package urlvalidator import "testing" func TestValidateURLFormat(t *testing.T) { if _, err := ValidateURLFormat("", false); err == nil { t.Fatalf("expected empty url to fail") } if _, err := ValidateURLFormat("://bad", false); err == nil { t.Fatalf("expected invalid url to fail") } if _, err := ValidateURLFormat("http://example.com", false); err == nil { t.Fatalf("expected http to fail when allow_insecure_http is false") } if _, err := ValidateURLFormat("https://example.com", false); err != nil { t.Fatalf("expected https to pass, got %v", err) } if _, err := ValidateURLFormat("http://example.com", true); err != nil { t.Fatalf("expected http to pass when allow_insecure_http is true, got %v", err) } if _, err := ValidateURLFormat("https://example.com:bad", true); err == nil { t.Fatalf("expected invalid port to fail") } // 验证末尾斜杠被移除 normalized, err := ValidateURLFormat("https://example.com/", false) if err != nil { t.Fatalf("expected trailing slash url to pass, got %v", err) } if normalized != "https://example.com" { t.Fatalf("expected trailing slash to be removed, got %s", normalized) } // 验证多个末尾斜杠被移除 normalized, err = ValidateURLFormat("https://example.com///", false) if err != nil { t.Fatalf("expected multiple trailing slashes to pass, got %v", err) } if normalized != "https://example.com" { t.Fatalf("expected all trailing slashes to be removed, got %s", normalized) } // 验证带路径的 URL 末尾斜杠被移除 normalized, err = ValidateURLFormat("https://example.com/api/v1/", false) if err != nil { t.Fatalf("expected trailing slash url with path to pass, got %v", err) } if normalized != "https://example.com/api/v1" { t.Fatalf("expected trailing slash to be removed from path, got %s", normalized) } } func TestValidateHTTPURL(t *testing.T) { if _, err := ValidateHTTPURL("http://example.com", false, ValidationOptions{}); err == nil { t.Fatalf("expected http to fail when allow_insecure_http is false") } if _, err := ValidateHTTPURL("http://example.com", true, ValidationOptions{}); err != nil { t.Fatalf("expected http to pass when allow_insecure_http is true, got %v", err) } if _, err := ValidateHTTPURL("https://example.com", false, ValidationOptions{RequireAllowlist: true}); err == nil { t.Fatalf("expected require allowlist to fail when empty") } if _, err := ValidateHTTPURL("https://example.com", false, ValidationOptions{AllowedHosts: []string{"api.example.com"}}); err == nil { t.Fatalf("expected host not in allowlist to fail") } if _, err := ValidateHTTPURL("https://api.example.com", false, ValidationOptions{AllowedHosts: []string{"api.example.com"}}); err != nil { t.Fatalf("expected allowlisted host to pass, got %v", err) } if _, err := ValidateHTTPURL("https://sub.api.example.com", false, ValidationOptions{AllowedHosts: []string{"*.example.com"}}); err != nil { t.Fatalf("expected wildcard allowlist to pass, got %v", err) } if _, err := ValidateHTTPURL("https://localhost", false, ValidationOptions{AllowPrivate: false}); err == nil { t.Fatalf("expected localhost to be blocked when allow_private_hosts is false") } }