{
|
|
|
|
Dialer: &mocks.Dialer{
|
|
|
|
MockDialContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
2021-09-06 19:27:59 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
conn, err := d.DialContext(context.Background(), "", "")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if conn != nil {
|
|
|
|
t.Fatal("expected nil conn here")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 19:27:59 +02:00
|
|
|
}
|
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
func TestHTTPTLSDialerWithReadTimeout(t *testing.T) {
|
|
|
|
t.Run("on success", func(t *testing.T) {
|
|
|
|
var (
|
|
|
|
calledWithZeroTime bool
|
|
|
|
calledWithNonZeroTime bool
|
|
|
|
)
|
|
|
|
origConn := &mocks.TLSConn{
|
|
|
|
Conn: mocks.Conn{
|
|
|
|
MockSetReadDeadline: func(t time.Time) error {
|
|
|
|
switch t.IsZero() {
|
|
|
|
case true:
|
|
|
|
calledWithZeroTime = true
|
|
|
|
case false:
|
|
|
|
calledWithNonZeroTime = true
|
|
|
|
}
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
MockRead: func(b []byte) (int, error) {
|
|
|
|
return 0, io.EOF
|
|
|
|
},
|
2021-09-06 19:27:59 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
d := &httpTLSDialerWithReadTimeout{
|
|
|
|
TLSDialer: &mocks.TLSDialer{
|
|
|
|
MockDialTLSContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return origConn, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
ctx := context.Background()
|
|
|
|
conn, err := d.DialTLSContext(ctx, "", "")
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if _, okay := conn.(*httpTLSConnWithReadTimeout); !okay {
|
|
|
|
t.Fatal("invalid conn type")
|
|
|
|
}
|
|
|
|
if conn.(*httpTLSConnWithReadTimeout).TLSConn != origConn {
|
|
|
|
t.Fatal("invalid origin conn")
|
|
|
|
}
|
|
|
|
b := make([]byte, 1024)
|
|
|
|
count, err := conn.Read(b)
|
|
|
|
if !errors.Is(err, io.EOF) {
|
|
|
|
t.Fatal("invalid error")
|
|
|
|
}
|
|
|
|
if count != 0 {
|
|
|
|
t.Fatal("invalid count")
|
|
|
|
}
|
|
|
|
if !calledWithZeroTime || !calledWithNonZeroTime {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 19:27:59 +02:00
|
|
|
|
2021-09-08 00:59:48 +02:00
|
|
|
t.Run("on failure", func(t *testing.T) {
|
|
|
|
expected := errors.New("mocked error")
|
|
|
|
d := &httpTLSDialerWithReadTimeout{
|
|
|
|
TLSDialer: &mocks.TLSDialer{
|
|
|
|
MockDialTLSContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return nil, expected
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
conn, err := d.DialTLSContext(context.Background(), "", "")
|
|
|
|
if !errors.Is(err, expected) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if conn != nil {
|
|
|
|
t.Fatal("expected nil conn here")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with invalid conn type", func(t *testing.T) {
|
|
|
|
var called bool
|
|
|
|
d := &httpTLSDialerWithReadTimeout{
|
|
|
|
TLSDialer: &mocks.TLSDialer{
|
|
|
|
MockDialTLSContext: func(ctx context.Context, network, address string) (net.Conn, error) {
|
|
|
|
return &mocks.Conn{
|
|
|
|
MockClose: func() error {
|
|
|
|
called = true
|
|
|
|
return nil
|
|
|
|
},
|
|
|
|
}, nil
|
|
|
|
},
|
2021-09-06 19:27:59 +02:00
|
|
|
},
|
2021-09-08 00:59:48 +02:00
|
|
|
}
|
|
|
|
conn, err := d.DialTLSContext(context.Background(), "", "")
|
|
|
|
if !errors.Is(err, ErrNotTLSConn) {
|
|
|
|
t.Fatal("not the error we expected")
|
|
|
|
}
|
|
|
|
if conn != nil {
|
|
|
|
t.Fatal("expected nil conn here")
|
|
|
|
}
|
|
|
|
if !called {
|
|
|
|
t.Fatal("not called")
|
|
|
|
}
|
|
|
|
})
|
2021-09-06 19:27:59 +02:00
|
|
|
}
|
2021-09-09 01:19:17 +02:00
|
|
|
|
|
|
|
func TestNewHTTPTransportStdlib(t *testing.T) {
|
|
|
|
// What to test about this factory?
|
|
|
|
txp := NewHTTPTransportStdlib(log.Log)
|
|
|
|
ctx, cancel := context.WithCancel(context.Background())
|
|
|
|
cancel() // immediately!
|
|
|
|
req, err := http.NewRequestWithContext(ctx, "GET", "http://x.org", nil)
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
resp, err := txp.RoundTrip(req)
|
|
|
|
if !errors.Is(err, context.Canceled) {
|
|
|
|
t.Fatal("unexpected err", err)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("unexpected resp")
|
|
|
|
}
|
|
|
|
txp.CloseIdleConnections()
|
|
|
|
}
|
2021-11-06 17:49:58 +01:00
|
|
|
|
|
|
|
func TestHTTPClientErrWrapper(t *testing.T) {
|
|
|
|
t.Run("Do", func(t *testing.T) {
|
|
|
|
t.Run("with failure", func(t *testing.T) {
|
|
|
|
clnt := &httpClientErrWrapper{
|
|
|
|
HTTPClient: &mocks.HTTPClient{
|
|
|
|
MockDo: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return nil, io.EOF
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
resp, err := clnt.Do(&http.Request{})
|
|
|
|
var errWrapper *ErrWrapper
|
|
|
|
if !errors.As(err, &errWrapper) {
|
|
|
|
t.Fatal("the returned error is not an ErrWrapper")
|
|
|
|
}
|
|
|
|
if errWrapper.Failure != FailureEOFError {
|
|
|
|
t.Fatal("unexpected failure", errWrapper.Failure)
|
|
|
|
}
|
|
|
|
if resp != nil {
|
|
|
|
t.Fatal("expected nil response")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
|
|
|
|
t.Run("with success", func(t *testing.T) {
|
|
|
|
expect := &http.Response{}
|
|
|
|
clnt := &httpClientErrWrapper{
|
|
|
|
HTTPClient: &mocks.HTTPClient{
|
|
|
|
MockDo: func(req *http.Request) (*http.Response, error) {
|
|
|
|
return expect, nil
|
|
|
|
},
|
|
|
|
},
|
|
|
|
}
|
|
|
|
resp, err := clnt.Do(&http.Request{})
|
|
|
|
if err != nil {
|
|
|
|
t.Fatal(err)
|
|
|
|
}
|
|
|
|
if resp != expect {
|
|
|
|
t.Fatal("not the expected response")
|
|
|
|
}
|
|
|
|
})
|
|
|
|
})
|
|
|
|
}
|
|
|
|
|
|
|
|
func TestWrapHTTPClient(t *testing.T) {
|
|
|
|
origClient := &http.Client{}
|
|
|
|
wrapped := WrapHTTPClient(origClient)
|
|
|
|
errWrapper := wrapped.(*httpClientErrWrapper)
|
|
|
|
innerClient := errWrapper.HTTPClient.(*http.Client)
|
|
|
|
if innerClient != origClient {
|
|
|
|
t.Fatal("not the inner client we expected")
|
|
|
|
}
|
|
|
|
}
|