删除因GitHub计费锁定而失败的CI工作流。 为6个核心Go源文件补充单元测试,全部达到50%以上覆盖率: - response/response.go: 97.6% - antigravity/oauth.go: 90.1% - antigravity/client.go: 88.6% (新增27个HTTP客户端测试) - geminicli/oauth.go: 91.8% - service/oauth_service.go: 61.2% - service/gemini_oauth_service.go: 51.9% 新增/增强8个测试文件,共计5600+行测试代码。 Co-Authored-By: Claude Opus 4.6 <noreply@anthropic.com>
76 lines
3.1 KiB
Go
76 lines
3.1 KiB
Go
package urlvalidator
|
|
|
|
import "testing"
|
|
|
|
func TestValidateURLFormat(t *testing.T) {
|
|
if _, err := ValidateURLFormat("", false); err == nil {
|
|
t.Fatalf("expected empty url to fail")
|
|
}
|
|
if _, err := ValidateURLFormat("://bad", false); err == nil {
|
|
t.Fatalf("expected invalid url to fail")
|
|
}
|
|
if _, err := ValidateURLFormat("http://example.com", false); err == nil {
|
|
t.Fatalf("expected http to fail when allow_insecure_http is false")
|
|
}
|
|
if _, err := ValidateURLFormat("https://example.com", false); err != nil {
|
|
t.Fatalf("expected https to pass, got %v", err)
|
|
}
|
|
if _, err := ValidateURLFormat("http://example.com", true); err != nil {
|
|
t.Fatalf("expected http to pass when allow_insecure_http is true, got %v", err)
|
|
}
|
|
if _, err := ValidateURLFormat("https://example.com:bad", true); err == nil {
|
|
t.Fatalf("expected invalid port to fail")
|
|
}
|
|
|
|
// 验证末尾斜杠被移除
|
|
normalized, err := ValidateURLFormat("https://example.com/", false)
|
|
if err != nil {
|
|
t.Fatalf("expected trailing slash url to pass, got %v", err)
|
|
}
|
|
if normalized != "https://example.com" {
|
|
t.Fatalf("expected trailing slash to be removed, got %s", normalized)
|
|
}
|
|
|
|
// 验证多个末尾斜杠被移除
|
|
normalized, err = ValidateURLFormat("https://example.com///", false)
|
|
if err != nil {
|
|
t.Fatalf("expected multiple trailing slashes to pass, got %v", err)
|
|
}
|
|
if normalized != "https://example.com" {
|
|
t.Fatalf("expected all trailing slashes to be removed, got %s", normalized)
|
|
}
|
|
|
|
// 验证带路径的 URL 末尾斜杠被移除
|
|
normalized, err = ValidateURLFormat("https://example.com/api/v1/", false)
|
|
if err != nil {
|
|
t.Fatalf("expected trailing slash url with path to pass, got %v", err)
|
|
}
|
|
if normalized != "https://example.com/api/v1" {
|
|
t.Fatalf("expected trailing slash to be removed from path, got %s", normalized)
|
|
}
|
|
}
|
|
|
|
func TestValidateHTTPURL(t *testing.T) {
|
|
if _, err := ValidateHTTPURL("http://example.com", false, ValidationOptions{}); err == nil {
|
|
t.Fatalf("expected http to fail when allow_insecure_http is false")
|
|
}
|
|
if _, err := ValidateHTTPURL("http://example.com", true, ValidationOptions{}); err != nil {
|
|
t.Fatalf("expected http to pass when allow_insecure_http is true, got %v", err)
|
|
}
|
|
if _, err := ValidateHTTPURL("https://example.com", false, ValidationOptions{RequireAllowlist: true}); err == nil {
|
|
t.Fatalf("expected require allowlist to fail when empty")
|
|
}
|
|
if _, err := ValidateHTTPURL("https://example.com", false, ValidationOptions{AllowedHosts: []string{"api.example.com"}}); err == nil {
|
|
t.Fatalf("expected host not in allowlist to fail")
|
|
}
|
|
if _, err := ValidateHTTPURL("https://api.example.com", false, ValidationOptions{AllowedHosts: []string{"api.example.com"}}); err != nil {
|
|
t.Fatalf("expected allowlisted host to pass, got %v", err)
|
|
}
|
|
if _, err := ValidateHTTPURL("https://sub.api.example.com", false, ValidationOptions{AllowedHosts: []string{"*.example.com"}}); err != nil {
|
|
t.Fatalf("expected wildcard allowlist to pass, got %v", err)
|
|
}
|
|
if _, err := ValidateHTTPURL("https://localhost", false, ValidationOptions{AllowPrivate: false}); err == nil {
|
|
t.Fatalf("expected localhost to be blocked when allow_private_hosts is false")
|
|
}
|
|
}
|