123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393394395396397398399400401402403404405406407408409410411412413414415416417418419420421422423424425426427428429430431432433434435436437438439440441442443444445446447448449450451452453454455456457458459460461462463464465466467468469470471472473474475476477478479480481482483484485486487488489490491492493494495496497498499500501502503504505506507508509510511512513514515516517518519520521522523524525526527528529530531532533534535536537538539540541542543544545546547548549550551552553554555556557558559560561562563564565566567568569570571572573574575576577578579580581582583584585586587588589590591592593594595596597598599600601602603604605606607608609610611612613614615616617618619620621622623624625626627628629630631632633634635636637638639640641642643644645646647648649650651652653654655656657658659660661662663664665666667668669670671672673674675676677678679680681682683684685686687688689690691692693694695696697698699700701702703704705706707708709710711712713714715716717718719720721722723724725726727728729730731732733734735736737738739740741742743744745746747748749750751752753754755756757758759760761762763764765766767768769770 |
- package main
- import (
- "bytes"
- "fmt"
- "io"
- "net/http"
- "net/http/httptest"
- "os"
- "path/filepath"
- "regexp"
- "strings"
- "testing"
- "time"
- "github.com/sirupsen/logrus"
- "github.com/stretchr/testify/suite"
- "github.com/imgproxy/imgproxy/v3/config"
- "github.com/imgproxy/imgproxy/v3/config/configurators"
- "github.com/imgproxy/imgproxy/v3/etag"
- "github.com/imgproxy/imgproxy/v3/imagedata"
- "github.com/imgproxy/imgproxy/v3/imagemeta"
- "github.com/imgproxy/imgproxy/v3/imagetype"
- "github.com/imgproxy/imgproxy/v3/options"
- "github.com/imgproxy/imgproxy/v3/router"
- "github.com/imgproxy/imgproxy/v3/svg"
- "github.com/imgproxy/imgproxy/v3/vips"
- )
- type ProcessingHandlerTestSuite struct {
- suite.Suite
- router *router.Router
- }
- func (s *ProcessingHandlerTestSuite) SetupSuite() {
- config.Reset()
- wd, err := os.Getwd()
- s.Require().NoError(err)
- s.T().Setenv("IMGPROXY_LOCAL_FILESYSTEM_ROOT", filepath.Join(wd, "/testdata"))
- s.T().Setenv("IMGPROXY_CLIENT_KEEP_ALIVE_TIMEOUT", "0")
- err = initialize()
- s.Require().NoError(err)
- logrus.SetOutput(io.Discard)
- s.router = buildRouter()
- }
- func (s *ProcessingHandlerTestSuite) TeardownSuite() {
- shutdown()
- logrus.SetOutput(os.Stdout)
- }
- func (s *ProcessingHandlerTestSuite) SetupTest() {
- // We don't need config.LocalFileSystemRoot anymore as it is used
- // only during initialization
- config.Reset()
- config.AllowLoopbackSourceAddresses = true
- }
- func (s *ProcessingHandlerTestSuite) send(path string, header ...http.Header) *httptest.ResponseRecorder {
- req := httptest.NewRequest(http.MethodGet, path, nil)
- rw := httptest.NewRecorder()
- if len(header) > 0 {
- req.Header = header[0]
- }
- s.router.ServeHTTP(rw, req)
- return rw
- }
- func (s *ProcessingHandlerTestSuite) readTestFile(name string) []byte {
- wd, err := os.Getwd()
- s.Require().NoError(err)
- data, err := os.ReadFile(filepath.Join(wd, "testdata", name))
- s.Require().NoError(err)
- return data
- }
- func (s *ProcessingHandlerTestSuite) readBody(res *http.Response) []byte {
- data, err := io.ReadAll(res.Body)
- s.Require().NoError(err)
- return data
- }
- func (s *ProcessingHandlerTestSuite) sampleETagData(imgETag string) (string, *imagedata.ImageData, string) {
- poStr := "rs:fill:4:4"
- po := options.NewProcessingOptions()
- po.ResizingType = options.ResizeFill
- po.Width = 4
- po.Height = 4
- imgdata := imagedata.ImageData{
- Type: imagetype.PNG,
- Data: s.readTestFile("test1.png"),
- }
- if len(imgETag) != 0 {
- imgdata.Headers = map[string]string{"ETag": imgETag}
- }
- var h etag.Handler
- h.SetActualProcessingOptions(po)
- h.SetActualImageData(&imgdata)
- return poStr, &imgdata, h.GenerateActualETag()
- }
- func (s *ProcessingHandlerTestSuite) TestRequest() {
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal("image/png", res.Header.Get("Content-Type"))
- meta, err := imagemeta.DecodeMeta(res.Body)
- s.Require().NoError(err)
- s.Require().Equal(imagetype.PNG, meta.Format())
- s.Require().Equal(4, meta.Width())
- s.Require().Equal(4, meta.Height())
- }
- func (s *ProcessingHandlerTestSuite) TestSignatureValidationFailure() {
- config.Keys = [][]byte{[]byte("test-key")}
- config.Salts = [][]byte{[]byte("test-salt")}
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(403, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestSignatureValidationSuccess() {
- config.Keys = [][]byte{[]byte("test-key")}
- config.Salts = [][]byte{[]byte("test-salt")}
- rw := s.send("/My9d3xq_PYpVHsPrCyww0Kh1w5KZeZhIlWhsa4az1TI/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestSourceValidation() {
- imagedata.RedirectAllRequestsTo("local:///test1.png")
- defer imagedata.StopRedirectingRequests()
- tt := []struct {
- name string
- allowedSources []string
- requestPath string
- expectedError bool
- }{
- {
- name: "match http URL without wildcard",
- allowedSources: []string{"local://", "http://images.dev/"},
- requestPath: "/unsafe/plain/http://images.dev/lorem/ipsum.jpg",
- expectedError: false,
- },
- {
- name: "match http URL with wildcard in hostname single level",
- allowedSources: []string{"local://", "http://*.mycdn.dev/"},
- requestPath: "/unsafe/plain/http://a-1.mycdn.dev/lorem/ipsum.jpg",
- expectedError: false,
- },
- {
- name: "match http URL with wildcard in hostname multiple levels",
- allowedSources: []string{"local://", "http://*.mycdn.dev/"},
- requestPath: "/unsafe/plain/http://a-1.b-2.mycdn.dev/lorem/ipsum.jpg",
- expectedError: false,
- },
- {
- name: "no match s3 URL with allowed local and http URLs",
- allowedSources: []string{"local://", "http://images.dev/"},
- requestPath: "/unsafe/plain/s3://images/lorem/ipsum.jpg",
- expectedError: true,
- },
- {
- name: "no match http URL with wildcard in hostname including slash",
- allowedSources: []string{"local://", "http://*.mycdn.dev/"},
- requestPath: "/unsafe/plain/http://other.dev/.mycdn.dev/lorem/ipsum.jpg",
- expectedError: true,
- },
- }
- for _, tc := range tt {
- s.Run(tc.name, func() {
- exps := make([]*regexp.Regexp, len(tc.allowedSources))
- for i, pattern := range tc.allowedSources {
- exps[i] = configurators.RegexpFromPattern(pattern)
- }
- config.AllowedSources = exps
- rw := s.send(tc.requestPath)
- res := rw.Result()
- if tc.expectedError {
- s.Require().Equal(404, res.StatusCode)
- } else {
- s.Require().Equal(200, res.StatusCode)
- }
- })
- }
- }
- func (s *ProcessingHandlerTestSuite) TestSourceNetworkValidation() {
- data := s.readTestFile("test1.png")
- server := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.WriteHeader(200)
- rw.Write(data)
- }))
- defer server.Close()
- var rw *httptest.ResponseRecorder
- u := fmt.Sprintf("/unsafe/rs:fill:4:4/plain/%s/test1.png", server.URL)
- rw = s.send(u)
- s.Require().Equal(200, rw.Result().StatusCode)
- config.AllowLoopbackSourceAddresses = false
- rw = s.send(u)
- s.Require().Equal(404, rw.Result().StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestSourceFormatNotSupported() {
- vips.DisableLoadSupport(imagetype.PNG)
- defer vips.ResetLoadSupport()
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(422, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestResultingFormatNotSupported() {
- vips.DisableSaveSupport(imagetype.PNG)
- defer vips.ResetSaveSupport()
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@png")
- res := rw.Result()
- s.Require().Equal(422, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestSkipProcessingConfig() {
- config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected := s.readTestFile("test1.png")
- s.Require().True(bytes.Equal(expected, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestSkipProcessingPO() {
- rw := s.send("/unsafe/rs:fill:4:4/skp:png/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected := s.readTestFile("test1.png")
- s.Require().True(bytes.Equal(expected, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestSkipProcessingSameFormat() {
- config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected := s.readTestFile("test1.png")
- s.Require().True(bytes.Equal(expected, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestSkipProcessingDifferentFormat() {
- config.SkipProcessingFormats = []imagetype.Type{imagetype.PNG}
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@jpg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected := s.readTestFile("test1.png")
- s.Require().False(bytes.Equal(expected, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestSkipProcessingSVG() {
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.svg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected, err := svg.Sanitize(&imagedata.ImageData{Data: s.readTestFile("test1.svg")})
- s.Require().NoError(err)
- s.Require().True(bytes.Equal(expected.Data, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestNotSkipProcessingSVGToJPG() {
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.svg@jpg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- actual := s.readBody(res)
- expected := s.readTestFile("test1.svg")
- s.Require().False(bytes.Equal(expected, actual))
- }
- func (s *ProcessingHandlerTestSuite) TestErrorSavingToSVG() {
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png@svg")
- res := rw.Result()
- s.Require().Equal(422, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestCacheControlPassthroughCacheControl() {
- config.CacheControlPassthrough = true
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.Header().Set("Cache-Control", "max-age=1234, public")
- rw.Header().Set("Expires", time.Now().Add(time.Hour).UTC().Format(http.TimeFormat))
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
- res := rw.Result()
- s.Require().Equal("max-age=1234, public", res.Header.Get("Cache-Control"))
- s.Require().Empty(res.Header.Get("Expires"))
- }
- func (s *ProcessingHandlerTestSuite) TestCacheControlPassthroughExpires() {
- config.CacheControlPassthrough = true
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.Header().Set("Expires", time.Now().Add(1239*time.Second).UTC().Format(http.TimeFormat))
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
- res := rw.Result()
- // Use regex to allow some delay
- s.Require().Regexp("max-age=123[0-9], public", res.Header.Get("Cache-Control"))
- s.Require().Empty(res.Header.Get("Expires"))
- }
- func (s *ProcessingHandlerTestSuite) TestCacheControlPassthroughDisabled() {
- config.CacheControlPassthrough = false
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.Header().Set("Cache-Control", "max-age=1234, public")
- rw.Header().Set("Expires", time.Now().Add(time.Hour).UTC().Format(http.TimeFormat))
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
- res := rw.Result()
- s.Require().NotEqual("max-age=1234, public", res.Header.Get("Cache-Control"))
- s.Require().Empty(res.Header.Get("Expires"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagDisabled() {
- config.ETagEnabled = false
- rw := s.send("/unsafe/rs:fill:4:4/plain/local:///test1.png")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Empty(res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagReqNoIfNotModified() {
- config.ETagEnabled = true
- poStr, imgdata, etag := s.sampleETagData("loremipsumdolor")
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Empty(r.Header.Get("If-None-Match"))
- rw.Header().Set("ETag", imgdata.Headers["ETag"])
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL))
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal(etag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagDataNoIfNotModified() {
- config.ETagEnabled = true
- poStr, imgdata, etag := s.sampleETagData("")
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Empty(r.Header.Get("If-None-Match"))
- rw.WriteHeader(200)
- rw.Write(imgdata.Data)
- }))
- defer ts.Close()
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL))
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal(etag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagReqMatch() {
- config.ETagEnabled = true
- poStr, imgdata, etag := s.sampleETagData(`"loremipsumdolor"`)
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Equal(imgdata.Headers["ETag"], r.Header.Get("If-None-Match"))
- rw.WriteHeader(304)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-None-Match", etag)
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
- res := rw.Result()
- s.Require().Equal(304, res.StatusCode)
- s.Require().Equal(etag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagDataMatch() {
- config.ETagEnabled = true
- poStr, imgdata, etag := s.sampleETagData("")
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Empty(r.Header.Get("If-None-Match"))
- rw.WriteHeader(200)
- rw.Write(imgdata.Data)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-None-Match", etag)
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
- res := rw.Result()
- s.Require().Equal(304, res.StatusCode)
- s.Require().Equal(etag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagReqNotMatch() {
- config.ETagEnabled = true
- poStr, imgdata, actualETag := s.sampleETagData(`"loremipsumdolor"`)
- _, _, expectedETag := s.sampleETagData(`"loremipsum"`)
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Equal(`"loremipsum"`, r.Header.Get("If-None-Match"))
- rw.Header().Set("ETag", imgdata.Headers["ETag"])
- rw.WriteHeader(200)
- rw.Write(imgdata.Data)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-None-Match", expectedETag)
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal(actualETag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagDataNotMatch() {
- config.ETagEnabled = true
- poStr, imgdata, actualETag := s.sampleETagData("")
- // Change the data hash
- expectedETag := actualETag[:strings.IndexByte(actualETag, '/')] + "/Dasdbefj"
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Empty(r.Header.Get("If-None-Match"))
- rw.WriteHeader(200)
- rw.Write(imgdata.Data)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-None-Match", expectedETag)
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal(actualETag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestETagProcessingOptionsNotMatch() {
- config.ETagEnabled = true
- poStr, imgdata, actualETag := s.sampleETagData("")
- // Change the processing options hash
- expectedETag := "abcdefj" + actualETag[strings.IndexByte(actualETag, '/'):]
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- s.Empty(r.Header.Get("If-None-Match"))
- rw.Header().Set("ETag", imgdata.Headers["ETag"])
- rw.WriteHeader(200)
- rw.Write(imgdata.Data)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-None-Match", expectedETag)
- rw := s.send(fmt.Sprintf("/unsafe/%s/plain/%s", poStr, ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal(actualETag, res.Header.Get("ETag"))
- }
- func (s *ProcessingHandlerTestSuite) TestLastModifiedEnabled() {
- config.LastModifiedEnabled = true
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.Header().Set("Last-Modified", "Wed, 21 Oct 2015 07:28:00 GMT")
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
- res := rw.Result()
- s.Require().Equal("Wed, 21 Oct 2015 07:28:00 GMT", res.Header.Get("Last-Modified"))
- }
- func (s *ProcessingHandlerTestSuite) TestLastModifiedDisabled() {
- config.LastModifiedEnabled = false
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- rw.Header().Set("Last-Modified", "Wed, 21 Oct 2015 07:28:00 GMT")
- rw.WriteHeader(200)
- rw.Write(s.readTestFile("test1.png"))
- }))
- defer ts.Close()
- rw := s.send("/unsafe/rs:fill:4:4/plain/" + ts.URL)
- res := rw.Result()
- s.Require().Empty(res.Header.Get("Last-Modified"))
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqExactMatchLastModifiedDisabled() {
- config.LastModifiedEnabled = false
- data := s.readTestFile("test1.png")
- lastModified := "Wed, 21 Oct 2015 07:28:00 GMT"
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- modifiedSince := r.Header.Get("If-Modified-Since")
- s.Empty(modifiedSince)
- rw.WriteHeader(200)
- rw.Write(data)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-Modified-Since", lastModified)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqExactMatchLastModifiedEnabled() {
- config.LastModifiedEnabled = true
- lastModified := "Wed, 21 Oct 2015 07:28:00 GMT"
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- modifiedSince := r.Header.Get("If-Modified-Since")
- s.Equal(lastModified, modifiedSince)
- rw.WriteHeader(304)
- }))
- defer ts.Close()
- header := make(http.Header)
- header.Set("If-Modified-Since", lastModified)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(304, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqCompareMoreRecentLastModifiedDisabled() {
- data := s.readTestFile("test1.png")
- config.LastModifiedEnabled = false
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- modifiedSince := r.Header.Get("If-Modified-Since")
- s.Empty(modifiedSince)
- rw.WriteHeader(200)
- rw.Write(data)
- }))
- defer ts.Close()
- recentTimestamp := "Thu, 25 Feb 2021 01:45:00 GMT"
- header := make(http.Header)
- header.Set("If-Modified-Since", recentTimestamp)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqCompareMoreRecentLastModifiedEnabled() {
- config.LastModifiedEnabled = true
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- fileLastModified, _ := time.Parse(http.TimeFormat, "Wed, 21 Oct 2015 07:28:00 GMT")
- modifiedSince := r.Header.Get("If-Modified-Since")
- parsedModifiedSince, err := time.Parse(http.TimeFormat, modifiedSince)
- s.NoError(err)
- s.True(fileLastModified.Before(parsedModifiedSince))
- rw.WriteHeader(304)
- }))
- defer ts.Close()
- recentTimestamp := "Thu, 25 Feb 2021 01:45:00 GMT"
- header := make(http.Header)
- header.Set("If-Modified-Since", recentTimestamp)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(304, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqCompareTooOldLastModifiedDisabled() {
- config.LastModifiedEnabled = false
- data := s.readTestFile("test1.png")
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- modifiedSince := r.Header.Get("If-Modified-Since")
- s.Empty(modifiedSince)
- rw.WriteHeader(200)
- rw.Write(data)
- }))
- defer ts.Close()
- oldTimestamp := "Tue, 01 Oct 2013 17:31:00 GMT"
- header := make(http.Header)
- header.Set("If-Modified-Since", oldTimestamp)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestModifiedSinceReqCompareTooOldLastModifiedEnabled() {
- config.LastModifiedEnabled = true
- data := s.readTestFile("test1.png")
- ts := httptest.NewServer(http.HandlerFunc(func(rw http.ResponseWriter, r *http.Request) {
- fileLastModified, _ := time.Parse(http.TimeFormat, "Wed, 21 Oct 2015 07:28:00 GMT")
- modifiedSince := r.Header.Get("If-Modified-Since")
- parsedModifiedSince, err := time.Parse(http.TimeFormat, modifiedSince)
- s.NoError(err)
- s.True(fileLastModified.After(parsedModifiedSince))
- rw.WriteHeader(200)
- rw.Write(data)
- }))
- defer ts.Close()
- oldTimestamp := "Tue, 01 Oct 2013 17:31:00 GMT"
- header := make(http.Header)
- header.Set("If-Modified-Since", oldTimestamp)
- rw := s.send(fmt.Sprintf("/unsafe/plain/%s", ts.URL), header)
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- }
- func (s *ProcessingHandlerTestSuite) TestAlwaysRasterizeSvg() {
- config.AlwaysRasterizeSvg = true
- rw := s.send("/unsafe/rs:fill:40:40/plain/local:///test1.svg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal("image/png", res.Header.Get("Content-Type"))
- }
- func (s *ProcessingHandlerTestSuite) TestAlwaysRasterizeSvgWithEnforceAvif() {
- config.AlwaysRasterizeSvg = true
- config.EnforceWebp = true
- rw := s.send("/unsafe/plain/local:///test1.svg", http.Header{"Accept": []string{"image/webp"}})
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal("image/webp", res.Header.Get("Content-Type"))
- }
- func (s *ProcessingHandlerTestSuite) TestAlwaysRasterizeSvgDisabled() {
- config.AlwaysRasterizeSvg = false
- config.EnforceWebp = true
- rw := s.send("/unsafe/plain/local:///test1.svg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal("image/svg+xml", res.Header.Get("Content-Type"))
- }
- func (s *ProcessingHandlerTestSuite) TestAlwaysRasterizeSvgWithFormat() {
- config.AlwaysRasterizeSvg = true
- config.SkipProcessingFormats = []imagetype.Type{imagetype.SVG}
- rw := s.send("/unsafe/plain/local:///test1.svg@svg")
- res := rw.Result()
- s.Require().Equal(200, res.StatusCode)
- s.Require().Equal("image/svg+xml", res.Header.Get("Content-Type"))
- }
- func TestProcessingHandler(t *testing.T) {
- suite.Run(t, new(ProcessingHandlerTestSuite))
- }
|