init: 初始化 AssetX 项目仓库
包含 webapp(Next.js 用户端)、webapp-back(Go 后端)、 antdesign(管理后台)、landingpage(营销落地页)、 数据库 SQL 和配置文件。
This commit is contained in:
368
webapp-back/common/unit_test.go
Normal file
368
webapp-back/common/unit_test.go
Normal file
@@ -0,0 +1,368 @@
|
||||
package common
|
||||
|
||||
import (
|
||||
"bytes"
|
||||
"errors"
|
||||
"fmt"
|
||||
"net/http"
|
||||
"net/http/httptest"
|
||||
"os"
|
||||
"testing"
|
||||
|
||||
"github.com/gin-gonic/gin"
|
||||
"github.com/stretchr/testify/assert"
|
||||
)
|
||||
|
||||
func TestConnectingDatabase(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
db := Init()
|
||||
dbPath := GetDBPath()
|
||||
// Test create & close DB
|
||||
_, err := os.Stat(dbPath)
|
||||
asserts.NoError(err, "Db should exist")
|
||||
sqlDB, err := db.DB()
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
asserts.NoError(sqlDB.Ping(), "Db should be able to ping")
|
||||
|
||||
// Test get a connecting from connection pools
|
||||
connection := GetDB()
|
||||
sqlDB, err = connection.DB()
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
asserts.NoError(sqlDB.Ping(), "Db should be able to ping")
|
||||
sqlDB.Close()
|
||||
|
||||
// Test DB exceptions
|
||||
os.Chmod(dbPath, 0000)
|
||||
db = Init()
|
||||
sqlDB, err = db.DB()
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
asserts.Error(sqlDB.Ping(), "Db should not be able to ping")
|
||||
sqlDB.Close()
|
||||
os.Chmod(dbPath, 0644)
|
||||
}
|
||||
|
||||
func TestConnectingTestDatabase(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
// Test create & close DB
|
||||
db := TestDBInit()
|
||||
testDBPath := GetTestDBPath()
|
||||
_, err := os.Stat(testDBPath)
|
||||
asserts.NoError(err, "Db should exist")
|
||||
sqlDB, err := db.DB()
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
asserts.NoError(sqlDB.Ping(), "Db should be able to ping")
|
||||
TestDBFree(db)
|
||||
|
||||
// Test close delete DB
|
||||
db = TestDBInit()
|
||||
TestDBFree(db)
|
||||
_, err = os.Stat(testDBPath)
|
||||
|
||||
asserts.Error(err, "Db should not exist")
|
||||
}
|
||||
|
||||
func TestDBDirCreation(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
// Set a nested path
|
||||
os.Setenv("TEST_DB_PATH", "tmp/nested/test.db")
|
||||
defer os.Unsetenv("TEST_DB_PATH")
|
||||
|
||||
db := TestDBInit()
|
||||
testDBPath := GetTestDBPath()
|
||||
_, err := os.Stat(testDBPath)
|
||||
asserts.NoError(err, "Db should exist in nested directory")
|
||||
TestDBFree(db)
|
||||
|
||||
// Cleanup directory
|
||||
os.RemoveAll("tmp/nested")
|
||||
}
|
||||
|
||||
func TestDBPathOverride(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
customPath := "./custom_test.db"
|
||||
os.Setenv("TEST_DB_PATH", customPath)
|
||||
defer os.Unsetenv("TEST_DB_PATH")
|
||||
|
||||
asserts.Equal(customPath, GetTestDBPath(), "Should use env var")
|
||||
}
|
||||
|
||||
func TestRandString(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
var letters = []rune("abcdefghijklmnopqrstuvwxyzABCDEFGHIJKLMNOPQRSTUVWXYZ0123456789")
|
||||
str := RandString(0)
|
||||
asserts.Equal(str, "", "length should be ''")
|
||||
|
||||
str = RandString(10)
|
||||
asserts.Equal(len(str), 10, "length should be 10")
|
||||
for _, ch := range str {
|
||||
asserts.Contains(letters, ch, "char should be a-z|A-Z|0-9")
|
||||
}
|
||||
}
|
||||
|
||||
func TestRandInt(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
// Test that RandInt returns a value in valid range
|
||||
val := RandInt()
|
||||
asserts.GreaterOrEqual(val, 0, "RandInt should be >= 0")
|
||||
asserts.Less(val, 1000000, "RandInt should be < 1000000")
|
||||
|
||||
// Test multiple calls return different values (statistically)
|
||||
vals := make(map[int]bool)
|
||||
for i := 0; i < 10; i++ {
|
||||
vals[RandInt()] = true
|
||||
}
|
||||
asserts.Greater(len(vals), 1, "RandInt should return varied values")
|
||||
}
|
||||
|
||||
func TestGenToken(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
token := GenToken(2)
|
||||
|
||||
asserts.IsType(token, string("token"), "token type should be string")
|
||||
asserts.Len(token, 115, "JWT's length should be 115")
|
||||
}
|
||||
|
||||
func TestGenTokenMultipleUsers(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
token1 := GenToken(1)
|
||||
token2 := GenToken(2)
|
||||
token100 := GenToken(100)
|
||||
|
||||
asserts.NotEqual(token1, token2, "Different user IDs should generate different tokens")
|
||||
asserts.NotEqual(token2, token100, "Different user IDs should generate different tokens")
|
||||
// Token length can vary by 1 character due to timestamp changes
|
||||
asserts.GreaterOrEqual(len(token1), 114, "JWT's length should be >= 114 for user 1")
|
||||
asserts.LessOrEqual(len(token1), 120, "JWT's length should be <= 120 for user 1")
|
||||
asserts.GreaterOrEqual(len(token100), 114, "JWT's length should be >= 114 for user 100")
|
||||
asserts.LessOrEqual(len(token100), 120, "JWT's length should be <= 120 for user 100")
|
||||
}
|
||||
|
||||
func TestHeaderTokenMock(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
req, _ := http.NewRequest("GET", "/test", nil)
|
||||
token := GenToken(5)
|
||||
HeaderTokenMock(req, 5)
|
||||
|
||||
authHeader := req.Header.Get("Authorization")
|
||||
asserts.Equal(fmt.Sprintf("Token %s", token), authHeader, "Authorization header should be set correctly")
|
||||
}
|
||||
|
||||
func TestExtractTokenFromHeader(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
token := "valid.jwt.token"
|
||||
header := fmt.Sprintf("Token %s", token)
|
||||
|
||||
extracted := ExtractTokenFromHeader(header)
|
||||
asserts.Equal(token, extracted, "Should extract token from header")
|
||||
|
||||
invalidHeader := "Bearer " + token
|
||||
extracted = ExtractTokenFromHeader(invalidHeader)
|
||||
asserts.Empty(extracted, "Should return empty for non-Token header")
|
||||
|
||||
shortHeader := "Token"
|
||||
extracted = ExtractTokenFromHeader(shortHeader)
|
||||
asserts.Empty(extracted, "Should return empty for short header")
|
||||
}
|
||||
|
||||
func TestVerifyTokenClaims(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
// Test valid token
|
||||
userID := uint(123)
|
||||
token := GenToken(userID)
|
||||
claims, err := VerifyTokenClaims(token)
|
||||
asserts.NoError(err, "VerifyTokenClaims should not error for valid token")
|
||||
asserts.Equal(float64(userID), claims["id"], "Claims should contain correct user ID")
|
||||
|
||||
// Test invalid token
|
||||
_, err = VerifyTokenClaims("invalid.token.string")
|
||||
asserts.Error(err, "VerifyTokenClaims should error for invalid token")
|
||||
}
|
||||
|
||||
func TestNewValidatorError(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
type Login struct {
|
||||
Username string `form:"username" json:"username" binding:"required,alphanum,min=4,max=255"`
|
||||
Password string `form:"password" json:"password" binding:"required,min=8,max=255"`
|
||||
}
|
||||
|
||||
var requestTests = []struct {
|
||||
bodyData string
|
||||
expectedCode int
|
||||
responseRegexg string
|
||||
msg string
|
||||
}{
|
||||
{
|
||||
`{"username": "wangzitian0","password": "0123456789"}`,
|
||||
http.StatusOK,
|
||||
`{"status":"you are logged in"}`,
|
||||
"valid data and should return StatusCreated",
|
||||
},
|
||||
{
|
||||
`{"username": "wangzitian0","password": "01234567866"}`,
|
||||
http.StatusUnauthorized,
|
||||
`{"errors":{"user":"wrong username or password"}}`,
|
||||
"wrong login status should return StatusUnauthorized",
|
||||
},
|
||||
{
|
||||
`{"username": "wangzitian0","password": "0122"}`,
|
||||
http.StatusUnprocessableEntity,
|
||||
`{"errors":{"Password":"{min: 8}"}}`,
|
||||
"invalid password of too short and should return StatusUnprocessableEntity",
|
||||
},
|
||||
{
|
||||
`{"username": "_wangzitian0","password": "0123456789"}`,
|
||||
http.StatusUnprocessableEntity,
|
||||
`{"errors":{"Username":"{key: alphanum}"}}`,
|
||||
"invalid username of non alphanum and should return StatusUnprocessableEntity",
|
||||
},
|
||||
}
|
||||
|
||||
r := gin.Default()
|
||||
|
||||
r.POST("/login", func(c *gin.Context) {
|
||||
var json Login
|
||||
if err := Bind(c, &json); err == nil {
|
||||
if json.Username == "wangzitian0" && json.Password == "0123456789" {
|
||||
c.JSON(http.StatusOK, gin.H{"status": "you are logged in"})
|
||||
} else {
|
||||
c.JSON(http.StatusUnauthorized, NewError("user", errors.New("wrong username or password")))
|
||||
}
|
||||
} else {
|
||||
c.JSON(http.StatusUnprocessableEntity, NewValidatorError(err))
|
||||
}
|
||||
})
|
||||
|
||||
for _, testData := range requestTests {
|
||||
bodyData := testData.bodyData
|
||||
req, err := http.NewRequest("POST", "/login", bytes.NewBufferString(bodyData))
|
||||
req.Header.Set("Content-Type", "application/json")
|
||||
asserts.NoError(err)
|
||||
|
||||
w := httptest.NewRecorder()
|
||||
r.ServeHTTP(w, req)
|
||||
|
||||
asserts.Equal(testData.expectedCode, w.Code, "Response Status - "+testData.msg)
|
||||
asserts.Regexp(testData.responseRegexg, w.Body.String(), "Response Content - "+testData.msg)
|
||||
}
|
||||
}
|
||||
|
||||
func TestNewError(t *testing.T) {
|
||||
assert := assert.New(t)
|
||||
|
||||
db := TestDBInit()
|
||||
defer TestDBFree(db)
|
||||
|
||||
type NonExistentTable struct {
|
||||
Field string
|
||||
}
|
||||
// db.AutoMigrate(NonExistentTable{}) // Intentionally skipped to cause error
|
||||
|
||||
err := db.Find(&NonExistentTable{Field: "value"}).Error
|
||||
if err == nil {
|
||||
err = errors.New("no such table: non_existent_tables")
|
||||
}
|
||||
|
||||
commonError := NewError("database", err)
|
||||
assert.IsType(commonError, commonError, "commonError should have right type")
|
||||
// The exact error message might vary by driver, checking key presence is safer, but keeping original assertion style
|
||||
assert.Contains(commonError.Errors, "database", "commonError should contain database key")
|
||||
}
|
||||
|
||||
func TestDatabaseDirCreation(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
// Test directory creation in Init
|
||||
origDBPath := os.Getenv("DB_PATH")
|
||||
defer os.Setenv("DB_PATH", origDBPath)
|
||||
|
||||
// Create a temp dir path
|
||||
tempDir := "./tmp/test_nested/db"
|
||||
os.Setenv("DB_PATH", tempDir+"/test.db")
|
||||
|
||||
// Clean up before test
|
||||
os.RemoveAll("./tmp/test_nested")
|
||||
|
||||
// Init should create the directory
|
||||
|
||||
db := Init()
|
||||
|
||||
sqlDB, err := db.DB()
|
||||
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
|
||||
asserts.NoError(sqlDB.Ping(), "DB should be created in nested directory")
|
||||
|
||||
// Clean up after test
|
||||
|
||||
sqlDB.Close()
|
||||
|
||||
os.RemoveAll("./tmp/test_nested")
|
||||
|
||||
}
|
||||
|
||||
func TestDBInitDirCreation(t *testing.T) {
|
||||
|
||||
asserts := assert.New(t)
|
||||
|
||||
// Test directory creation in TestDBInit
|
||||
|
||||
origTestDBPath := os.Getenv("TEST_DB_PATH")
|
||||
|
||||
defer os.Setenv("TEST_DB_PATH", origTestDBPath)
|
||||
|
||||
// Create a temp dir path
|
||||
|
||||
tempDir := "./tmp/test_nested_testdb"
|
||||
|
||||
os.Setenv("TEST_DB_PATH", tempDir+"/test.db")
|
||||
|
||||
// Clean up before test
|
||||
|
||||
os.RemoveAll(tempDir)
|
||||
|
||||
// TestDBInit should create the directory
|
||||
|
||||
db := TestDBInit()
|
||||
|
||||
sqlDB, err := db.DB()
|
||||
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
|
||||
asserts.NoError(sqlDB.Ping(), "Test DB should be created in nested directory")
|
||||
|
||||
// Clean up after test
|
||||
|
||||
TestDBFree(db)
|
||||
|
||||
os.RemoveAll(tempDir)
|
||||
|
||||
}
|
||||
|
||||
func TestDatabaseWithCurrentDirectory(t *testing.T) {
|
||||
asserts := assert.New(t)
|
||||
|
||||
// Test with simple filename (no directory)
|
||||
origDBPath := os.Getenv("DB_PATH")
|
||||
defer os.Setenv("DB_PATH", origDBPath)
|
||||
|
||||
os.Setenv("DB_PATH", "test_simple.db")
|
||||
|
||||
// Init should work without directory creation
|
||||
db := Init()
|
||||
sqlDB, err := db.DB()
|
||||
|
||||
asserts.NoError(err, "Should get sql.DB")
|
||||
asserts.NoError(sqlDB.Ping(), "DB should be created in current directory")
|
||||
|
||||
// Clean up
|
||||
sqlDB.Close()
|
||||
os.Remove("test_simple.db")
|
||||
}
|
||||
Reference in New Issue
Block a user