- Gemini 缓存键统一增加 gemini: 前缀,避免与其他平台命名空间冲突 - OAuth 账号 401 错误时设置 expires_at=now 并持久化,强制下次请求刷新 token - Redis 锁获取失败时降级为无锁刷新,仅在 token 接近过期时执行,并检查 ctx 取消状态 Co-Authored-By: Claude Opus 4.5 <noreply@anthropic.com>
260 lines
5.0 KiB
Go
260 lines
5.0 KiB
Go
//go:build unit
|
|
|
|
package service
|
|
|
|
import (
|
|
"testing"
|
|
|
|
"github.com/stretchr/testify/require"
|
|
)
|
|
|
|
func TestGeminiTokenCacheKey(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
account *Account
|
|
expected string
|
|
}{
|
|
{
|
|
name: "with_project_id",
|
|
account: &Account{
|
|
ID: 100,
|
|
Credentials: map[string]any{
|
|
"project_id": "my-project-123",
|
|
},
|
|
},
|
|
expected: "gemini:my-project-123",
|
|
},
|
|
{
|
|
name: "project_id_with_whitespace",
|
|
account: &Account{
|
|
ID: 101,
|
|
Credentials: map[string]any{
|
|
"project_id": " project-with-spaces ",
|
|
},
|
|
},
|
|
expected: "gemini:project-with-spaces",
|
|
},
|
|
{
|
|
name: "empty_project_id_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 102,
|
|
Credentials: map[string]any{
|
|
"project_id": "",
|
|
},
|
|
},
|
|
expected: "gemini:account:102",
|
|
},
|
|
{
|
|
name: "whitespace_only_project_id_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 103,
|
|
Credentials: map[string]any{
|
|
"project_id": " ",
|
|
},
|
|
},
|
|
expected: "gemini:account:103",
|
|
},
|
|
{
|
|
name: "no_project_id_key_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 104,
|
|
Credentials: map[string]any{},
|
|
},
|
|
expected: "gemini:account:104",
|
|
},
|
|
{
|
|
name: "nil_credentials_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 105,
|
|
Credentials: nil,
|
|
},
|
|
expected: "gemini:account:105",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := GeminiTokenCacheKey(tt.account)
|
|
require.Equal(t, tt.expected, result)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestAntigravityTokenCacheKey(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
account *Account
|
|
expected string
|
|
}{
|
|
{
|
|
name: "with_project_id",
|
|
account: &Account{
|
|
ID: 200,
|
|
Credentials: map[string]any{
|
|
"project_id": "ag-project-456",
|
|
},
|
|
},
|
|
expected: "ag:ag-project-456",
|
|
},
|
|
{
|
|
name: "project_id_with_whitespace",
|
|
account: &Account{
|
|
ID: 201,
|
|
Credentials: map[string]any{
|
|
"project_id": " ag-project-spaces ",
|
|
},
|
|
},
|
|
expected: "ag:ag-project-spaces",
|
|
},
|
|
{
|
|
name: "empty_project_id_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 202,
|
|
Credentials: map[string]any{
|
|
"project_id": "",
|
|
},
|
|
},
|
|
expected: "ag:account:202",
|
|
},
|
|
{
|
|
name: "whitespace_only_project_id_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 203,
|
|
Credentials: map[string]any{
|
|
"project_id": " ",
|
|
},
|
|
},
|
|
expected: "ag:account:203",
|
|
},
|
|
{
|
|
name: "no_project_id_key_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 204,
|
|
Credentials: map[string]any{},
|
|
},
|
|
expected: "ag:account:204",
|
|
},
|
|
{
|
|
name: "nil_credentials_fallback_to_account_id",
|
|
account: &Account{
|
|
ID: 205,
|
|
Credentials: nil,
|
|
},
|
|
expected: "ag:account:205",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := AntigravityTokenCacheKey(tt.account)
|
|
require.Equal(t, tt.expected, result)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestOpenAITokenCacheKey(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
account *Account
|
|
expected string
|
|
}{
|
|
{
|
|
name: "basic_account",
|
|
account: &Account{
|
|
ID: 300,
|
|
},
|
|
expected: "openai:account:300",
|
|
},
|
|
{
|
|
name: "account_with_credentials",
|
|
account: &Account{
|
|
ID: 301,
|
|
Credentials: map[string]any{
|
|
"access_token": "test-token",
|
|
},
|
|
},
|
|
expected: "openai:account:301",
|
|
},
|
|
{
|
|
name: "account_id_zero",
|
|
account: &Account{
|
|
ID: 0,
|
|
},
|
|
expected: "openai:account:0",
|
|
},
|
|
{
|
|
name: "large_account_id",
|
|
account: &Account{
|
|
ID: 9999999999,
|
|
},
|
|
expected: "openai:account:9999999999",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := OpenAITokenCacheKey(tt.account)
|
|
require.Equal(t, tt.expected, result)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestClaudeTokenCacheKey(t *testing.T) {
|
|
tests := []struct {
|
|
name string
|
|
account *Account
|
|
expected string
|
|
}{
|
|
{
|
|
name: "basic_account",
|
|
account: &Account{
|
|
ID: 400,
|
|
},
|
|
expected: "claude:account:400",
|
|
},
|
|
{
|
|
name: "account_with_credentials",
|
|
account: &Account{
|
|
ID: 401,
|
|
Credentials: map[string]any{
|
|
"access_token": "claude-token",
|
|
},
|
|
},
|
|
expected: "claude:account:401",
|
|
},
|
|
{
|
|
name: "account_id_zero",
|
|
account: &Account{
|
|
ID: 0,
|
|
},
|
|
expected: "claude:account:0",
|
|
},
|
|
{
|
|
name: "large_account_id",
|
|
account: &Account{
|
|
ID: 9999999999,
|
|
},
|
|
expected: "claude:account:9999999999",
|
|
},
|
|
}
|
|
|
|
for _, tt := range tests {
|
|
t.Run(tt.name, func(t *testing.T) {
|
|
result := ClaudeTokenCacheKey(tt.account)
|
|
require.Equal(t, tt.expected, result)
|
|
})
|
|
}
|
|
}
|
|
|
|
func TestCacheKeyUniqueness(t *testing.T) {
|
|
// 确保不同平台的缓存键不会冲突
|
|
account := &Account{ID: 123}
|
|
|
|
openaiKey := OpenAITokenCacheKey(account)
|
|
claudeKey := ClaudeTokenCacheKey(account)
|
|
|
|
require.NotEqual(t, openaiKey, claudeKey, "OpenAI and Claude cache keys should be different")
|
|
require.Contains(t, openaiKey, "openai:")
|
|
require.Contains(t, claudeKey, "claude:")
|
|
}
|