989 lines
37 KiB
Nim
989 lines
37 KiB
Nim
# Chronos Test Suite
|
|
# (c) Copyright 2021-Present
|
|
# Status Research & Development GmbH
|
|
#
|
|
# Licensed under either of
|
|
# Apache License, version 2.0, (LICENSE-APACHEv2)
|
|
# MIT license (LICENSE-MIT)
|
|
import std/[strutils, unittest, algorithm, strutils]
|
|
import ../chronos, ../chronos/apps
|
|
import stew/base10
|
|
|
|
# To create self-signed certificate and key you can use openssl
|
|
# openssl req -new -x509 -sha256 -newkey rsa:2048 -nodes \
|
|
# -keyout example-com.key.pem -days 3650 -out example-com.cert.pem
|
|
const HttpsSelfSignedRsaKey = """
|
|
-----BEGIN PRIVATE KEY-----
|
|
MIIEvgIBADANBgkqhkiG9w0BAQEFAASCBKgwggSkAgEAAoIBAQCn7tXGLKMIMzOG
|
|
tVzUixax1/ftlSLcpEAkZMORuiCCnYjtIJhGZdzRFZC8fBlfAJZpLIAOfX2L2f1J
|
|
ZuwpwDkOIvNqKMBrl5Mvkl5azPT0rtnjuwrcqN5NFtbmZPKFYvbjex2aXGqjl5MW
|
|
nQIs/ZA++DVEXmaN9oDxcZsvRMDKfrGQf9iLeoVL47Gx9KpqNqD/JLIn4LpieumV
|
|
yYidm6ukTOqHRvrWm36y6VvKW4TE97THacULmkeahtTf8zDJbbh4EO+gifgwgJ2W
|
|
BUS0+5hMcWu8111mXmanlOVlcoW8fH8RmPjL1eK1Z3j3SVHEf7oWZtIVW5gGA0jQ
|
|
nfA4K51RAgMBAAECggEANZ7/R13tWKrwouy6DWuz/WlWUtgx333atUQvZhKmWs5u
|
|
cDjeJmxUC7b1FhoSB9GqNT7uTLIpKkSaqZthgRtNnIPwcU890Zz+dEwqMJgNByvl
|
|
it+oYjjRco/+YmaNQaYN6yjelPE5Y678WlYb4b29Fz4t0/zIhj/VgEKkKH2tiXpS
|
|
TIicoM7pSOscEUfaW3yp5bS5QwNU6/AaF1wws0feBACd19ZkcdPvr52jopbhxlXw
|
|
h3XTV/vXIJd5zWGp0h/Jbd4xcD4MVo2GjfkeORKY6SjDaNzt8OGtePcKnnbUVu8b
|
|
2XlDxukhDQXqJ3g0sHz47mhvo4JeIM+FgymRm+3QmQKBgQDTawrEA3Zy9WvucaC7
|
|
Zah02oE9nuvpF12lZ7WJh7+tZ/1ss+Fm7YspEKaUiEk7nn1CAVFtem4X4YCXTBiC
|
|
Oqq/o+ipv1yTur0ae6m4pwLm5wcMWBh3H5zjfQTfrClNN8yjWv8u3/sq8KesHPnT
|
|
R92/sMAptAChPgTzQphWbxFiYwKBgQDLWFaBqXfZYVnTyUvKX8GorS6jGWc6Eh4l
|
|
lAFA+2EBWDICrUxsDPoZjEXrWCixdqLhyehaI3KEFIx2bcPv6X2c7yx3IG5lA/Gx
|
|
TZiKlY74c6jOTstkdLW9RJbg1VUHUVZMf/Owt802YmEfUI5S5v7jFmKW6VG+io+K
|
|
+5KYeHD1uwKBgQDMf53KPA82422jFwYCPjLT1QduM2q97HwIomhWv5gIg63+l4BP
|
|
rzYMYq6+vZUYthUy41OAMgyLzPQ1ZMXQMi83b7R9fTxvKRIBq9xfYCzObGnE5vHD
|
|
SDDZWvR75muM5Yxr9nkfPkgVIPMO6Hg+hiVYZf96V0LEtNjU9HWmJYkLQQKBgQCQ
|
|
ULGUdGHKtXy7AjH3/t3CiKaAupa4cANVSCVbqQy/l4hmvfdu+AbH+vXkgTzgNgKD
|
|
nHh7AI1Vj//gTSayLlQn/Nbh9PJkXtg5rYiFUn+VdQBo6yMOuIYDPZqXFtCx0Nge
|
|
kvCwisHpxwiG4PUhgS+Em259DDonsM8PJFx2OYRx4QKBgEQpGhg71Oi9MhPJshN7
|
|
dYTowaMS5eLTk2264ARaY+hAIV7fgvUa+5bgTVaWL+Cfs33hi4sMRqlEwsmfds2T
|
|
cnQiJ4cU20Euldfwa5FLnk6LaWdOyzYt/ICBJnKFRwfCUbS4Bu5rtMEM+3t0wxnJ
|
|
IgaD04WhoL9EX0Qo3DC1+0kG
|
|
-----END PRIVATE KEY-----
|
|
"""
|
|
|
|
# This SSL certificate will expire 13 October 2030.
|
|
const HttpsSelfSignedRsaCert = """
|
|
-----BEGIN CERTIFICATE-----
|
|
MIIDnzCCAoegAwIBAgIUUdcusjDd3XQi3FPM8urdFG3qI+8wDQYJKoZIhvcNAQEL
|
|
BQAwXzELMAkGA1UEBhMCQVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoM
|
|
GEludGVybmV0IFdpZGdpdHMgUHR5IEx0ZDEYMBYGA1UEAwwPMTI3LjAuMC4xOjQz
|
|
ODA4MB4XDTIwMTAxMjIxNDUwMVoXDTMwMTAxMDIxNDUwMVowXzELMAkGA1UEBhMC
|
|
QVUxEzARBgNVBAgMClNvbWUtU3RhdGUxITAfBgNVBAoMGEludGVybmV0IFdpZGdp
|
|
dHMgUHR5IEx0ZDEYMBYGA1UEAwwPMTI3LjAuMC4xOjQzODA4MIIBIjANBgkqhkiG
|
|
9w0BAQEFAAOCAQ8AMIIBCgKCAQEAp+7VxiyjCDMzhrVc1IsWsdf37ZUi3KRAJGTD
|
|
kboggp2I7SCYRmXc0RWQvHwZXwCWaSyADn19i9n9SWbsKcA5DiLzaijAa5eTL5Je
|
|
Wsz09K7Z47sK3KjeTRbW5mTyhWL243sdmlxqo5eTFp0CLP2QPvg1RF5mjfaA8XGb
|
|
L0TAyn6xkH/Yi3qFS+OxsfSqajag/ySyJ+C6YnrplcmInZurpEzqh0b61pt+sulb
|
|
yluExPe0x2nFC5pHmobU3/MwyW24eBDvoIn4MICdlgVEtPuYTHFrvNddZl5mp5Tl
|
|
ZXKFvHx/EZj4y9XitWd490lRxH+6FmbSFVuYBgNI0J3wOCudUQIDAQABo1MwUTAd
|
|
BgNVHQ4EFgQUBKha84woY5WkFxKw7qx1cONg1H8wHwYDVR0jBBgwFoAUBKha84wo
|
|
Y5WkFxKw7qx1cONg1H8wDwYDVR0TAQH/BAUwAwEB/zANBgkqhkiG9w0BAQsFAAOC
|
|
AQEAHZMYt9Ry+Xj3vTbzpGFQzYQVTJlfJWSN6eWNOivRFQE5io9kOBEe5noa8aLo
|
|
dLkw6ztxRP2QRJmlhGCO9/HwS17ckrkgZp3EC2LFnzxcBmoZu+owfxOT1KqpO52O
|
|
IKOl8eVohi1pEicE4dtTJVcpI7VCMovnXUhzx1Ci4Vibns4a6H+BQa19a1JSpifN
|
|
tO8U5jkjJ8Jprs/VPFhJj2O3di53oDHaYSE5eOrm2ZO14KFHSk9cGcOGmcYkUv8B
|
|
nV5vnGadH5Lvfxb/BCpuONabeRdOxMt9u9yQ89vNpxFtRdZDCpGKZBCfmUP+5m3m
|
|
N8r5CwGcIX/XPC3lKazzbZ8baA==
|
|
-----END CERTIFICATE-----
|
|
"""
|
|
|
|
suite "HTTP server testing suite":
|
|
type
|
|
TooBigTest = enum
|
|
GetBodyTest, ConsumeBodyTest, PostUrlTest, PostMultipartTest
|
|
|
|
proc httpClient(address: TransportAddress,
|
|
data: string): Future[string] {.async.} =
|
|
var transp: StreamTransport
|
|
try:
|
|
transp = await connect(address)
|
|
if len(data) > 0:
|
|
let wres {.used.} = await transp.write(data)
|
|
var rres = await transp.read()
|
|
return bytesToString(rres)
|
|
except CatchableError:
|
|
return "EXCEPTION"
|
|
finally:
|
|
if not(isNil(transp)):
|
|
await closeWait(transp)
|
|
|
|
proc httpsClient(address: TransportAddress,
|
|
data: string, flags = {NoVerifyHost, NoVerifyServerName}
|
|
): Future[string] {.async.} =
|
|
var
|
|
transp: StreamTransport
|
|
tlsstream: TlsAsyncStream
|
|
reader: AsyncStreamReader
|
|
writer: AsyncStreamWriter
|
|
|
|
try:
|
|
transp = await connect(address)
|
|
reader = newAsyncStreamReader(transp)
|
|
writer = newAsyncStreamWriter(transp)
|
|
tlsstream = newTLSClientAsyncStream(reader, writer, "", flags = flags)
|
|
if len(data) > 0:
|
|
await tlsstream.writer.write(data)
|
|
var rres = await tlsstream.reader.read()
|
|
return bytesToString(rres)
|
|
except CatchableError:
|
|
return "EXCEPTION"
|
|
finally:
|
|
if not(isNil(tlsstream)):
|
|
await allFutures(tlsstream.reader.closeWait(),
|
|
tlsstream.writer.closeWait())
|
|
if not(isNil(reader)):
|
|
await allFutures(reader.closeWait(), writer.closeWait(),
|
|
transp.closeWait())
|
|
|
|
proc testTooBigBodyChunked(address: TransportAddress,
|
|
operation: TooBigTest): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
try:
|
|
case operation
|
|
of GetBodyTest:
|
|
let body {.used.} = await request.getBody()
|
|
of ConsumeBodyTest:
|
|
await request.consumeBody()
|
|
of PostUrlTest:
|
|
let ptable {.used.} = await request.post()
|
|
of PostMultipartTest:
|
|
let ptable {.used.} = await request.post()
|
|
except HttpCriticalError as exc:
|
|
if exc.code == Http413:
|
|
serverRes = true
|
|
# Reraising exception, because processor should properly handle it.
|
|
raise exc
|
|
else:
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
maxRequestBodySize = 10,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let request =
|
|
case operation
|
|
of GetBodyTest, ConsumeBodyTest, PostUrlTest:
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Content-Type: application/x-www-form-urlencoded\r\n" &
|
|
"Transfer-Encoding: chunked\r\n" &
|
|
"Cookie: 2\r\n\r\n" &
|
|
"5\r\na=a&b\r\n5\r\n=b&c=\r\n4\r\nc&d=\r\n4\r\n%D0%\r\n" &
|
|
"2\r\n9F\r\n0\r\n\r\n"
|
|
of PostMultipartTest:
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Host: 127.0.0.1:30080\r\n" &
|
|
"Transfer-Encoding: chunked\r\n" &
|
|
"Content-Type: multipart/form-data; boundary=f98f0\r\n\r\n" &
|
|
"3b\r\n--f98f0\r\nContent-Disposition: form-data; name=\"key1\"" &
|
|
"\r\n\r\nA\r\n\r\n" &
|
|
"3b\r\n--f98f0\r\nContent-Disposition: form-data; name=\"key2\"" &
|
|
"\r\n\r\nB\r\n\r\n" &
|
|
"3b\r\n--f98f0\r\nContent-Disposition: form-data; name=\"key3\"" &
|
|
"\r\n\r\nC\r\n\r\n" &
|
|
"b\r\n--f98f0--\r\n\r\n" &
|
|
"0\r\n\r\n"
|
|
|
|
let data = await httpClient(address, request)
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.startsWith("HTTP/1.1 413"))
|
|
|
|
test "Request headers timeout test":
|
|
proc testTimeout(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
return await request.respond(Http200, "TEST_OK", HttpTable.init())
|
|
else:
|
|
if r.error().error == HTTPServerError.TimeoutError:
|
|
serverRes = true
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process, socketFlags = socketFlags,
|
|
httpHeadersTimeout = 100.milliseconds)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let data = await httpClient(address, "")
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.startsWith("HTTP/1.1 408"))
|
|
|
|
check waitFor(testTimeout(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Empty headers test":
|
|
proc testEmpty(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
return await request.respond(Http200, "TEST_OK", HttpTable.init())
|
|
else:
|
|
if r.error().error == HTTPServerError.CriticalError:
|
|
serverRes = true
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process, socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let data = await httpClient(address, "\r\n\r\n")
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.startsWith("HTTP/1.1 400"))
|
|
|
|
check waitFor(testEmpty(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Too big headers test":
|
|
proc testTooBig(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
return await request.respond(Http200, "TEST_OK", HttpTable.init())
|
|
else:
|
|
if r.error().error == HTTPServerError.CriticalError:
|
|
serverRes = true
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
maxHeadersSize = 10,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let data = await httpClient(address, "GET / HTTP/1.1\r\n\r\n")
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.startsWith("HTTP/1.1 431"))
|
|
|
|
check waitFor(testTooBig(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Too big request body test (content-length)":
|
|
proc testTooBigBody(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
discard
|
|
else:
|
|
if r.error().error == HTTPServerError.CriticalError:
|
|
serverRes = true
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
maxRequestBodySize = 10,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let request = "GET / HTTP/1.1\r\nContent-Length: 20\r\n\r\n"
|
|
let data = await httpClient(address, request)
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.startsWith("HTTP/1.1 413"))
|
|
|
|
check waitFor(testTooBigBody(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Too big request body test (getBody()/chunked encoding)":
|
|
check:
|
|
waitFor(testTooBigBodyChunked(initTAddress("127.0.0.1:30080"),
|
|
GetBodyTest)) == true
|
|
|
|
test "Too big request body test (consumeBody()/chunked encoding)":
|
|
check:
|
|
waitFor(testTooBigBodyChunked(initTAddress("127.0.0.1:30080"),
|
|
ConsumeBodyTest)) == true
|
|
|
|
test "Too big request body test (post()/urlencoded/chunked encoding)":
|
|
check:
|
|
waitFor(testTooBigBodyChunked(initTAddress("127.0.0.1:30080"),
|
|
PostUrlTest)) == true
|
|
|
|
test "Too big request body test (post()/multipart/chunked encoding)":
|
|
check:
|
|
waitFor(testTooBigBodyChunked(initTAddress("127.0.0.1:30080"),
|
|
PostMultipartTest)) == true
|
|
|
|
test "Query arguments test":
|
|
proc testQuery(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
var kres = newSeq[string]()
|
|
for k, v in request.query.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let data1 = await httpClient(address,
|
|
"GET /?a=1&a=2&b=3&c=4 HTTP/1.0\r\n\r\n")
|
|
let data2 = await httpClient(address,
|
|
"GET /?a=%D0%9F&%D0%A4=%D0%91&b=%D0%A6&c=%D0%AE HTTP/1.0\r\n\r\n")
|
|
await server.stop()
|
|
await server.closeWait()
|
|
let r = serverRes and
|
|
(data1.find("TEST_OK:a:1:a:2:b:3:c:4") >= 0) and
|
|
(data2.find("TEST_OK:a:П:b:Ц:c:Ю:Ф:Б") >= 0)
|
|
return r
|
|
|
|
check waitFor(testQuery(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Headers test":
|
|
proc testHeaders(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
var kres = newSeq[string]()
|
|
for k, v in request.headers.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let message =
|
|
"GET / HTTP/1.0\r\n" &
|
|
"Host: www.google.com\r\n" &
|
|
"Content-Type: text/html\r\n" &
|
|
"Expect: 100-continue\r\n" &
|
|
"Cookie: 1\r\n" &
|
|
"Cookie: 2\r\n\r\n"
|
|
let expect = "TEST_OK:content-type:text/html:cookie:1:cookie:2" &
|
|
":expect:100-continue:host:www.google.com"
|
|
let data = await httpClient(address, message)
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find(expect) >= 0)
|
|
|
|
check waitFor(testHeaders(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "POST arguments (urlencoded/content-length) test":
|
|
proc testPostUrl(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
var kres = newSeq[string]()
|
|
let request = r.get()
|
|
if request.meth in PostMethods:
|
|
let post = await request.post()
|
|
for k, v in post.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let message =
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Content-Type: application/x-www-form-urlencoded\r\n" &
|
|
"Content-Length: 20\r\n" &
|
|
"Cookie: 2\r\n\r\n" &
|
|
"a=a&b=b&c=c&d=%D0%9F"
|
|
let data = await httpClient(address, message)
|
|
let expect = "TEST_OK:a:a:b:b:c:c:d:П"
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find(expect) >= 0)
|
|
|
|
check waitFor(testPostUrl(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "POST arguments (urlencoded/chunked encoding) test":
|
|
proc testPostUrl2(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
var kres = newSeq[string]()
|
|
let request = r.get()
|
|
if request.meth in PostMethods:
|
|
let post = await request.post()
|
|
for k, v in post.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let message =
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Content-Type: application/x-www-form-urlencoded\r\n" &
|
|
"Transfer-Encoding: chunked\r\n" &
|
|
"Cookie: 2\r\n\r\n" &
|
|
"5\r\na=a&b\r\n5\r\n=b&c=\r\n4\r\nc&d=\r\n4\r\n%D0%\r\n" &
|
|
"2\r\n9F\r\n0\r\n\r\n"
|
|
let data = await httpClient(address, message)
|
|
let expect = "TEST_OK:a:a:b:b:c:c:d:П"
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find(expect) >= 0)
|
|
|
|
check waitFor(testPostUrl2(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "POST arguments (multipart/content-length) test":
|
|
proc testPostMultipart(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
var kres = newSeq[string]()
|
|
let request = r.get()
|
|
if request.meth in PostMethods:
|
|
let post = await request.post()
|
|
for k, v in post.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let message =
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Host: 127.0.0.1:30080\r\n" &
|
|
"User-Agent: curl/7.55.1\r\n" &
|
|
"Accept: */*\r\n" &
|
|
"Content-Length: 343\r\n" &
|
|
"Content-Type: multipart/form-data; " &
|
|
"boundary=------------------------ab5706ba6f80b795\r\n\r\n" &
|
|
"--------------------------ab5706ba6f80b795\r\n" &
|
|
"Content-Disposition: form-data; name=\"key1\"\r\n\r\n" &
|
|
"value1\r\n" &
|
|
"--------------------------ab5706ba6f80b795\r\n" &
|
|
"Content-Disposition: form-data; name=\"key2\"\r\n\r\n" &
|
|
"value2\r\n" &
|
|
"--------------------------ab5706ba6f80b795\r\n" &
|
|
"Content-Disposition: form-data; name=\"key2\"\r\n\r\n" &
|
|
"value4\r\n" &
|
|
"--------------------------ab5706ba6f80b795--\r\n"
|
|
let data = await httpClient(address, message)
|
|
let expect = "TEST_OK:key1:value1:key2:value2:key2:value4"
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find(expect) >= 0)
|
|
|
|
check waitFor(testPostMultipart(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "POST arguments (multipart/chunked encoding) test":
|
|
proc testPostMultipart2(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
var kres = newSeq[string]()
|
|
let request = r.get()
|
|
if request.meth in PostMethods:
|
|
let post = await request.post()
|
|
for k, v in post.stringItems():
|
|
kres.add(k & ":" & v)
|
|
sort(kres)
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & kres.join(":"),
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
let message =
|
|
"POST / HTTP/1.0\r\n" &
|
|
"Host: 127.0.0.1:30080\r\n" &
|
|
"Transfer-Encoding: chunked\r\n" &
|
|
"Content-Type: multipart/form-data; boundary=---" &
|
|
"---------------------f98f0e32c55fa2ae\r\n\r\n" &
|
|
"271\r\n" &
|
|
"--------------------------f98f0e32c55fa2ae\r\n" &
|
|
"Content-Disposition: form-data; name=\"key1\"\r\n\r\n" &
|
|
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" &
|
|
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA\r\n" &
|
|
"--------------------------f98f0e32c55fa2ae\r\n" &
|
|
"Content-Disposition: form-data; name=\"key2\"\r\n\r\n" &
|
|
"BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB" &
|
|
"BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB\r\n" &
|
|
"--------------------------f98f0e32c55fa2ae\r\n" &
|
|
"Content-Disposition: form-data; name=\"key2\"\r\n\r\n" &
|
|
"CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC" &
|
|
"CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC\r\n" &
|
|
"--------------------------f98f0e32c55fa2ae--\r\n" &
|
|
"\r\n0\r\n\r\n"
|
|
|
|
let data = await httpClient(address, message)
|
|
let expect = "TEST_OK:key1:AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" &
|
|
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA" &
|
|
"AAAAA:key2:BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB" &
|
|
"BBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBBB" &
|
|
"BBB:key2:CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC" &
|
|
"CCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCCC"
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find(expect) >= 0)
|
|
|
|
check waitFor(testPostMultipart2(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "HTTPS server (successful handshake) test":
|
|
proc testHTTPS(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
serverRes = true
|
|
return await request.respond(Http200, "TEST_OK:" & $request.meth,
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = false
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let serverFlags = {Secure}
|
|
let secureKey = TLSPrivateKey.init(HttpsSelfSignedRsaKey)
|
|
let secureCert = TLSCertificate.init(HttpsSelfSignedRsaCert)
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags,
|
|
serverFlags = serverFlags,
|
|
tlsPrivateKey = secureKey,
|
|
tlsCertificate = secureCert)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
let message = "GET / HTTP/1.0\r\nHost: https://127.0.0.1:80\r\n\r\n"
|
|
let data = await httpsClient(address, message)
|
|
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and (data.find("TEST_OK:GET") >= 0)
|
|
|
|
check waitFor(testHTTPS(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "HTTPS server (failed handshake) test":
|
|
proc testHTTPS2(address: TransportAddress): Future[bool] {.async.} =
|
|
var serverRes = false
|
|
var testFut = newFuture[void]()
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.
|
|
async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
serverRes = false
|
|
return await request.respond(Http200, "TEST_OK:" & $request.meth,
|
|
HttpTable.init())
|
|
else:
|
|
serverRes = true
|
|
testFut.complete()
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let serverFlags = {Secure}
|
|
let secureKey = TLSPrivateKey.init(HttpsSelfSignedRsaKey)
|
|
let secureCert = TLSCertificate.init(HttpsSelfSignedRsaCert)
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags,
|
|
serverFlags = serverFlags,
|
|
tlsPrivateKey = secureKey,
|
|
tlsCertificate = secureCert)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
let message = "GET / HTTP/1.0\r\nHost: https://127.0.0.1:80\r\n\r\n"
|
|
let data = await httpsClient(address, message, {NoVerifyServerName})
|
|
await testFut
|
|
await server.stop()
|
|
await server.closeWait()
|
|
return serverRes and data == "EXCEPTION"
|
|
|
|
check waitFor(testHTTPS2(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "drop() connections test":
|
|
const ClientsCount = 10
|
|
|
|
proc testHTTPdrop(address: TransportAddress): Future[bool] {.async.} =
|
|
var eventWait = newAsyncEvent()
|
|
var eventContinue = newAsyncEvent()
|
|
var count = 0
|
|
|
|
proc process(r: RequestFence): Future[HttpResponseRef] {.async.} =
|
|
if r.isOk():
|
|
let request = r.get()
|
|
inc(count)
|
|
if count == ClientsCount:
|
|
eventWait.fire()
|
|
await eventContinue.wait()
|
|
return await request.respond(Http404, "", HttpTable.init())
|
|
else:
|
|
return dumbResponse()
|
|
|
|
let socketFlags = {ServerFlags.TcpNoDelay, ServerFlags.ReuseAddr}
|
|
let res = HttpServerRef.new(address, process,
|
|
socketFlags = socketFlags,
|
|
maxConnections = 100)
|
|
if res.isErr():
|
|
return false
|
|
|
|
let server = res.get()
|
|
server.start()
|
|
|
|
var clients: seq[Future[string]]
|
|
let message = "GET / HTTP/1.0\r\nHost: https://127.0.0.1:80\r\n\r\n"
|
|
for i in 0 ..< ClientsCount:
|
|
var clientFut = httpClient(address, message)
|
|
if clientFut.finished():
|
|
return false
|
|
clients.add(clientFut)
|
|
# Waiting for all clients to connect to the server
|
|
await eventWait.wait()
|
|
# Dropping
|
|
await server.closeWait()
|
|
# We are firing second event to unblock client loops, but this loops
|
|
# must be already cancelled.
|
|
eventContinue.fire()
|
|
# Now all clients should be dropped
|
|
discard await allFutures(clients).withTimeout(1.seconds)
|
|
for item in clients:
|
|
if item.read() != "":
|
|
return false
|
|
return true
|
|
|
|
check waitFor(testHTTPdrop(initTAddress("127.0.0.1:30080"))) == true
|
|
|
|
test "Content-Type multipart boundary test":
|
|
const AllowedCharacters = {
|
|
'a' .. 'z', 'A' .. 'Z', '0' .. '9',
|
|
'\'', '(', ')', '+', '_', ',', '-', '.' ,'/', ':', '=', '?'
|
|
}
|
|
|
|
const FailureVectors = [
|
|
"",
|
|
"multipart/byteranges; boundary=A",
|
|
"multipart/form-data;",
|
|
"multipart/form-data; boundary",
|
|
"multipart/form-data; boundary=",
|
|
"multipart/form-data; boundaryMore=A",
|
|
"multipart/form-data; charset=UTF-8; boundary",
|
|
"multipart/form-data; charset=UTF-8; boundary=",
|
|
"multipart/form-data; charset=UTF-8; boundary =",
|
|
"multipart/form-data; charset=UTF-8; boundary= ",
|
|
"multipart/form-data; charset=UTF-8; boundaryMore=",
|
|
"multipart/form-data; charset=UTF-8; boundaryMore=A",
|
|
"multipart/form-data; charset=UTF-8; boundaryMore=AAAAAAAAAAAAAAAAAAAA" &
|
|
"AAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAAA"
|
|
]
|
|
|
|
const SuccessVectors = [
|
|
("multipart/form-data; boundary=A", "A"),
|
|
("multipart/form-data; charset=UTF-8; boundary=B", "B"),
|
|
("multipart/form-data; charset=UTF-8; boundary=--------------------" &
|
|
"--------------------------------------------------", "-----------" &
|
|
"-----------------------------------------------------------"),
|
|
("multipart/form-data; boundary=--------------------" &
|
|
"--------------------------------------------------", "-----------" &
|
|
"-----------------------------------------------------------"),
|
|
("multipart/form-data; boundary=--------------------" &
|
|
"--------------------------------------------------; charset=UTF-8",
|
|
"-----------------------------------------------------------------" &
|
|
"-----"),
|
|
("multipart/form-data; boundary=ABCDEFGHIJKLMNOPQRST" &
|
|
"UVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()+_,-.; charset=UTF-8",
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()" &
|
|
"+_,-."),
|
|
("multipart/form-data; boundary=ABCDEFGHIJKLMNOPQRST" &
|
|
"UVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()+?=:/; charset=UTF-8",
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()" &
|
|
"+?=:/"),
|
|
("multipart/form-data; charset=UTF-8; boundary=ABCDEFGHIJKLMNOPQRST" &
|
|
"UVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()+_,-.",
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()" &
|
|
"+_,-."),
|
|
("multipart/form-data; charset=UTF-8; boundary=ABCDEFGHIJKLMNOPQRST" &
|
|
"UVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()+?=:/",
|
|
"ABCDEFGHIJKLMNOPQRSTUVWXYZabcdefghijklmnopqrstuvwxyz0123456789'()" &
|
|
"+?=:/")
|
|
]
|
|
|
|
for i in 0 ..< 256:
|
|
let boundary = "multipart/form-data; boundary=" & $char(i)
|
|
if char(i) in AllowedCharacters:
|
|
check getMultipartBoundary([boundary]).isOk()
|
|
else:
|
|
check getMultipartBoundary([boundary]).isErr()
|
|
|
|
check:
|
|
getMultipartBoundary([]).isErr()
|
|
getMultipartBoundary(["multipart/form-data; boundary=A",
|
|
"multipart/form-data; boundary=B"]).isErr()
|
|
for item in FailureVectors:
|
|
check getMultipartBoundary([item]).isErr()
|
|
for item in SuccessVectors:
|
|
let res = getMultipartBoundary([item[0]])
|
|
check:
|
|
res.isOk()
|
|
item[1] == res.get()
|
|
|
|
test "HttpTable integer parser test":
|
|
const TestVectors = [
|
|
("", 0'u64), ("0", 0'u64), ("-0", 0'u64), ("0-", 0'u64),
|
|
("01", 1'u64), ("001", 1'u64), ("0000000000001", 1'u64),
|
|
("18446744073709551615", 0xFFFF_FFFF_FFFF_FFFF'u64),
|
|
("18446744073709551616", 0'u64),
|
|
("99999999999999999999", 0'u64),
|
|
("999999999999999999999999999999999999", 0'u64),
|
|
("FFFFFFFFFFFFFFFF", 0'u64),
|
|
("0123456789ABCDEF", 0'u64)
|
|
]
|
|
for i in 0 ..< 256:
|
|
let res = Base10.decode(uint64, [char(i)])
|
|
if char(i) in {'0' .. '9'}:
|
|
check:
|
|
res.isOk()
|
|
res.get() == uint64(i - ord('0'))
|
|
else:
|
|
check res.isErr()
|
|
|
|
for item in TestVectors:
|
|
var ht = HttpTable.init([("test", item[0])])
|
|
let value = ht.getInt("test")
|
|
check value == item[1]
|
|
|
|
test "HttpTable behavior test":
|
|
var table1 = HttpTable.init()
|
|
var table2 = HttpTable.init([("Header1", "value1"), ("Header2", "value2")])
|
|
check:
|
|
table1.isEmpty() == true
|
|
table2.isEmpty() == false
|
|
|
|
table1.add("Header1", "value1")
|
|
table1.add("Header2", "value2")
|
|
table1.add("HEADER2", "VALUE3")
|
|
check:
|
|
table1.getList("HeAdEr2") == @["value2", "VALUE3"]
|
|
table1.getString("HeAdEr2") == "value2,VALUE3"
|
|
table2.getString("HEADER1") == "value1"
|
|
table1.count("HEADER2") == 2
|
|
table1.count("HEADER1") == 1
|
|
table1.getLastString("HEADER1") == "value1"
|
|
table1.getLastString("HEADER2") == "VALUE3"
|
|
"header1" in table1 == true
|
|
"HEADER1" in table1 == true
|
|
"header2" in table1 == true
|
|
"HEADER2" in table1 == true
|
|
"HEADER3" in table1 == false
|
|
|
|
var
|
|
data1: seq[tuple[key: string, value: string]]
|
|
data2: seq[tuple[key: string, value: seq[string]]]
|
|
for key, value in table1.stringItems(true):
|
|
data1.add((key, value))
|
|
for key, value in table1.items(true):
|
|
data2.add((key, value))
|
|
|
|
check:
|
|
data1 == @[("Header2", "value2"), ("Header2", "VALUE3"),
|
|
("Header1", "value1")]
|
|
data2 == @[("Header2", @["value2", "VALUE3"]),
|
|
("Header1", @["value1"])]
|
|
|
|
table1.set("header2", "value4")
|
|
check:
|
|
table1.getList("header2") == @["value4"]
|
|
table1.getString("header2") == "value4"
|
|
table1.count("header2") == 1
|
|
table1.getLastString("header2") == "value4"
|
|
|
|
test "getTransferEncoding() test":
|
|
var encodings = [
|
|
"chunked", "compress", "deflate", "gzip", "identity", "x-gzip"
|
|
]
|
|
|
|
const FlagsVectors = [
|
|
{
|
|
TransferEncodingFlags.Identity, TransferEncodingFlags.Chunked,
|
|
TransferEncodingFlags.Compress, TransferEncodingFlags.Deflate,
|
|
TransferEncodingFlags.Gzip
|
|
},
|
|
{
|
|
TransferEncodingFlags.Identity, TransferEncodingFlags.Compress,
|
|
TransferEncodingFlags.Deflate, TransferEncodingFlags.Gzip
|
|
},
|
|
{
|
|
TransferEncodingFlags.Identity, TransferEncodingFlags.Deflate,
|
|
TransferEncodingFlags.Gzip
|
|
},
|
|
{ TransferEncodingFlags.Identity, TransferEncodingFlags.Gzip },
|
|
{ TransferEncodingFlags.Identity, TransferEncodingFlags.Gzip },
|
|
{ TransferEncodingFlags.Gzip },
|
|
{ TransferEncodingFlags.Identity }
|
|
]
|
|
|
|
for i in 0 ..< 7:
|
|
var checkEncodings = @encodings
|
|
if i - 1 >= 0:
|
|
for k in 0 .. (i - 1):
|
|
checkEncodings.delete(0)
|
|
|
|
while nextPermutation(checkEncodings):
|
|
let res1 = getTransferEncoding([checkEncodings.join(", ")])
|
|
let res2 = getTransferEncoding([checkEncodings.join(",")])
|
|
let res3 = getTransferEncoding([checkEncodings.join("")])
|
|
let res4 = getTransferEncoding([checkEncodings.join(" ")])
|
|
let res5 = getTransferEncoding([checkEncodings.join(" , ")])
|
|
check:
|
|
res1.isOk()
|
|
res1.get() == FlagsVectors[i]
|
|
res2.isOk()
|
|
res2.get() == FlagsVectors[i]
|
|
res3.isErr()
|
|
res4.isErr()
|
|
res5.isOk()
|
|
res5.get() == FlagsVectors[i]
|
|
|
|
check:
|
|
getTransferEncoding([]).tryGet() == { TransferEncodingFlags.Identity }
|
|
getTransferEncoding(["", ""]).tryGet() ==
|
|
{ TransferEncodingFlags.Identity }
|
|
|
|
test "getContentEncoding() test":
|
|
var encodings = [
|
|
"br", "compress", "deflate", "gzip", "identity", "x-gzip"
|
|
]
|
|
|
|
const FlagsVectors = [
|
|
{
|
|
ContentEncodingFlags.Identity, ContentEncodingFlags.Br,
|
|
ContentEncodingFlags.Compress, ContentEncodingFlags.Deflate,
|
|
ContentEncodingFlags.Gzip
|
|
},
|
|
{
|
|
ContentEncodingFlags.Identity, ContentEncodingFlags.Compress,
|
|
ContentEncodingFlags.Deflate, ContentEncodingFlags.Gzip
|
|
},
|
|
{
|
|
ContentEncodingFlags.Identity, ContentEncodingFlags.Deflate,
|
|
ContentEncodingFlags.Gzip
|
|
},
|
|
{ ContentEncodingFlags.Identity, ContentEncodingFlags.Gzip },
|
|
{ ContentEncodingFlags.Identity, ContentEncodingFlags.Gzip },
|
|
{ ContentEncodingFlags.Gzip },
|
|
{ ContentEncodingFlags.Identity }
|
|
]
|
|
|
|
for i in 0 ..< 7:
|
|
var checkEncodings = @encodings
|
|
if i - 1 >= 0:
|
|
for k in 0 .. (i - 1):
|
|
checkEncodings.delete(0)
|
|
|
|
while nextPermutation(checkEncodings):
|
|
let res1 = getContentEncoding([checkEncodings.join(", ")])
|
|
let res2 = getContentEncoding([checkEncodings.join(",")])
|
|
let res3 = getContentEncoding([checkEncodings.join("")])
|
|
let res4 = getContentEncoding([checkEncodings.join(" ")])
|
|
let res5 = getContentEncoding([checkEncodings.join(" , ")])
|
|
check:
|
|
res1.isOk()
|
|
res1.get() == FlagsVectors[i]
|
|
res2.isOk()
|
|
res2.get() == FlagsVectors[i]
|
|
res3.isErr()
|
|
res4.isErr()
|
|
res5.isOk()
|
|
res5.get() == FlagsVectors[i]
|
|
|
|
check:
|
|
getContentEncoding([]).tryGet() == { ContentEncodingFlags.Identity }
|
|
getContentEncoding(["", ""]).tryGet() == { ContentEncodingFlags.Identity }
|
|
|
|
test "Leaks test":
|
|
check:
|
|
getTracker("async.stream.reader").isLeaked() == false
|
|
getTracker("async.stream.writer").isLeaked() == false
|
|
getTracker("stream.server").isLeaked() == false
|
|
getTracker("stream.transport").isLeaked() == false
|