mirror of
https://github.com/d0zingcat/gocryptotrader.git
synced 2026-05-14 07:26:47 +00:00
* gateio: Add multi asset websocket support WIP. * meow * Add tests and shenanigans * integrate flushing and for enabling/disabling pairs from rpc shenanigans * some changes * linter: fixes strikes again. * Change name ConnectionAssociation -> ConnectionCandidate for better clarity on purpose. Change connections map to point to candidate to track subscriptions for future dynamic connections holder and drop struct ConnectionDetails. * Add subscription tests (state functional) * glorious:nits + proxy handling * Spelling * linter: fixerino * instead of nil, dont do nil. * clean up nils * cya nils * don't need to set URL or check if its running * stream match update * update tests * linter: fix * glorious: nits + handle context cancellations * stop ping handler routine leak * * Fix bug where reader routine on error that is not a disconnection error but websocket frame error or anything really makes the reader routine return and then connection never cycles and the buffer gets filled. * Handle reconnection via an errors.Is check which is simpler and in that scope allow for quick disconnect reconnect without waiting for connection cycle. * Dial now uses code from DialContext but just calls context.Background() * Don't allow reader to return on parse binary response error. Just output error and return a non nil response * Allow rollback on connect on any error across all connections * fix shadow jutsu * glorious/gk: nitters - adds in ws mock server * linter: fix * fix deadlock on connection as the previous channel had no reader and would hang connection reader for eternity. * glorious: whooops * gk: nits * Leak issue and edge case * Websocket: Add SendMessageReturnResponses * whooooooopsie * gk: nitssssss * Update exchanges/stream/stream_match.go Co-authored-by: Gareth Kirwan <gbjkirwan@gmail.com> * Update exchanges/stream/stream_match_test.go Co-authored-by: Gareth Kirwan <gbjkirwan@gmail.com> * linter: appease the linter gods * gk: nits * gk: drain brain * started * more changes before merge match pr * gateio: still building out * gateio: finish spot * fix up tests in gateio * Add tests for stream package * rm unused field * glorious: nits * rn files, specifically set function names to asset and offload routing to websocket type. * linter: fix * Add futures websocket request support * gateio: integrate with IBOTExchange (cherry pick my nose) * linter: fix * glorious: nits * add counter and update gateio * fix collision issue * Update exchanges/stream/websocket.go Co-authored-by: Scott <gloriousCode@users.noreply.github.com> * glorious: nits * add tests * linter: fix * After merge * Add error connection info * upgrade to upstream merge * Fix edge case where it does not reconnect made by an already closed connection * stream coverage * glorious: nits * glorious: nits removed asset error handling in stream package * linter: fix * rm block * Add basic readme * fix asset enabled flush cycle for multi connection * spella: fix * linter: fix * Add glorious suggestions, fix some race thing * reinstate name before any routine gets spawned * stop on error in mock tests * glorious: nits * Set correct price * glorious: nits found in CI build * Add test for drain, bumped wait times as there seems to be something happening on macos CI builds, used context.WithTimeout because its instant. * mutex across shutdown and connect for protection * lint: fix * test time withoffset, reinstate stop * fix whoops * const trafficCheckInterval; rm testmain * y * fix lint * bump time check window * stream: fix intermittant test failures while testing routines and remove code that is not needed. * spells * cant do what I did * protect race due to routine. * update testURL * use mock websocket connection instead of test URL's * linter: fix * remove url because its throwing errors on CI builds * connections drop all the time, don't need to worry about not being able to echo back ws data as it can be easily reviewed _test file side. * remove another superfluous url thats not really set up for this * spawn overwatch routine when there is no errors, inline checker instead of waiting for a time period, add sleep inline with echo handler as this is really quick and wanted to ensure that latency is handing correctly * linter: fixerino uperino * fix ID bug, why I do this, I don't know. * glorious: panix * linter: things * whoops * dont need to make consecutive Unix() calls * websocket: fix potential panic on error and no responses and adding waitForResponses * rm json parser and handle in json package instead * in favour of json package unmarshalling * linter: fix * linter: fix again * * change field name OutboundRequestSignature to WrapperDefinedConnectionSignature for agnostic inbound and outbound connections. * change method name GetOutboundConnection to GetConnection for agnostic inbound and outbound connections. * drop outbound field map for improved performance just using a range and field check (less complex as well) * change field name connections to connectionToWrapper for better clarity * spells and magic and wands * glorious: nits * comparable check for signature * mv err var * glorious: nits and stuff * attempt to fix race * glorious: nits * gk: nits; engine log cleanup * gk: nits; OCD * gk: nits; move function change file names * gk: nits; 🚀 * gk: nits; convert variadic function and message inspection to interface and include a specific function for that handling so as to not need nil on every call * gk: nits; continued * gk: engine nits; rm loaded exchange * gk: nits; drop WebsocketLoginResponse * stream: Add match method EnsureMatchWithData * gk: nits; rn Inspect to IsFinal * gk: nits; rn to MessageFilter * linter: fix * gateio: update rate limit definitions (cherry-pick) * Add test and missing * Shared REST rate limit definitions with Websocket service, set lookup item to nil for systems that do not require rate limiting; add glorious nit * integrate rate limits for websocket trading spot * conform to match upstream changes * standardise names to upstream style * fix wrapper standards test when sending a auth request through a websocket connection * whoops * Update exchanges/gateio/gateio_types.go Co-authored-by: Scott <gloriousCode@users.noreply.github.com> * glorious: nits * linter: fix * linter: overload * whoops * spelling fixes on recent merge * glorious: nits * linter: fix? * glorious: nits * gk: assert errors touched * gk: unexport derive functions * gk: nitssssssss * fix test * gk: nitters v1 * gk: http status * gk/nits: Add getAssetFromFuturesPair * gk: nits single response when submitting * gk: new pair with delimiter in tests * gk: param update slice to slice of pointers * gk: add asset type in params, includes t.Context() for tests * linter: fix * linter: fix * fix merge whoopsie * glorious: nits * gk: nit * shift over to websocket package error * internal/exchange/websocket -> exchange/websocket * PEAK OCD! * appease the OCD gods * thrasher: nits --------- Co-authored-by: shazbert <ryan.oharareid@thrasher.io> Co-authored-by: Gareth Kirwan <gbjkirwan@gmail.com> Co-authored-by: Scott <gloriousCode@users.noreply.github.com>
721 lines
18 KiB
Go
721 lines
18 KiB
Go
package request
|
|
|
|
import (
|
|
"context"
|
|
"errors"
|
|
"io"
|
|
"log"
|
|
"math"
|
|
"net/http"
|
|
"net/http/httptest"
|
|
"net/url"
|
|
"os"
|
|
"strconv"
|
|
"strings"
|
|
"sync"
|
|
"sync/atomic"
|
|
"testing"
|
|
"time"
|
|
|
|
"github.com/stretchr/testify/assert"
|
|
"github.com/stretchr/testify/require"
|
|
"github.com/thrasher-corp/gocryptotrader/common"
|
|
"github.com/thrasher-corp/gocryptotrader/exchanges/nonce"
|
|
"golang.org/x/time/rate"
|
|
)
|
|
|
|
const unexpected = "unexpected values"
|
|
|
|
var (
|
|
testURL string
|
|
serverLimit *RateLimiterWithWeight
|
|
)
|
|
|
|
func TestMain(m *testing.M) {
|
|
serverLimitInterval := time.Millisecond * 500
|
|
serverLimit = NewWeightedRateLimitByDuration(serverLimitInterval)
|
|
serverLimitRetry := NewWeightedRateLimitByDuration(serverLimitInterval)
|
|
sm := http.NewServeMux()
|
|
sm.HandleFunc("/", func(w http.ResponseWriter, _ *http.Request) {
|
|
w.Header().Set("Content-Type", "application/json")
|
|
_, err := io.WriteString(w, `{"response":true}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
})
|
|
sm.HandleFunc("/error", func(w http.ResponseWriter, _ *http.Request) {
|
|
w.WriteHeader(http.StatusBadRequest)
|
|
_, err := io.WriteString(w, `{"error":true}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
})
|
|
sm.HandleFunc("/timeout", func(w http.ResponseWriter, _ *http.Request) {
|
|
time.Sleep(time.Millisecond * 100)
|
|
w.WriteHeader(http.StatusGatewayTimeout)
|
|
})
|
|
sm.HandleFunc("/rate", func(w http.ResponseWriter, _ *http.Request) {
|
|
if !serverLimit.Allow() {
|
|
http.Error(w,
|
|
http.StatusText(http.StatusTooManyRequests),
|
|
http.StatusTooManyRequests)
|
|
_, err := io.WriteString(w, `{"response":false}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
return
|
|
}
|
|
_, err := io.WriteString(w, `{"response":true}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
})
|
|
sm.HandleFunc("/rate-retry", func(w http.ResponseWriter, _ *http.Request) {
|
|
if !serverLimitRetry.Allow() {
|
|
w.Header().Add("Retry-After", strconv.Itoa(int(math.Round(serverLimitInterval.Seconds()))))
|
|
http.Error(w,
|
|
http.StatusText(http.StatusTooManyRequests),
|
|
http.StatusTooManyRequests)
|
|
_, err := io.WriteString(w, `{"response":false}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
return
|
|
}
|
|
_, err := io.WriteString(w, `{"response":true}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
})
|
|
sm.HandleFunc("/always-retry", func(w http.ResponseWriter, _ *http.Request) {
|
|
w.Header().Add("Retry-After", time.Now().Format(time.RFC1123))
|
|
w.WriteHeader(http.StatusTooManyRequests)
|
|
_, err := io.WriteString(w, `{"response":false}`)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
})
|
|
|
|
server := httptest.NewServer(sm)
|
|
testURL = server.URL
|
|
issues := m.Run()
|
|
server.Close()
|
|
os.Exit(issues)
|
|
}
|
|
|
|
func TestNewRateLimitWithWeight(t *testing.T) {
|
|
t.Parallel()
|
|
r := NewRateLimitWithWeight(time.Second*10, 5, 1)
|
|
if r.Limit() != 0.5 {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
// Ensures rate limiting factor is the same
|
|
r = NewRateLimitWithWeight(time.Second*2, 1, 1)
|
|
if r.Limit() != 0.5 {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
// Test for open rate limit
|
|
r = NewRateLimitWithWeight(time.Second*2, 0, 1)
|
|
if r.Limit() != rate.Inf {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
r = NewRateLimitWithWeight(0, 69, 1)
|
|
if r.Limit() != rate.Inf {
|
|
t.Fatal(unexpected)
|
|
}
|
|
}
|
|
|
|
func TestCheckRequest(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
r, err := New("TestRequest",
|
|
new(http.Client))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
ctx := context.Background()
|
|
|
|
var check *Item
|
|
_, err = check.validateRequest(ctx, &Requester{})
|
|
if err == nil {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
_, err = check.validateRequest(ctx, nil)
|
|
if err == nil {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
_, err = check.validateRequest(ctx, r)
|
|
if err == nil {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
check = &Item{}
|
|
_, err = check.validateRequest(ctx, r)
|
|
if err == nil {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
check.Path = testURL
|
|
check.Method = " " // Forces method check; "" automatically converts to GET
|
|
_, err = check.validateRequest(ctx, r)
|
|
if err == nil {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
check.Method = http.MethodPost
|
|
_, err = check.validateRequest(ctx, r)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
var passback http.Header
|
|
check.HeaderResponse = &passback
|
|
_, err = check.validateRequest(ctx, r)
|
|
if err == nil {
|
|
t.Fatal("expected error when underlying memory is not allocated")
|
|
}
|
|
passback = http.Header{}
|
|
|
|
// Test setting headers
|
|
check.Headers = map[string]string{
|
|
"Content-Type": "Super awesome HTTP party experience",
|
|
}
|
|
|
|
// Test user agent set
|
|
r.userAgent = "r00t axxs"
|
|
req, err := check.validateRequest(ctx, r)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
if req.Header.Get("Content-Type") != "Super awesome HTTP party experience" {
|
|
t.Fatal(unexpected)
|
|
}
|
|
|
|
if req.UserAgent() != "r00t axxs" {
|
|
t.Fatal(unexpected)
|
|
}
|
|
}
|
|
|
|
var globalshell = RateLimitDefinitions{
|
|
Auth: NewWeightedRateLimitByDuration(time.Millisecond * 600),
|
|
UnAuth: NewRateLimitWithWeight(time.Second*1, 100, 1),
|
|
}
|
|
|
|
func TestDoRequest(t *testing.T) {
|
|
t.Parallel()
|
|
r, err := New("test", new(http.Client), WithLimiter(globalshell))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ctx := context.Background()
|
|
err = (*Requester)(nil).SendPayload(ctx, Unset, nil, UnauthenticatedRequest)
|
|
if !errors.Is(ErrRequestSystemIsNil, err) {
|
|
t.Fatalf("expected: %v but received: %v", ErrRequestSystemIsNil, err)
|
|
}
|
|
err = r.SendPayload(ctx, Unset, nil, UnauthenticatedRequest)
|
|
if !errors.Is(errRequestFunctionIsNil, err) {
|
|
t.Fatalf("expected: %v but received: %v", errRequestFunctionIsNil, err)
|
|
}
|
|
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) { return nil, nil }, UnauthenticatedRequest)
|
|
if !errors.Is(errRequestItemNil, err) {
|
|
t.Fatalf("expected: %v but received: %v", errRequestItemNil, err)
|
|
}
|
|
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) { return &Item{}, nil }, UnauthenticatedRequest)
|
|
if !errors.Is(errInvalidPath, err) {
|
|
t.Fatalf("expected: %v but received: %v", errInvalidPath, err)
|
|
}
|
|
|
|
var nilHeader http.Header
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return &Item{
|
|
Path: testURL,
|
|
HeaderResponse: &nilHeader,
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(errHeaderResponseMapIsNil, err) {
|
|
t.Fatalf("expected: %v but received: %v", errHeaderResponseMapIsNil, err)
|
|
}
|
|
|
|
// Invalid/missing endpoint limit
|
|
err = r.SendPayload(ctx, Unset, func() (*Item, error) { return &Item{Path: testURL}, nil }, UnauthenticatedRequest)
|
|
if !errors.Is(err, errSpecificRateLimiterIsNil) {
|
|
t.Fatalf("expected: %v but received: %v", errSpecificRateLimiterIsNil, err)
|
|
}
|
|
|
|
// Force debug
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return &Item{
|
|
Path: testURL,
|
|
Headers: map[string]string{
|
|
"test": "supertest",
|
|
},
|
|
Body: strings.NewReader("test"),
|
|
HTTPDebugging: true,
|
|
Verbose: true,
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: %v but expected: %v", err, nil)
|
|
}
|
|
|
|
// Fail new request call
|
|
newError := errors.New("request item failure")
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return nil, newError
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, newError) {
|
|
t.Fatalf("received: %v but expected: %v", err, newError)
|
|
}
|
|
|
|
r._HTTPClient, err = newProtectedClient(common.NewHTTPClientWithTimeout(0))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// timeout checker
|
|
err = r._HTTPClient.setHTTPClientTimeout(time.Millisecond * 50)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return &Item{Path: testURL + "/timeout"}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, errFailedToRetryRequest) {
|
|
t.Fatalf("received: %v but expected: %v", err, errFailedToRetryRequest)
|
|
}
|
|
// reset timeout
|
|
err = r._HTTPClient.setHTTPClientTimeout(0)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
// Check JSON
|
|
var resp struct {
|
|
Response bool `json:"response"`
|
|
}
|
|
|
|
// Check header contents
|
|
passback := http.Header{}
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL,
|
|
Result: &resp,
|
|
HeaderResponse: &passback,
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: %v but expected: %v", err, nil)
|
|
}
|
|
|
|
if passback.Get("Content-Length") != "17" {
|
|
t.Fatal("incorrect header value")
|
|
}
|
|
|
|
if passback.Get("Content-Type") != "application/json" {
|
|
t.Fatal("incorrect header value")
|
|
}
|
|
|
|
// Check error
|
|
var respErr struct {
|
|
Error bool `json:"error"`
|
|
}
|
|
err = r.SendPayload(ctx, UnAuth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL,
|
|
Result: &respErr,
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: %v but expected: %v", err, nil)
|
|
}
|
|
|
|
if respErr.Error {
|
|
t.Fatal("unexpected value")
|
|
}
|
|
|
|
// Check client side rate limit
|
|
var failed int32
|
|
var wg sync.WaitGroup
|
|
wg.Add(5)
|
|
for range 5 {
|
|
go func(wg *sync.WaitGroup) {
|
|
var resp struct {
|
|
Response bool `json:"response"`
|
|
}
|
|
payloadError := r.SendPayload(ctx, Auth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL + "/rate",
|
|
Result: &resp,
|
|
}, nil
|
|
}, AuthenticatedRequest)
|
|
wg.Done()
|
|
if payloadError != nil {
|
|
atomic.StoreInt32(&failed, 1)
|
|
log.Fatal(payloadError)
|
|
}
|
|
if !resp.Response {
|
|
atomic.StoreInt32(&failed, 1)
|
|
log.Fatal(unexpected)
|
|
}
|
|
}(&wg)
|
|
}
|
|
wg.Wait()
|
|
|
|
if failed != 0 {
|
|
t.Fatal("request failed")
|
|
}
|
|
}
|
|
|
|
func TestDoRequest_Retries(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
backoff := func(int) time.Duration {
|
|
return 0
|
|
}
|
|
r, err := New("test", new(http.Client), WithBackoff(backoff))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
var failed int32
|
|
var wg sync.WaitGroup
|
|
wg.Add(4)
|
|
for range 4 {
|
|
go func(wg *sync.WaitGroup) {
|
|
defer wg.Done()
|
|
var resp struct {
|
|
Response bool `json:"response"`
|
|
}
|
|
payloadError := r.SendPayload(context.Background(), Auth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL + "/rate-retry",
|
|
Result: &resp,
|
|
}, nil
|
|
}, AuthenticatedRequest)
|
|
if payloadError != nil {
|
|
atomic.StoreInt32(&failed, 1)
|
|
log.Fatal(payloadError)
|
|
}
|
|
if !resp.Response {
|
|
atomic.StoreInt32(&failed, 1)
|
|
log.Fatal(unexpected)
|
|
}
|
|
}(&wg)
|
|
}
|
|
wg.Wait()
|
|
|
|
if failed != 0 {
|
|
t.Fatal("request failed")
|
|
}
|
|
}
|
|
|
|
func TestDoRequest_RetryNonRecoverable(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
backoff := func(int) time.Duration {
|
|
return 0
|
|
}
|
|
r, err := New("test", new(http.Client), WithBackoff(backoff))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SendPayload(context.Background(), Unset, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL + "/always-retry",
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, errFailedToRetryRequest) {
|
|
t.Fatalf("received: %v but expected: %v", err, errFailedToRetryRequest)
|
|
}
|
|
}
|
|
|
|
func TestDoRequest_NotRetryable(t *testing.T) {
|
|
t.Parallel()
|
|
|
|
notRetryErr := errors.New("not retryable")
|
|
retry := func(*http.Response, error) (bool, error) {
|
|
return false, notRetryErr
|
|
}
|
|
backoff := func(n int) time.Duration {
|
|
return time.Duration(n) * time.Millisecond
|
|
}
|
|
r, err := New("test", new(http.Client), WithRetryPolicy(retry), WithBackoff(backoff))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SendPayload(context.Background(), Unset, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL + "/always-retry",
|
|
}, nil
|
|
}, UnauthenticatedRequest)
|
|
if !errors.Is(err, notRetryErr) {
|
|
t.Fatalf("received: %v but expected: %v", err, notRetryErr)
|
|
}
|
|
}
|
|
|
|
func TestGetNonce(t *testing.T) {
|
|
t.Parallel()
|
|
r, err := New("test", new(http.Client), WithLimiter(globalshell))
|
|
require.NoError(t, err)
|
|
n1 := r.GetNonce(nonce.Unix)
|
|
assert.NotZero(t, n1)
|
|
n2 := r.GetNonce(nonce.Unix)
|
|
assert.NotZero(t, n2)
|
|
assert.NotEqual(t, n1, n2)
|
|
|
|
r2, err := New("test", new(http.Client), WithLimiter(globalshell))
|
|
require.NoError(t, err)
|
|
n3 := r2.GetNonce(nonce.UnixNano)
|
|
assert.NotZero(t, n3)
|
|
n4 := r2.GetNonce(nonce.UnixNano)
|
|
assert.NotZero(t, n4)
|
|
assert.NotEqual(t, n3, n4)
|
|
|
|
assert.NotEqual(t, n1, n3)
|
|
assert.NotEqual(t, n2, n4)
|
|
}
|
|
|
|
// 40532461 30.29 ns/op 0 B/op 0 allocs/op (prev)
|
|
// 45329203 26.53 ns/op 0 B/op 0 allocs/op
|
|
func BenchmarkGetNonce(b *testing.B) {
|
|
r, err := New("test", new(http.Client), WithLimiter(globalshell))
|
|
require.NoError(b, err)
|
|
for b.Loop() {
|
|
r.GetNonce(nonce.UnixNano)
|
|
r.timedLock.UnlockIfLocked()
|
|
}
|
|
}
|
|
|
|
func TestSetProxy(t *testing.T) {
|
|
t.Parallel()
|
|
var r *Requester
|
|
err := r.SetProxy(nil)
|
|
if !errors.Is(err, ErrRequestSystemIsNil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, ErrRequestSystemIsNil)
|
|
}
|
|
r, err = New("test", &http.Client{Transport: new(http.Transport)}, WithLimiter(globalshell))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
u, err := url.Parse("http://www.google.com")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SetProxy(u)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
u, err = url.Parse("")
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SetProxy(u)
|
|
if err == nil {
|
|
t.Fatal("error cannot be nil")
|
|
}
|
|
}
|
|
|
|
func TestBasicLimiter(t *testing.T) {
|
|
r, err := New("test", new(http.Client), WithLimiter(NewBasicRateLimit(time.Second, 1, 1)))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
i := Item{Path: "http://www.google.com", Method: http.MethodGet}
|
|
ctx := context.Background()
|
|
|
|
tn := time.Now()
|
|
err = r.SendPayload(ctx, Unset, func() (*Item, error) { return &i, nil }, UnauthenticatedRequest)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SendPayload(ctx, Unset, func() (*Item, error) { return &i, nil }, UnauthenticatedRequest)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
if time.Since(tn) < time.Second {
|
|
t.Error("rate limit issues")
|
|
}
|
|
|
|
ctx, cancel := context.WithDeadline(ctx, tn.Add(time.Nanosecond))
|
|
defer cancel()
|
|
err = r.SendPayload(ctx, Unset, func() (*Item, error) { return &i, nil }, UnauthenticatedRequest)
|
|
if !errors.Is(err, context.DeadlineExceeded) {
|
|
t.Fatalf("received: %v but expected: %v", err, context.DeadlineExceeded)
|
|
}
|
|
}
|
|
|
|
func TestEnableDisableRateLimit(t *testing.T) {
|
|
r, err := New("TestRequest", new(http.Client), WithLimiter(NewBasicRateLimit(time.Minute, 1, 1)))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
ctx := context.Background()
|
|
|
|
var resp any
|
|
err = r.SendPayload(ctx, Auth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL,
|
|
Result: &resp,
|
|
}, nil
|
|
}, AuthenticatedRequest)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
err = r.EnableRateLimiter()
|
|
if err == nil {
|
|
t.Fatal("error cannot be nil")
|
|
}
|
|
|
|
err = r.DisableRateLimiter()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
err = r.SendPayload(ctx, Auth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL,
|
|
Result: &resp,
|
|
}, nil
|
|
}, AuthenticatedRequest)
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
err = r.DisableRateLimiter()
|
|
if err == nil {
|
|
t.Fatal("error cannot be nil")
|
|
}
|
|
|
|
err = r.EnableRateLimiter()
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
|
|
ti := time.NewTicker(time.Second)
|
|
c := make(chan struct{})
|
|
go func(c chan struct{}) {
|
|
err = r.SendPayload(ctx, Auth, func() (*Item, error) {
|
|
return &Item{
|
|
Method: http.MethodGet,
|
|
Path: testURL,
|
|
Result: &resp,
|
|
}, nil
|
|
}, AuthenticatedRequest)
|
|
if err != nil {
|
|
log.Fatal(err)
|
|
}
|
|
c <- struct{}{}
|
|
}(c)
|
|
|
|
select {
|
|
case <-c:
|
|
t.Fatal("rate limiting failure")
|
|
case <-ti.C:
|
|
// Correct test
|
|
}
|
|
}
|
|
|
|
func TestSetHTTPClient(t *testing.T) {
|
|
var r *Requester
|
|
err := r.SetHTTPClient(nil)
|
|
if !errors.Is(err, ErrRequestSystemIsNil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, ErrRequestSystemIsNil)
|
|
}
|
|
client := new(http.Client)
|
|
r = new(Requester)
|
|
err = r.SetHTTPClient(client)
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, nil)
|
|
}
|
|
err = r.SetHTTPClient(client)
|
|
if !errors.Is(err, errCannotReuseHTTPClient) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, errCannotReuseHTTPClient)
|
|
}
|
|
}
|
|
|
|
func TestSetHTTPClientTimeout(t *testing.T) {
|
|
var r *Requester
|
|
err := r.SetHTTPClientTimeout(0)
|
|
if !errors.Is(err, ErrRequestSystemIsNil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, ErrRequestSystemIsNil)
|
|
}
|
|
r = new(Requester)
|
|
err = r.SetHTTPClient(common.NewHTTPClientWithTimeout(2))
|
|
if err != nil {
|
|
t.Fatal(err)
|
|
}
|
|
err = r.SetHTTPClientTimeout(time.Second)
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, nil)
|
|
}
|
|
}
|
|
|
|
func TestSetHTTPClientUserAgent(t *testing.T) {
|
|
var r *Requester
|
|
err := r.SetHTTPClientUserAgent("")
|
|
if !errors.Is(err, ErrRequestSystemIsNil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, ErrRequestSystemIsNil)
|
|
}
|
|
r = new(Requester)
|
|
err = r.SetHTTPClientUserAgent("")
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, nil)
|
|
}
|
|
}
|
|
|
|
func TestGetHTTPClientUserAgent(t *testing.T) {
|
|
var r *Requester
|
|
_, err := r.GetHTTPClientUserAgent()
|
|
if !errors.Is(err, ErrRequestSystemIsNil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, ErrRequestSystemIsNil)
|
|
}
|
|
r = new(Requester)
|
|
err = r.SetHTTPClientUserAgent("sillyness")
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, nil)
|
|
}
|
|
ua, err := r.GetHTTPClientUserAgent()
|
|
if !errors.Is(err, nil) {
|
|
t.Fatalf("received: '%v', but expected: '%v'", err, nil)
|
|
}
|
|
if ua != "sillyness" {
|
|
t.Fatal("unexpected value")
|
|
}
|
|
}
|
|
|
|
func TestIsVerbose(t *testing.T) {
|
|
t.Parallel()
|
|
require.False(t, IsVerbose(context.Background(), false))
|
|
require.True(t, IsVerbose(context.Background(), true))
|
|
require.True(t, IsVerbose(WithVerbose(context.Background()), false))
|
|
require.False(t, IsVerbose(context.WithValue(context.Background(), contextVerboseFlag, false), false))
|
|
require.False(t, IsVerbose(context.WithValue(context.Background(), contextVerboseFlag, "bruh"), false))
|
|
require.True(t, IsVerbose(context.WithValue(context.Background(), contextVerboseFlag, true), false))
|
|
}
|
|
|
|
func TestGetRateLimiterDefinitions(t *testing.T) {
|
|
t.Parallel()
|
|
require.Equal(t, RateLimitDefinitions(nil), (*Requester)(nil).GetRateLimiterDefinitions())
|
|
r, err := New("test", new(http.Client), WithLimiter(globalshell))
|
|
require.NoError(t, err)
|
|
require.NotEmpty(t, r.GetRateLimiterDefinitions())
|
|
assert.Equal(t, globalshell, r.GetRateLimiterDefinitions())
|
|
}
|